Oct 2 19:46:03.555851 kernel: Linux version 5.15.132-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Mon Oct 2 17:52:37 -00 2023 Oct 2 19:46:03.555864 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.first_boot=detected flatcar.oem.id=packet flatcar.autologin verity.usrhash=96b0fdb9f11bf1422adc9955c78c8182df387766badfd0b94e08fb9688739ee1 Oct 2 19:46:03.555871 kernel: BIOS-provided physical RAM map: Oct 2 19:46:03.555875 kernel: BIOS-e820: [mem 0x0000000000000000-0x00000000000997ff] usable Oct 2 19:46:03.555879 kernel: BIOS-e820: [mem 0x0000000000099800-0x000000000009ffff] reserved Oct 2 19:46:03.555883 kernel: BIOS-e820: [mem 0x00000000000e0000-0x00000000000fffff] reserved Oct 2 19:46:03.555887 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000003fffffff] usable Oct 2 19:46:03.555891 kernel: BIOS-e820: [mem 0x0000000040000000-0x00000000403fffff] reserved Oct 2 19:46:03.555895 kernel: BIOS-e820: [mem 0x0000000040400000-0x0000000080f25fff] usable Oct 2 19:46:03.555899 kernel: BIOS-e820: [mem 0x0000000080f26000-0x0000000080f26fff] ACPI NVS Oct 2 19:46:03.555904 kernel: BIOS-e820: [mem 0x0000000080f27000-0x0000000080f27fff] reserved Oct 2 19:46:03.555908 kernel: BIOS-e820: [mem 0x0000000080f28000-0x000000008af88fff] usable Oct 2 19:46:03.555911 kernel: BIOS-e820: [mem 0x000000008af89000-0x000000008c06dfff] reserved Oct 2 19:46:03.555915 kernel: BIOS-e820: [mem 0x000000008c06e000-0x000000008c1f6fff] usable Oct 2 19:46:03.555921 kernel: BIOS-e820: [mem 0x000000008c1f7000-0x000000008c628fff] ACPI NVS Oct 2 19:46:03.555925 kernel: BIOS-e820: [mem 0x000000008c629000-0x000000008eefefff] reserved Oct 2 19:46:03.555930 kernel: BIOS-e820: [mem 0x000000008eeff000-0x000000008eefffff] usable Oct 2 19:46:03.555934 kernel: BIOS-e820: [mem 0x000000008ef00000-0x000000008fffffff] reserved Oct 2 19:46:03.555938 kernel: BIOS-e820: [mem 0x00000000e0000000-0x00000000efffffff] reserved Oct 2 19:46:03.555942 kernel: BIOS-e820: [mem 0x00000000fe000000-0x00000000fe010fff] reserved Oct 2 19:46:03.555946 kernel: BIOS-e820: [mem 0x00000000fec00000-0x00000000fec00fff] reserved Oct 2 19:46:03.555951 kernel: BIOS-e820: [mem 0x00000000fee00000-0x00000000fee00fff] reserved Oct 2 19:46:03.555955 kernel: BIOS-e820: [mem 0x00000000ff000000-0x00000000ffffffff] reserved Oct 2 19:46:03.555959 kernel: BIOS-e820: [mem 0x0000000100000000-0x000000086effffff] usable Oct 2 19:46:03.555963 kernel: NX (Execute Disable) protection: active Oct 2 19:46:03.555967 kernel: SMBIOS 3.2.1 present. Oct 2 19:46:03.555971 kernel: DMI: Supermicro X11SCM-F/X11SCM-F, BIOS 1.9 09/16/2022 Oct 2 19:46:03.555977 kernel: tsc: Detected 3400.000 MHz processor Oct 2 19:46:03.555981 kernel: tsc: Detected 3399.906 MHz TSC Oct 2 19:46:03.555985 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Oct 2 19:46:03.555990 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Oct 2 19:46:03.555994 kernel: last_pfn = 0x86f000 max_arch_pfn = 0x400000000 Oct 2 19:46:03.555999 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Oct 2 19:46:03.556003 kernel: last_pfn = 0x8ef00 max_arch_pfn = 0x400000000 Oct 2 19:46:03.556007 kernel: Using GB pages for direct mapping Oct 2 19:46:03.556012 kernel: ACPI: Early table checksum verification disabled Oct 2 19:46:03.556017 kernel: ACPI: RSDP 0x00000000000F05B0 000024 (v02 SUPERM) Oct 2 19:46:03.556021 kernel: ACPI: XSDT 0x000000008C50A0C8 00010C (v01 SUPERM SUPERM 01072009 AMI 00010013) Oct 2 19:46:03.556025 kernel: ACPI: FACP 0x000000008C546670 000114 (v06 01072009 AMI 00010013) Oct 2 19:46:03.556030 kernel: ACPI: DSDT 0x000000008C50A268 03C404 (v02 SUPERM SMCI--MB 01072009 INTL 20160527) Oct 2 19:46:03.556036 kernel: ACPI: FACS 0x000000008C628F80 000040 Oct 2 19:46:03.556041 kernel: ACPI: APIC 0x000000008C546788 00012C (v04 01072009 AMI 00010013) Oct 2 19:46:03.556046 kernel: ACPI: FPDT 0x000000008C5468B8 000044 (v01 01072009 AMI 00010013) Oct 2 19:46:03.556051 kernel: ACPI: FIDT 0x000000008C546900 00009C (v01 SUPERM SMCI--MB 01072009 AMI 00010013) Oct 2 19:46:03.556056 kernel: ACPI: MCFG 0x000000008C5469A0 00003C (v01 SUPERM SMCI--MB 01072009 MSFT 00000097) Oct 2 19:46:03.556061 kernel: ACPI: SPMI 0x000000008C5469E0 000041 (v05 SUPERM SMCI--MB 00000000 AMI. 00000000) Oct 2 19:46:03.556065 kernel: ACPI: SSDT 0x000000008C546A28 001B1C (v02 CpuRef CpuSsdt 00003000 INTL 20160527) Oct 2 19:46:03.556070 kernel: ACPI: SSDT 0x000000008C548548 0031C6 (v02 SaSsdt SaSsdt 00003000 INTL 20160527) Oct 2 19:46:03.556074 kernel: ACPI: SSDT 0x000000008C54B710 00232B (v02 PegSsd PegSsdt 00001000 INTL 20160527) Oct 2 19:46:03.556079 kernel: ACPI: HPET 0x000000008C54DA40 000038 (v01 SUPERM SMCI--MB 00000002 01000013) Oct 2 19:46:03.556085 kernel: ACPI: SSDT 0x000000008C54DA78 000FAE (v02 SUPERM Ther_Rvp 00001000 INTL 20160527) Oct 2 19:46:03.556089 kernel: ACPI: SSDT 0x000000008C54EA28 0008F4 (v02 INTEL xh_mossb 00000000 INTL 20160527) Oct 2 19:46:03.556094 kernel: ACPI: UEFI 0x000000008C54F320 000042 (v01 SUPERM SMCI--MB 00000002 01000013) Oct 2 19:46:03.556099 kernel: ACPI: LPIT 0x000000008C54F368 000094 (v01 SUPERM SMCI--MB 00000002 01000013) Oct 2 19:46:03.556103 kernel: ACPI: SSDT 0x000000008C54F400 0027DE (v02 SUPERM PtidDevc 00001000 INTL 20160527) Oct 2 19:46:03.556108 kernel: ACPI: SSDT 0x000000008C551BE0 0014E2 (v02 SUPERM TbtTypeC 00000000 INTL 20160527) Oct 2 19:46:03.556112 kernel: ACPI: DBGP 0x000000008C5530C8 000034 (v01 SUPERM SMCI--MB 00000002 01000013) Oct 2 19:46:03.556117 kernel: ACPI: DBG2 0x000000008C553100 000054 (v00 SUPERM SMCI--MB 00000002 01000013) Oct 2 19:46:03.556123 kernel: ACPI: SSDT 0x000000008C553158 001B67 (v02 SUPERM UsbCTabl 00001000 INTL 20160527) Oct 2 19:46:03.556127 kernel: ACPI: DMAR 0x000000008C554CC0 000070 (v01 INTEL EDK2 00000002 01000013) Oct 2 19:46:03.556132 kernel: ACPI: SSDT 0x000000008C554D30 000144 (v02 Intel ADebTabl 00001000 INTL 20160527) Oct 2 19:46:03.556137 kernel: ACPI: TPM2 0x000000008C554E78 000034 (v04 SUPERM SMCI--MB 00000001 AMI 00000000) Oct 2 19:46:03.556141 kernel: ACPI: SSDT 0x000000008C554EB0 000D8F (v02 INTEL SpsNm 00000002 INTL 20160527) Oct 2 19:46:03.556146 kernel: ACPI: WSMT 0x000000008C555C40 000028 (v01 SUPERM 01072009 AMI 00010013) Oct 2 19:46:03.556151 kernel: ACPI: EINJ 0x000000008C555C68 000130 (v01 AMI AMI.EINJ 00000000 AMI. 00000000) Oct 2 19:46:03.556155 kernel: ACPI: ERST 0x000000008C555D98 000230 (v01 AMIER AMI.ERST 00000000 AMI. 00000000) Oct 2 19:46:03.556160 kernel: ACPI: BERT 0x000000008C555FC8 000030 (v01 AMI AMI.BERT 00000000 AMI. 00000000) Oct 2 19:46:03.556165 kernel: ACPI: HEST 0x000000008C555FF8 00027C (v01 AMI AMI.HEST 00000000 AMI. 00000000) Oct 2 19:46:03.556170 kernel: ACPI: SSDT 0x000000008C556278 000162 (v01 SUPERM SMCCDN 00000000 INTL 20181221) Oct 2 19:46:03.556175 kernel: ACPI: Reserving FACP table memory at [mem 0x8c546670-0x8c546783] Oct 2 19:46:03.556180 kernel: ACPI: Reserving DSDT table memory at [mem 0x8c50a268-0x8c54666b] Oct 2 19:46:03.556184 kernel: ACPI: Reserving FACS table memory at [mem 0x8c628f80-0x8c628fbf] Oct 2 19:46:03.556189 kernel: ACPI: Reserving APIC table memory at [mem 0x8c546788-0x8c5468b3] Oct 2 19:46:03.556193 kernel: ACPI: Reserving FPDT table memory at [mem 0x8c5468b8-0x8c5468fb] Oct 2 19:46:03.556198 kernel: ACPI: Reserving FIDT table memory at [mem 0x8c546900-0x8c54699b] Oct 2 19:46:03.556203 kernel: ACPI: Reserving MCFG table memory at [mem 0x8c5469a0-0x8c5469db] Oct 2 19:46:03.556208 kernel: ACPI: Reserving SPMI table memory at [mem 0x8c5469e0-0x8c546a20] Oct 2 19:46:03.556213 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c546a28-0x8c548543] Oct 2 19:46:03.556217 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c548548-0x8c54b70d] Oct 2 19:46:03.556222 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c54b710-0x8c54da3a] Oct 2 19:46:03.556227 kernel: ACPI: Reserving HPET table memory at [mem 0x8c54da40-0x8c54da77] Oct 2 19:46:03.556232 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c54da78-0x8c54ea25] Oct 2 19:46:03.556236 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c54ea28-0x8c54f31b] Oct 2 19:46:03.556241 kernel: ACPI: Reserving UEFI table memory at [mem 0x8c54f320-0x8c54f361] Oct 2 19:46:03.556245 kernel: ACPI: Reserving LPIT table memory at [mem 0x8c54f368-0x8c54f3fb] Oct 2 19:46:03.556251 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c54f400-0x8c551bdd] Oct 2 19:46:03.556255 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c551be0-0x8c5530c1] Oct 2 19:46:03.556260 kernel: ACPI: Reserving DBGP table memory at [mem 0x8c5530c8-0x8c5530fb] Oct 2 19:46:03.556265 kernel: ACPI: Reserving DBG2 table memory at [mem 0x8c553100-0x8c553153] Oct 2 19:46:03.556269 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c553158-0x8c554cbe] Oct 2 19:46:03.556274 kernel: ACPI: Reserving DMAR table memory at [mem 0x8c554cc0-0x8c554d2f] Oct 2 19:46:03.556278 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c554d30-0x8c554e73] Oct 2 19:46:03.556283 kernel: ACPI: Reserving TPM2 table memory at [mem 0x8c554e78-0x8c554eab] Oct 2 19:46:03.556288 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c554eb0-0x8c555c3e] Oct 2 19:46:03.556293 kernel: ACPI: Reserving WSMT table memory at [mem 0x8c555c40-0x8c555c67] Oct 2 19:46:03.556298 kernel: ACPI: Reserving EINJ table memory at [mem 0x8c555c68-0x8c555d97] Oct 2 19:46:03.556305 kernel: ACPI: Reserving ERST table memory at [mem 0x8c555d98-0x8c555fc7] Oct 2 19:46:03.556310 kernel: ACPI: Reserving BERT table memory at [mem 0x8c555fc8-0x8c555ff7] Oct 2 19:46:03.556315 kernel: ACPI: Reserving HEST table memory at [mem 0x8c555ff8-0x8c556273] Oct 2 19:46:03.556319 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c556278-0x8c5563d9] Oct 2 19:46:03.556324 kernel: No NUMA configuration found Oct 2 19:46:03.556329 kernel: Faking a node at [mem 0x0000000000000000-0x000000086effffff] Oct 2 19:46:03.556333 kernel: NODE_DATA(0) allocated [mem 0x86effa000-0x86effffff] Oct 2 19:46:03.556339 kernel: Zone ranges: Oct 2 19:46:03.556344 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Oct 2 19:46:03.556349 kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] Oct 2 19:46:03.556353 kernel: Normal [mem 0x0000000100000000-0x000000086effffff] Oct 2 19:46:03.556358 kernel: Movable zone start for each node Oct 2 19:46:03.556363 kernel: Early memory node ranges Oct 2 19:46:03.556367 kernel: node 0: [mem 0x0000000000001000-0x0000000000098fff] Oct 2 19:46:03.556372 kernel: node 0: [mem 0x0000000000100000-0x000000003fffffff] Oct 2 19:46:03.556377 kernel: node 0: [mem 0x0000000040400000-0x0000000080f25fff] Oct 2 19:46:03.556382 kernel: node 0: [mem 0x0000000080f28000-0x000000008af88fff] Oct 2 19:46:03.556387 kernel: node 0: [mem 0x000000008c06e000-0x000000008c1f6fff] Oct 2 19:46:03.556392 kernel: node 0: [mem 0x000000008eeff000-0x000000008eefffff] Oct 2 19:46:03.556396 kernel: node 0: [mem 0x0000000100000000-0x000000086effffff] Oct 2 19:46:03.556401 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000086effffff] Oct 2 19:46:03.556406 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Oct 2 19:46:03.556414 kernel: On node 0, zone DMA: 103 pages in unavailable ranges Oct 2 19:46:03.556419 kernel: On node 0, zone DMA32: 1024 pages in unavailable ranges Oct 2 19:46:03.556424 kernel: On node 0, zone DMA32: 2 pages in unavailable ranges Oct 2 19:46:03.556429 kernel: On node 0, zone DMA32: 4325 pages in unavailable ranges Oct 2 19:46:03.556435 kernel: On node 0, zone DMA32: 11528 pages in unavailable ranges Oct 2 19:46:03.556440 kernel: On node 0, zone Normal: 4352 pages in unavailable ranges Oct 2 19:46:03.556445 kernel: On node 0, zone Normal: 4096 pages in unavailable ranges Oct 2 19:46:03.556450 kernel: ACPI: PM-Timer IO Port: 0x1808 Oct 2 19:46:03.556455 kernel: ACPI: LAPIC_NMI (acpi_id[0x01] high edge lint[0x1]) Oct 2 19:46:03.556460 kernel: ACPI: LAPIC_NMI (acpi_id[0x02] high edge lint[0x1]) Oct 2 19:46:03.556465 kernel: ACPI: LAPIC_NMI (acpi_id[0x03] high edge lint[0x1]) Oct 2 19:46:03.556471 kernel: ACPI: LAPIC_NMI (acpi_id[0x04] high edge lint[0x1]) Oct 2 19:46:03.556476 kernel: ACPI: LAPIC_NMI (acpi_id[0x05] high edge lint[0x1]) Oct 2 19:46:03.556481 kernel: ACPI: LAPIC_NMI (acpi_id[0x06] high edge lint[0x1]) Oct 2 19:46:03.556486 kernel: ACPI: LAPIC_NMI (acpi_id[0x07] high edge lint[0x1]) Oct 2 19:46:03.556491 kernel: ACPI: LAPIC_NMI (acpi_id[0x08] high edge lint[0x1]) Oct 2 19:46:03.556496 kernel: ACPI: LAPIC_NMI (acpi_id[0x09] high edge lint[0x1]) Oct 2 19:46:03.556501 kernel: ACPI: LAPIC_NMI (acpi_id[0x0a] high edge lint[0x1]) Oct 2 19:46:03.556506 kernel: ACPI: LAPIC_NMI (acpi_id[0x0b] high edge lint[0x1]) Oct 2 19:46:03.556510 kernel: ACPI: LAPIC_NMI (acpi_id[0x0c] high edge lint[0x1]) Oct 2 19:46:03.556516 kernel: ACPI: LAPIC_NMI (acpi_id[0x0d] high edge lint[0x1]) Oct 2 19:46:03.556521 kernel: ACPI: LAPIC_NMI (acpi_id[0x0e] high edge lint[0x1]) Oct 2 19:46:03.556526 kernel: ACPI: LAPIC_NMI (acpi_id[0x0f] high edge lint[0x1]) Oct 2 19:46:03.556531 kernel: ACPI: LAPIC_NMI (acpi_id[0x10] high edge lint[0x1]) Oct 2 19:46:03.556536 kernel: IOAPIC[0]: apic_id 2, version 32, address 0xfec00000, GSI 0-119 Oct 2 19:46:03.556541 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Oct 2 19:46:03.556546 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Oct 2 19:46:03.556551 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Oct 2 19:46:03.556556 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 Oct 2 19:46:03.556562 kernel: TSC deadline timer available Oct 2 19:46:03.556567 kernel: smpboot: Allowing 16 CPUs, 0 hotplug CPUs Oct 2 19:46:03.556572 kernel: [mem 0x90000000-0xdfffffff] available for PCI devices Oct 2 19:46:03.556577 kernel: Booting paravirtualized kernel on bare hardware Oct 2 19:46:03.556582 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Oct 2 19:46:03.556587 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:16 nr_node_ids:1 Oct 2 19:46:03.556592 kernel: percpu: Embedded 55 pages/cpu s185624 r8192 d31464 u262144 Oct 2 19:46:03.556597 kernel: pcpu-alloc: s185624 r8192 d31464 u262144 alloc=1*2097152 Oct 2 19:46:03.556602 kernel: pcpu-alloc: [0] 00 01 02 03 04 05 06 07 [0] 08 09 10 11 12 13 14 15 Oct 2 19:46:03.556608 kernel: Built 1 zonelists, mobility grouping on. Total pages: 8232348 Oct 2 19:46:03.556612 kernel: Policy zone: Normal Oct 2 19:46:03.556618 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.first_boot=detected flatcar.oem.id=packet flatcar.autologin verity.usrhash=96b0fdb9f11bf1422adc9955c78c8182df387766badfd0b94e08fb9688739ee1 Oct 2 19:46:03.556623 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Oct 2 19:46:03.556628 kernel: Dentry cache hash table entries: 4194304 (order: 13, 33554432 bytes, linear) Oct 2 19:46:03.556633 kernel: Inode-cache hash table entries: 2097152 (order: 12, 16777216 bytes, linear) Oct 2 19:46:03.556638 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Oct 2 19:46:03.556643 kernel: Memory: 32724448K/33452708K available (12294K kernel code, 2274K rwdata, 13692K rodata, 45372K init, 4176K bss, 728000K reserved, 0K cma-reserved) Oct 2 19:46:03.556650 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=16, Nodes=1 Oct 2 19:46:03.556655 kernel: ftrace: allocating 34453 entries in 135 pages Oct 2 19:46:03.556660 kernel: ftrace: allocated 135 pages with 4 groups Oct 2 19:46:03.556665 kernel: rcu: Hierarchical RCU implementation. Oct 2 19:46:03.556670 kernel: rcu: RCU event tracing is enabled. Oct 2 19:46:03.556675 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=16. Oct 2 19:46:03.556680 kernel: Rude variant of Tasks RCU enabled. Oct 2 19:46:03.556685 kernel: Tracing variant of Tasks RCU enabled. Oct 2 19:46:03.556690 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Oct 2 19:46:03.556696 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=16 Oct 2 19:46:03.556701 kernel: NR_IRQS: 33024, nr_irqs: 2184, preallocated irqs: 16 Oct 2 19:46:03.556706 kernel: random: crng init done Oct 2 19:46:03.556711 kernel: Console: colour dummy device 80x25 Oct 2 19:46:03.556716 kernel: printk: console [tty0] enabled Oct 2 19:46:03.556721 kernel: printk: console [ttyS1] enabled Oct 2 19:46:03.556726 kernel: ACPI: Core revision 20210730 Oct 2 19:46:03.556731 kernel: hpet: HPET dysfunctional in PC10. Force disabled. Oct 2 19:46:03.556736 kernel: APIC: Switch to symmetric I/O mode setup Oct 2 19:46:03.556742 kernel: DMAR: Host address width 39 Oct 2 19:46:03.556747 kernel: DMAR: DRHD base: 0x000000fed91000 flags: 0x1 Oct 2 19:46:03.556752 kernel: DMAR: dmar0: reg_base_addr fed91000 ver 1:0 cap d2008c40660462 ecap f050da Oct 2 19:46:03.556757 kernel: DMAR: RMRR base: 0x0000008cf10000 end: 0x0000008d159fff Oct 2 19:46:03.556762 kernel: DMAR-IR: IOAPIC id 2 under DRHD base 0xfed91000 IOMMU 0 Oct 2 19:46:03.556767 kernel: DMAR-IR: HPET id 0 under DRHD base 0xfed91000 Oct 2 19:46:03.556772 kernel: DMAR-IR: Queued invalidation will be enabled to support x2apic and Intr-remapping. Oct 2 19:46:03.556777 kernel: DMAR-IR: Enabled IRQ remapping in x2apic mode Oct 2 19:46:03.556782 kernel: x2apic enabled Oct 2 19:46:03.556787 kernel: Switched APIC routing to cluster x2apic. Oct 2 19:46:03.556793 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x3101f59f5e6, max_idle_ns: 440795259996 ns Oct 2 19:46:03.556798 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 6799.81 BogoMIPS (lpj=3399906) Oct 2 19:46:03.556803 kernel: CPU0: Thermal monitoring enabled (TM1) Oct 2 19:46:03.556808 kernel: process: using mwait in idle threads Oct 2 19:46:03.556812 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 Oct 2 19:46:03.556817 kernel: Last level dTLB entries: 4KB 64, 2MB 0, 4MB 0, 1GB 4 Oct 2 19:46:03.556822 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Oct 2 19:46:03.556827 kernel: Spectre V2 : WARNING: Unprivileged eBPF is enabled with eIBRS on, data leaks possible via Spectre v2 BHB attacks! Oct 2 19:46:03.556832 kernel: Spectre V2 : Mitigation: Enhanced IBRS Oct 2 19:46:03.556838 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Oct 2 19:46:03.556843 kernel: Spectre V2 : Spectre v2 / PBRSB-eIBRS: Retire a single CALL on VMEXIT Oct 2 19:46:03.556848 kernel: RETBleed: Mitigation: Enhanced IBRS Oct 2 19:46:03.556853 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Oct 2 19:46:03.556858 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Oct 2 19:46:03.556862 kernel: TAA: Mitigation: TSX disabled Oct 2 19:46:03.556867 kernel: MMIO Stale Data: Mitigation: Clear CPU buffers Oct 2 19:46:03.556872 kernel: SRBDS: Mitigation: Microcode Oct 2 19:46:03.556877 kernel: GDS: Vulnerable: No microcode Oct 2 19:46:03.556882 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Oct 2 19:46:03.556888 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Oct 2 19:46:03.556893 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Oct 2 19:46:03.556898 kernel: x86/fpu: Supporting XSAVE feature 0x008: 'MPX bounds registers' Oct 2 19:46:03.556903 kernel: x86/fpu: Supporting XSAVE feature 0x010: 'MPX CSR' Oct 2 19:46:03.556908 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Oct 2 19:46:03.556913 kernel: x86/fpu: xstate_offset[3]: 832, xstate_sizes[3]: 64 Oct 2 19:46:03.556917 kernel: x86/fpu: xstate_offset[4]: 896, xstate_sizes[4]: 64 Oct 2 19:46:03.556922 kernel: x86/fpu: Enabled xstate features 0x1f, context size is 960 bytes, using 'compacted' format. Oct 2 19:46:03.556927 kernel: Freeing SMP alternatives memory: 32K Oct 2 19:46:03.556932 kernel: pid_max: default: 32768 minimum: 301 Oct 2 19:46:03.556937 kernel: LSM: Security Framework initializing Oct 2 19:46:03.556942 kernel: SELinux: Initializing. Oct 2 19:46:03.556948 kernel: Mount-cache hash table entries: 65536 (order: 7, 524288 bytes, linear) Oct 2 19:46:03.556953 kernel: Mountpoint-cache hash table entries: 65536 (order: 7, 524288 bytes, linear) Oct 2 19:46:03.556958 kernel: smpboot: Estimated ratio of average max frequency by base frequency (times 1024): 1445 Oct 2 19:46:03.556962 kernel: smpboot: CPU0: Intel(R) Xeon(R) E-2278G CPU @ 3.40GHz (family: 0x6, model: 0x9e, stepping: 0xd) Oct 2 19:46:03.556967 kernel: Performance Events: PEBS fmt3+, Skylake events, 32-deep LBR, full-width counters, Intel PMU driver. Oct 2 19:46:03.556972 kernel: ... version: 4 Oct 2 19:46:03.556977 kernel: ... bit width: 48 Oct 2 19:46:03.556982 kernel: ... generic registers: 4 Oct 2 19:46:03.556987 kernel: ... value mask: 0000ffffffffffff Oct 2 19:46:03.556992 kernel: ... max period: 00007fffffffffff Oct 2 19:46:03.556998 kernel: ... fixed-purpose events: 3 Oct 2 19:46:03.557003 kernel: ... event mask: 000000070000000f Oct 2 19:46:03.557008 kernel: signal: max sigframe size: 2032 Oct 2 19:46:03.557013 kernel: rcu: Hierarchical SRCU implementation. Oct 2 19:46:03.557018 kernel: NMI watchdog: Enabled. Permanently consumes one hw-PMU counter. Oct 2 19:46:03.557023 kernel: smp: Bringing up secondary CPUs ... Oct 2 19:46:03.557028 kernel: x86: Booting SMP configuration: Oct 2 19:46:03.557033 kernel: .... node #0, CPUs: #1 #2 #3 #4 #5 #6 #7 #8 Oct 2 19:46:03.557038 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Oct 2 19:46:03.557044 kernel: #9 #10 #11 #12 #13 #14 #15 Oct 2 19:46:03.557049 kernel: smp: Brought up 1 node, 16 CPUs Oct 2 19:46:03.557054 kernel: smpboot: Max logical packages: 1 Oct 2 19:46:03.557059 kernel: smpboot: Total of 16 processors activated (108796.99 BogoMIPS) Oct 2 19:46:03.557064 kernel: devtmpfs: initialized Oct 2 19:46:03.557069 kernel: x86/mm: Memory block size: 128MB Oct 2 19:46:03.557074 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x80f26000-0x80f26fff] (4096 bytes) Oct 2 19:46:03.557079 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x8c1f7000-0x8c628fff] (4399104 bytes) Oct 2 19:46:03.557084 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Oct 2 19:46:03.557090 kernel: futex hash table entries: 4096 (order: 6, 262144 bytes, linear) Oct 2 19:46:03.557095 kernel: pinctrl core: initialized pinctrl subsystem Oct 2 19:46:03.557100 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Oct 2 19:46:03.557105 kernel: audit: initializing netlink subsys (disabled) Oct 2 19:46:03.557110 kernel: audit: type=2000 audit(1696275958.040:1): state=initialized audit_enabled=0 res=1 Oct 2 19:46:03.557114 kernel: thermal_sys: Registered thermal governor 'step_wise' Oct 2 19:46:03.557119 kernel: thermal_sys: Registered thermal governor 'user_space' Oct 2 19:46:03.557124 kernel: cpuidle: using governor menu Oct 2 19:46:03.557129 kernel: ACPI: bus type PCI registered Oct 2 19:46:03.557135 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Oct 2 19:46:03.557140 kernel: dca service started, version 1.12.1 Oct 2 19:46:03.557145 kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xe0000000-0xefffffff] (base 0xe0000000) Oct 2 19:46:03.557150 kernel: PCI: MMCONFIG at [mem 0xe0000000-0xefffffff] reserved in E820 Oct 2 19:46:03.557155 kernel: PCI: Using configuration type 1 for base access Oct 2 19:46:03.557160 kernel: ENERGY_PERF_BIAS: Set to 'normal', was 'performance' Oct 2 19:46:03.557165 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Oct 2 19:46:03.557170 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Oct 2 19:46:03.557176 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Oct 2 19:46:03.557181 kernel: ACPI: Added _OSI(Module Device) Oct 2 19:46:03.557185 kernel: ACPI: Added _OSI(Processor Device) Oct 2 19:46:03.557190 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Oct 2 19:46:03.557195 kernel: ACPI: Added _OSI(Processor Aggregator Device) Oct 2 19:46:03.557200 kernel: ACPI: Added _OSI(Linux-Dell-Video) Oct 2 19:46:03.557205 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Oct 2 19:46:03.557210 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Oct 2 19:46:03.557215 kernel: ACPI: 12 ACPI AML tables successfully acquired and loaded Oct 2 19:46:03.557220 kernel: ACPI: Dynamic OEM Table Load: Oct 2 19:46:03.557226 kernel: ACPI: SSDT 0xFFFF9DC54020E300 0000F4 (v02 PmRef Cpu0Psd 00003000 INTL 20160527) Oct 2 19:46:03.557231 kernel: ACPI: \_SB_.PR00: _OSC native thermal LVT Acked Oct 2 19:46:03.557236 kernel: ACPI: Dynamic OEM Table Load: Oct 2 19:46:03.557241 kernel: ACPI: SSDT 0xFFFF9DC541AE7000 000400 (v02 PmRef Cpu0Cst 00003001 INTL 20160527) Oct 2 19:46:03.557246 kernel: ACPI: Dynamic OEM Table Load: Oct 2 19:46:03.557251 kernel: ACPI: SSDT 0xFFFF9DC541A51000 000683 (v02 PmRef Cpu0Ist 00003000 INTL 20160527) Oct 2 19:46:03.557256 kernel: ACPI: Dynamic OEM Table Load: Oct 2 19:46:03.557261 kernel: ACPI: SSDT 0xFFFF9DC541A57000 0005FC (v02 PmRef ApIst 00003000 INTL 20160527) Oct 2 19:46:03.557266 kernel: ACPI: Dynamic OEM Table Load: Oct 2 19:46:03.557271 kernel: ACPI: SSDT 0xFFFF9DC54014B000 000AB0 (v02 PmRef ApPsd 00003000 INTL 20160527) Oct 2 19:46:03.557276 kernel: ACPI: Dynamic OEM Table Load: Oct 2 19:46:03.557281 kernel: ACPI: SSDT 0xFFFF9DC541AE5000 00030A (v02 PmRef ApCst 00003000 INTL 20160527) Oct 2 19:46:03.557286 kernel: ACPI: Interpreter enabled Oct 2 19:46:03.557291 kernel: ACPI: PM: (supports S0 S5) Oct 2 19:46:03.557296 kernel: ACPI: Using IOAPIC for interrupt routing Oct 2 19:46:03.557304 kernel: HEST: Enabling Firmware First mode for corrected errors. Oct 2 19:46:03.557309 kernel: mce: [Firmware Bug]: Ignoring request to disable invalid MCA bank 14. Oct 2 19:46:03.557313 kernel: HEST: Table parsing has been initialized. Oct 2 19:46:03.557319 kernel: GHES: APEI firmware first mode is enabled by APEI bit and WHEA _OSC. Oct 2 19:46:03.557325 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Oct 2 19:46:03.557330 kernel: ACPI: Enabled 9 GPEs in block 00 to 7F Oct 2 19:46:03.557334 kernel: ACPI: PM: Power Resource [USBC] Oct 2 19:46:03.557339 kernel: ACPI: PM: Power Resource [V0PR] Oct 2 19:46:03.557344 kernel: ACPI: PM: Power Resource [V1PR] Oct 2 19:46:03.557350 kernel: ACPI: PM: Power Resource [V2PR] Oct 2 19:46:03.557354 kernel: ACPI: PM: Power Resource [WRST] Oct 2 19:46:03.557359 kernel: ACPI: PM: Power Resource [FN00] Oct 2 19:46:03.557364 kernel: ACPI: PM: Power Resource [FN01] Oct 2 19:46:03.557370 kernel: ACPI: PM: Power Resource [FN02] Oct 2 19:46:03.557375 kernel: ACPI: PM: Power Resource [FN03] Oct 2 19:46:03.557380 kernel: ACPI: PM: Power Resource [FN04] Oct 2 19:46:03.557385 kernel: ACPI: PM: Power Resource [PIN] Oct 2 19:46:03.557390 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-fe]) Oct 2 19:46:03.557453 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Oct 2 19:46:03.557498 kernel: acpi PNP0A08:00: _OSC: platform does not support [AER] Oct 2 19:46:03.557541 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME PCIeCapability LTR] Oct 2 19:46:03.557549 kernel: PCI host bridge to bus 0000:00 Oct 2 19:46:03.557593 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Oct 2 19:46:03.557631 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Oct 2 19:46:03.557668 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Oct 2 19:46:03.557705 kernel: pci_bus 0000:00: root bus resource [mem 0x90000000-0xdfffffff window] Oct 2 19:46:03.557741 kernel: pci_bus 0000:00: root bus resource [mem 0xfc800000-0xfe7fffff window] Oct 2 19:46:03.557778 kernel: pci_bus 0000:00: root bus resource [bus 00-fe] Oct 2 19:46:03.557832 kernel: pci 0000:00:00.0: [8086:3e31] type 00 class 0x060000 Oct 2 19:46:03.557879 kernel: pci 0000:00:01.0: [8086:1901] type 01 class 0x060400 Oct 2 19:46:03.557924 kernel: pci 0000:00:01.0: PME# supported from D0 D3hot D3cold Oct 2 19:46:03.557971 kernel: pci 0000:00:08.0: [8086:1911] type 00 class 0x088000 Oct 2 19:46:03.558013 kernel: pci 0000:00:08.0: reg 0x10: [mem 0x95520000-0x95520fff 64bit] Oct 2 19:46:03.558060 kernel: pci 0000:00:12.0: [8086:a379] type 00 class 0x118000 Oct 2 19:46:03.558103 kernel: pci 0000:00:12.0: reg 0x10: [mem 0x9551f000-0x9551ffff 64bit] Oct 2 19:46:03.558148 kernel: pci 0000:00:14.0: [8086:a36d] type 00 class 0x0c0330 Oct 2 19:46:03.558191 kernel: pci 0000:00:14.0: reg 0x10: [mem 0x95500000-0x9550ffff 64bit] Oct 2 19:46:03.558235 kernel: pci 0000:00:14.0: PME# supported from D3hot D3cold Oct 2 19:46:03.558283 kernel: pci 0000:00:14.2: [8086:a36f] type 00 class 0x050000 Oct 2 19:46:03.558329 kernel: pci 0000:00:14.2: reg 0x10: [mem 0x95512000-0x95513fff 64bit] Oct 2 19:46:03.558373 kernel: pci 0000:00:14.2: reg 0x18: [mem 0x9551e000-0x9551efff 64bit] Oct 2 19:46:03.558419 kernel: pci 0000:00:14.5: [8086:a375] type 00 class 0x080501 Oct 2 19:46:03.558461 kernel: pci 0000:00:14.5: reg 0x10: [mem 0x9551d000-0x9551dfff 64bit] Oct 2 19:46:03.558507 kernel: pci 0000:00:15.0: [8086:a368] type 00 class 0x0c8000 Oct 2 19:46:03.558548 kernel: pci 0000:00:15.0: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Oct 2 19:46:03.558593 kernel: pci 0000:00:15.1: [8086:a369] type 00 class 0x0c8000 Oct 2 19:46:03.558637 kernel: pci 0000:00:15.1: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Oct 2 19:46:03.558681 kernel: pci 0000:00:16.0: [8086:a360] type 00 class 0x078000 Oct 2 19:46:03.558723 kernel: pci 0000:00:16.0: reg 0x10: [mem 0x9551a000-0x9551afff 64bit] Oct 2 19:46:03.558764 kernel: pci 0000:00:16.0: PME# supported from D3hot Oct 2 19:46:03.558809 kernel: pci 0000:00:16.1: [8086:a361] type 00 class 0x078000 Oct 2 19:46:03.558851 kernel: pci 0000:00:16.1: reg 0x10: [mem 0x95519000-0x95519fff 64bit] Oct 2 19:46:03.558894 kernel: pci 0000:00:16.1: PME# supported from D3hot Oct 2 19:46:03.558940 kernel: pci 0000:00:16.4: [8086:a364] type 00 class 0x078000 Oct 2 19:46:03.558980 kernel: pci 0000:00:16.4: reg 0x10: [mem 0x95518000-0x95518fff 64bit] Oct 2 19:46:03.559022 kernel: pci 0000:00:16.4: PME# supported from D3hot Oct 2 19:46:03.559066 kernel: pci 0000:00:17.0: [8086:a352] type 00 class 0x010601 Oct 2 19:46:03.559107 kernel: pci 0000:00:17.0: reg 0x10: [mem 0x95510000-0x95511fff] Oct 2 19:46:03.559150 kernel: pci 0000:00:17.0: reg 0x14: [mem 0x95517000-0x955170ff] Oct 2 19:46:03.559197 kernel: pci 0000:00:17.0: reg 0x18: [io 0x6050-0x6057] Oct 2 19:46:03.559239 kernel: pci 0000:00:17.0: reg 0x1c: [io 0x6040-0x6043] Oct 2 19:46:03.559280 kernel: pci 0000:00:17.0: reg 0x20: [io 0x6020-0x603f] Oct 2 19:46:03.559325 kernel: pci 0000:00:17.0: reg 0x24: [mem 0x95516000-0x955167ff] Oct 2 19:46:03.559367 kernel: pci 0000:00:17.0: PME# supported from D3hot Oct 2 19:46:03.559412 kernel: pci 0000:00:1b.0: [8086:a340] type 01 class 0x060400 Oct 2 19:46:03.559454 kernel: pci 0000:00:1b.0: PME# supported from D0 D3hot D3cold Oct 2 19:46:03.559502 kernel: pci 0000:00:1b.4: [8086:a32c] type 01 class 0x060400 Oct 2 19:46:03.559544 kernel: pci 0000:00:1b.4: PME# supported from D0 D3hot D3cold Oct 2 19:46:03.559590 kernel: pci 0000:00:1b.5: [8086:a32d] type 01 class 0x060400 Oct 2 19:46:03.559632 kernel: pci 0000:00:1b.5: PME# supported from D0 D3hot D3cold Oct 2 19:46:03.559677 kernel: pci 0000:00:1c.0: [8086:a338] type 01 class 0x060400 Oct 2 19:46:03.559721 kernel: pci 0000:00:1c.0: PME# supported from D0 D3hot D3cold Oct 2 19:46:03.559769 kernel: pci 0000:00:1c.3: [8086:a33b] type 01 class 0x060400 Oct 2 19:46:03.559812 kernel: pci 0000:00:1c.3: PME# supported from D0 D3hot D3cold Oct 2 19:46:03.559858 kernel: pci 0000:00:1e.0: [8086:a328] type 00 class 0x078000 Oct 2 19:46:03.559903 kernel: pci 0000:00:1e.0: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Oct 2 19:46:03.559948 kernel: pci 0000:00:1f.0: [8086:a309] type 00 class 0x060100 Oct 2 19:46:03.559994 kernel: pci 0000:00:1f.4: [8086:a323] type 00 class 0x0c0500 Oct 2 19:46:03.560036 kernel: pci 0000:00:1f.4: reg 0x10: [mem 0x95514000-0x955140ff 64bit] Oct 2 19:46:03.560078 kernel: pci 0000:00:1f.4: reg 0x20: [io 0xefa0-0xefbf] Oct 2 19:46:03.560123 kernel: pci 0000:00:1f.5: [8086:a324] type 00 class 0x0c8000 Oct 2 19:46:03.560167 kernel: pci 0000:00:1f.5: reg 0x10: [mem 0xfe010000-0xfe010fff] Oct 2 19:46:03.560218 kernel: pci 0000:01:00.0: [15b3:1015] type 00 class 0x020000 Oct 2 19:46:03.560262 kernel: pci 0000:01:00.0: reg 0x10: [mem 0x92000000-0x93ffffff 64bit pref] Oct 2 19:46:03.560310 kernel: pci 0000:01:00.0: reg 0x30: [mem 0x95200000-0x952fffff pref] Oct 2 19:46:03.560354 kernel: pci 0000:01:00.0: PME# supported from D3cold Oct 2 19:46:03.560398 kernel: pci 0000:01:00.0: reg 0x1a4: [mem 0x00000000-0x000fffff 64bit pref] Oct 2 19:46:03.560442 kernel: pci 0000:01:00.0: VF(n) BAR0 space: [mem 0x00000000-0x007fffff 64bit pref] (contains BAR0 for 8 VFs) Oct 2 19:46:03.560492 kernel: pci 0000:01:00.1: [15b3:1015] type 00 class 0x020000 Oct 2 19:46:03.560539 kernel: pci 0000:01:00.1: reg 0x10: [mem 0x90000000-0x91ffffff 64bit pref] Oct 2 19:46:03.560582 kernel: pci 0000:01:00.1: reg 0x30: [mem 0x95100000-0x951fffff pref] Oct 2 19:46:03.560626 kernel: pci 0000:01:00.1: PME# supported from D3cold Oct 2 19:46:03.560668 kernel: pci 0000:01:00.1: reg 0x1a4: [mem 0x00000000-0x000fffff 64bit pref] Oct 2 19:46:03.560712 kernel: pci 0000:01:00.1: VF(n) BAR0 space: [mem 0x00000000-0x007fffff 64bit pref] (contains BAR0 for 8 VFs) Oct 2 19:46:03.560754 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Oct 2 19:46:03.560796 kernel: pci 0000:00:01.0: bridge window [mem 0x95100000-0x952fffff] Oct 2 19:46:03.560839 kernel: pci 0000:00:01.0: bridge window [mem 0x90000000-0x93ffffff 64bit pref] Oct 2 19:46:03.560883 kernel: pci 0000:00:1b.0: PCI bridge to [bus 02] Oct 2 19:46:03.560931 kernel: pci 0000:03:00.0: [8086:1533] type 00 class 0x020000 Oct 2 19:46:03.560977 kernel: pci 0000:03:00.0: reg 0x10: [mem 0x95400000-0x9547ffff] Oct 2 19:46:03.561020 kernel: pci 0000:03:00.0: reg 0x18: [io 0x5000-0x501f] Oct 2 19:46:03.561062 kernel: pci 0000:03:00.0: reg 0x1c: [mem 0x95480000-0x95483fff] Oct 2 19:46:03.561105 kernel: pci 0000:03:00.0: PME# supported from D0 D3hot D3cold Oct 2 19:46:03.561150 kernel: pci 0000:00:1b.4: PCI bridge to [bus 03] Oct 2 19:46:03.561192 kernel: pci 0000:00:1b.4: bridge window [io 0x5000-0x5fff] Oct 2 19:46:03.561234 kernel: pci 0000:00:1b.4: bridge window [mem 0x95400000-0x954fffff] Oct 2 19:46:03.561281 kernel: pci 0000:04:00.0: [8086:1533] type 00 class 0x020000 Oct 2 19:46:03.561363 kernel: pci 0000:04:00.0: reg 0x10: [mem 0x95300000-0x9537ffff] Oct 2 19:46:03.561427 kernel: pci 0000:04:00.0: reg 0x18: [io 0x4000-0x401f] Oct 2 19:46:03.561469 kernel: pci 0000:04:00.0: reg 0x1c: [mem 0x95380000-0x95383fff] Oct 2 19:46:03.561510 kernel: pci 0000:04:00.0: PME# supported from D0 D3hot D3cold Oct 2 19:46:03.561553 kernel: pci 0000:00:1b.5: PCI bridge to [bus 04] Oct 2 19:46:03.561594 kernel: pci 0000:00:1b.5: bridge window [io 0x4000-0x4fff] Oct 2 19:46:03.561636 kernel: pci 0000:00:1b.5: bridge window [mem 0x95300000-0x953fffff] Oct 2 19:46:03.561677 kernel: pci 0000:00:1c.0: PCI bridge to [bus 05] Oct 2 19:46:03.561723 kernel: pci 0000:06:00.0: [1a03:1150] type 01 class 0x060400 Oct 2 19:46:03.561766 kernel: pci 0000:06:00.0: enabling Extended Tags Oct 2 19:46:03.561809 kernel: pci 0000:06:00.0: supports D1 D2 Oct 2 19:46:03.561854 kernel: pci 0000:06:00.0: PME# supported from D0 D1 D2 D3hot D3cold Oct 2 19:46:03.561896 kernel: pci 0000:00:1c.3: PCI bridge to [bus 06-07] Oct 2 19:46:03.561936 kernel: pci 0000:00:1c.3: bridge window [io 0x3000-0x3fff] Oct 2 19:46:03.561977 kernel: pci 0000:00:1c.3: bridge window [mem 0x94000000-0x950fffff] Oct 2 19:46:03.562022 kernel: pci_bus 0000:07: extended config space not accessible Oct 2 19:46:03.562144 kernel: pci 0000:07:00.0: [1a03:2000] type 00 class 0x030000 Oct 2 19:46:03.562191 kernel: pci 0000:07:00.0: reg 0x10: [mem 0x94000000-0x94ffffff] Oct 2 19:46:03.562238 kernel: pci 0000:07:00.0: reg 0x14: [mem 0x95000000-0x9501ffff] Oct 2 19:46:03.562282 kernel: pci 0000:07:00.0: reg 0x18: [io 0x3000-0x307f] Oct 2 19:46:03.562355 kernel: pci 0000:07:00.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Oct 2 19:46:03.562417 kernel: pci 0000:07:00.0: supports D1 D2 Oct 2 19:46:03.562463 kernel: pci 0000:07:00.0: PME# supported from D0 D1 D2 D3hot D3cold Oct 2 19:46:03.562505 kernel: pci 0000:06:00.0: PCI bridge to [bus 07] Oct 2 19:46:03.562547 kernel: pci 0000:06:00.0: bridge window [io 0x3000-0x3fff] Oct 2 19:46:03.562590 kernel: pci 0000:06:00.0: bridge window [mem 0x94000000-0x950fffff] Oct 2 19:46:03.562599 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 0 Oct 2 19:46:03.562604 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 1 Oct 2 19:46:03.562610 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 0 Oct 2 19:46:03.562615 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 0 Oct 2 19:46:03.562620 kernel: ACPI: PCI: Interrupt link LNKE configured for IRQ 0 Oct 2 19:46:03.562625 kernel: ACPI: PCI: Interrupt link LNKF configured for IRQ 0 Oct 2 19:46:03.562630 kernel: ACPI: PCI: Interrupt link LNKG configured for IRQ 0 Oct 2 19:46:03.562635 kernel: ACPI: PCI: Interrupt link LNKH configured for IRQ 0 Oct 2 19:46:03.562641 kernel: iommu: Default domain type: Translated Oct 2 19:46:03.562647 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Oct 2 19:46:03.562689 kernel: pci 0000:07:00.0: vgaarb: setting as boot VGA device Oct 2 19:46:03.562734 kernel: pci 0000:07:00.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Oct 2 19:46:03.562778 kernel: pci 0000:07:00.0: vgaarb: bridge control possible Oct 2 19:46:03.562786 kernel: vgaarb: loaded Oct 2 19:46:03.562791 kernel: pps_core: LinuxPPS API ver. 1 registered Oct 2 19:46:03.562798 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Oct 2 19:46:03.562803 kernel: PTP clock support registered Oct 2 19:46:03.562809 kernel: PCI: Using ACPI for IRQ routing Oct 2 19:46:03.562815 kernel: PCI: pci_cache_line_size set to 64 bytes Oct 2 19:46:03.562820 kernel: e820: reserve RAM buffer [mem 0x00099800-0x0009ffff] Oct 2 19:46:03.562825 kernel: e820: reserve RAM buffer [mem 0x80f26000-0x83ffffff] Oct 2 19:46:03.562830 kernel: e820: reserve RAM buffer [mem 0x8af89000-0x8bffffff] Oct 2 19:46:03.562835 kernel: e820: reserve RAM buffer [mem 0x8c1f7000-0x8fffffff] Oct 2 19:46:03.562840 kernel: e820: reserve RAM buffer [mem 0x8ef00000-0x8fffffff] Oct 2 19:46:03.562845 kernel: e820: reserve RAM buffer [mem 0x86f000000-0x86fffffff] Oct 2 19:46:03.562850 kernel: clocksource: Switched to clocksource tsc-early Oct 2 19:46:03.562855 kernel: VFS: Disk quotas dquot_6.6.0 Oct 2 19:46:03.562862 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Oct 2 19:46:03.562867 kernel: pnp: PnP ACPI init Oct 2 19:46:03.562912 kernel: system 00:00: [mem 0x40000000-0x403fffff] has been reserved Oct 2 19:46:03.562954 kernel: pnp 00:02: [dma 0 disabled] Oct 2 19:46:03.562994 kernel: pnp 00:03: [dma 0 disabled] Oct 2 19:46:03.563034 kernel: system 00:04: [io 0x0680-0x069f] has been reserved Oct 2 19:46:03.563074 kernel: system 00:04: [io 0x164e-0x164f] has been reserved Oct 2 19:46:03.563114 kernel: system 00:05: [io 0x1854-0x1857] has been reserved Oct 2 19:46:03.563156 kernel: system 00:06: [mem 0xfed10000-0xfed17fff] has been reserved Oct 2 19:46:03.563194 kernel: system 00:06: [mem 0xfed18000-0xfed18fff] has been reserved Oct 2 19:46:03.563230 kernel: system 00:06: [mem 0xfed19000-0xfed19fff] has been reserved Oct 2 19:46:03.563268 kernel: system 00:06: [mem 0xe0000000-0xefffffff] has been reserved Oct 2 19:46:03.563329 kernel: system 00:06: [mem 0xfed20000-0xfed3ffff] has been reserved Oct 2 19:46:03.563391 kernel: system 00:06: [mem 0xfed90000-0xfed93fff] could not be reserved Oct 2 19:46:03.563427 kernel: system 00:06: [mem 0xfed45000-0xfed8ffff] has been reserved Oct 2 19:46:03.563464 kernel: system 00:06: [mem 0xfee00000-0xfeefffff] could not be reserved Oct 2 19:46:03.563505 kernel: system 00:07: [io 0x1800-0x18fe] could not be reserved Oct 2 19:46:03.563542 kernel: system 00:07: [mem 0xfd000000-0xfd69ffff] has been reserved Oct 2 19:46:03.563580 kernel: system 00:07: [mem 0xfd6c0000-0xfd6cffff] has been reserved Oct 2 19:46:03.563616 kernel: system 00:07: [mem 0xfd6f0000-0xfdffffff] has been reserved Oct 2 19:46:03.563655 kernel: system 00:07: [mem 0xfe000000-0xfe01ffff] could not be reserved Oct 2 19:46:03.563691 kernel: system 00:07: [mem 0xfe200000-0xfe7fffff] has been reserved Oct 2 19:46:03.563728 kernel: system 00:07: [mem 0xff000000-0xffffffff] has been reserved Oct 2 19:46:03.563767 kernel: system 00:08: [io 0x2000-0x20fe] has been reserved Oct 2 19:46:03.563775 kernel: pnp: PnP ACPI: found 10 devices Oct 2 19:46:03.563781 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Oct 2 19:46:03.563786 kernel: NET: Registered PF_INET protocol family Oct 2 19:46:03.563792 kernel: IP idents hash table entries: 262144 (order: 9, 2097152 bytes, linear) Oct 2 19:46:03.563798 kernel: tcp_listen_portaddr_hash hash table entries: 16384 (order: 6, 262144 bytes, linear) Oct 2 19:46:03.563803 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Oct 2 19:46:03.563808 kernel: TCP established hash table entries: 262144 (order: 9, 2097152 bytes, linear) Oct 2 19:46:03.563814 kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) Oct 2 19:46:03.563819 kernel: TCP: Hash tables configured (established 262144 bind 65536) Oct 2 19:46:03.563824 kernel: UDP hash table entries: 16384 (order: 7, 524288 bytes, linear) Oct 2 19:46:03.563829 kernel: UDP-Lite hash table entries: 16384 (order: 7, 524288 bytes, linear) Oct 2 19:46:03.563834 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Oct 2 19:46:03.563841 kernel: NET: Registered PF_XDP protocol family Oct 2 19:46:03.563881 kernel: pci 0000:00:15.0: BAR 0: assigned [mem 0x95515000-0x95515fff 64bit] Oct 2 19:46:03.563923 kernel: pci 0000:00:15.1: BAR 0: assigned [mem 0x9551b000-0x9551bfff 64bit] Oct 2 19:46:03.563964 kernel: pci 0000:00:1e.0: BAR 0: assigned [mem 0x9551c000-0x9551cfff 64bit] Oct 2 19:46:03.564007 kernel: pci 0000:01:00.0: BAR 7: no space for [mem size 0x00800000 64bit pref] Oct 2 19:46:03.564049 kernel: pci 0000:01:00.0: BAR 7: failed to assign [mem size 0x00800000 64bit pref] Oct 2 19:46:03.564092 kernel: pci 0000:01:00.1: BAR 7: no space for [mem size 0x00800000 64bit pref] Oct 2 19:46:03.564135 kernel: pci 0000:01:00.1: BAR 7: failed to assign [mem size 0x00800000 64bit pref] Oct 2 19:46:03.564178 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Oct 2 19:46:03.564219 kernel: pci 0000:00:01.0: bridge window [mem 0x95100000-0x952fffff] Oct 2 19:46:03.564261 kernel: pci 0000:00:01.0: bridge window [mem 0x90000000-0x93ffffff 64bit pref] Oct 2 19:46:03.564307 kernel: pci 0000:00:1b.0: PCI bridge to [bus 02] Oct 2 19:46:03.564389 kernel: pci 0000:00:1b.4: PCI bridge to [bus 03] Oct 2 19:46:03.564433 kernel: pci 0000:00:1b.4: bridge window [io 0x5000-0x5fff] Oct 2 19:46:03.564473 kernel: pci 0000:00:1b.4: bridge window [mem 0x95400000-0x954fffff] Oct 2 19:46:03.564515 kernel: pci 0000:00:1b.5: PCI bridge to [bus 04] Oct 2 19:46:03.564556 kernel: pci 0000:00:1b.5: bridge window [io 0x4000-0x4fff] Oct 2 19:46:03.564597 kernel: pci 0000:00:1b.5: bridge window [mem 0x95300000-0x953fffff] Oct 2 19:46:03.564638 kernel: pci 0000:00:1c.0: PCI bridge to [bus 05] Oct 2 19:46:03.564680 kernel: pci 0000:06:00.0: PCI bridge to [bus 07] Oct 2 19:46:03.564722 kernel: pci 0000:06:00.0: bridge window [io 0x3000-0x3fff] Oct 2 19:46:03.564766 kernel: pci 0000:06:00.0: bridge window [mem 0x94000000-0x950fffff] Oct 2 19:46:03.564808 kernel: pci 0000:00:1c.3: PCI bridge to [bus 06-07] Oct 2 19:46:03.564849 kernel: pci 0000:00:1c.3: bridge window [io 0x3000-0x3fff] Oct 2 19:46:03.564892 kernel: pci 0000:00:1c.3: bridge window [mem 0x94000000-0x950fffff] Oct 2 19:46:03.564928 kernel: pci_bus 0000:00: Some PCI device resources are unassigned, try booting with pci=realloc Oct 2 19:46:03.564965 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Oct 2 19:46:03.565001 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Oct 2 19:46:03.565036 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Oct 2 19:46:03.565074 kernel: pci_bus 0000:00: resource 7 [mem 0x90000000-0xdfffffff window] Oct 2 19:46:03.565110 kernel: pci_bus 0000:00: resource 8 [mem 0xfc800000-0xfe7fffff window] Oct 2 19:46:03.565152 kernel: pci_bus 0000:01: resource 1 [mem 0x95100000-0x952fffff] Oct 2 19:46:03.565191 kernel: pci_bus 0000:01: resource 2 [mem 0x90000000-0x93ffffff 64bit pref] Oct 2 19:46:03.565232 kernel: pci_bus 0000:03: resource 0 [io 0x5000-0x5fff] Oct 2 19:46:03.565270 kernel: pci_bus 0000:03: resource 1 [mem 0x95400000-0x954fffff] Oct 2 19:46:03.565313 kernel: pci_bus 0000:04: resource 0 [io 0x4000-0x4fff] Oct 2 19:46:03.565399 kernel: pci_bus 0000:04: resource 1 [mem 0x95300000-0x953fffff] Oct 2 19:46:03.565443 kernel: pci_bus 0000:06: resource 0 [io 0x3000-0x3fff] Oct 2 19:46:03.565482 kernel: pci_bus 0000:06: resource 1 [mem 0x94000000-0x950fffff] Oct 2 19:46:03.565522 kernel: pci_bus 0000:07: resource 0 [io 0x3000-0x3fff] Oct 2 19:46:03.565562 kernel: pci_bus 0000:07: resource 1 [mem 0x94000000-0x950fffff] Oct 2 19:46:03.565570 kernel: PCI: CLS 64 bytes, default 64 Oct 2 19:46:03.565575 kernel: DMAR: No ATSR found Oct 2 19:46:03.565582 kernel: DMAR: No SATC found Oct 2 19:46:03.565587 kernel: DMAR: dmar0: Using Queued invalidation Oct 2 19:46:03.565628 kernel: pci 0000:00:00.0: Adding to iommu group 0 Oct 2 19:46:03.565670 kernel: pci 0000:00:01.0: Adding to iommu group 1 Oct 2 19:46:03.565712 kernel: pci 0000:00:08.0: Adding to iommu group 2 Oct 2 19:46:03.565752 kernel: pci 0000:00:12.0: Adding to iommu group 3 Oct 2 19:46:03.565794 kernel: pci 0000:00:14.0: Adding to iommu group 4 Oct 2 19:46:03.565835 kernel: pci 0000:00:14.2: Adding to iommu group 4 Oct 2 19:46:03.565878 kernel: pci 0000:00:14.5: Adding to iommu group 4 Oct 2 19:46:03.565918 kernel: pci 0000:00:15.0: Adding to iommu group 5 Oct 2 19:46:03.565959 kernel: pci 0000:00:15.1: Adding to iommu group 5 Oct 2 19:46:03.565999 kernel: pci 0000:00:16.0: Adding to iommu group 6 Oct 2 19:46:03.566039 kernel: pci 0000:00:16.1: Adding to iommu group 6 Oct 2 19:46:03.566079 kernel: pci 0000:00:16.4: Adding to iommu group 6 Oct 2 19:46:03.566120 kernel: pci 0000:00:17.0: Adding to iommu group 7 Oct 2 19:46:03.566161 kernel: pci 0000:00:1b.0: Adding to iommu group 8 Oct 2 19:46:03.566203 kernel: pci 0000:00:1b.4: Adding to iommu group 9 Oct 2 19:46:03.566246 kernel: pci 0000:00:1b.5: Adding to iommu group 10 Oct 2 19:46:03.566287 kernel: pci 0000:00:1c.0: Adding to iommu group 11 Oct 2 19:46:03.566354 kernel: pci 0000:00:1c.3: Adding to iommu group 12 Oct 2 19:46:03.566414 kernel: pci 0000:00:1e.0: Adding to iommu group 13 Oct 2 19:46:03.566455 kernel: pci 0000:00:1f.0: Adding to iommu group 14 Oct 2 19:46:03.566496 kernel: pci 0000:00:1f.4: Adding to iommu group 14 Oct 2 19:46:03.566537 kernel: pci 0000:00:1f.5: Adding to iommu group 14 Oct 2 19:46:03.566579 kernel: pci 0000:01:00.0: Adding to iommu group 1 Oct 2 19:46:03.566623 kernel: pci 0000:01:00.1: Adding to iommu group 1 Oct 2 19:46:03.566666 kernel: pci 0000:03:00.0: Adding to iommu group 15 Oct 2 19:46:03.566709 kernel: pci 0000:04:00.0: Adding to iommu group 16 Oct 2 19:46:03.566752 kernel: pci 0000:06:00.0: Adding to iommu group 17 Oct 2 19:46:03.566796 kernel: pci 0000:07:00.0: Adding to iommu group 17 Oct 2 19:46:03.566803 kernel: DMAR: Intel(R) Virtualization Technology for Directed I/O Oct 2 19:46:03.566809 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Oct 2 19:46:03.566816 kernel: software IO TLB: mapped [mem 0x0000000086f89000-0x000000008af89000] (64MB) Oct 2 19:46:03.566821 kernel: RAPL PMU: API unit is 2^-32 Joules, 3 fixed counters, 655360 ms ovfl timer Oct 2 19:46:03.566826 kernel: RAPL PMU: hw unit of domain pp0-core 2^-14 Joules Oct 2 19:46:03.566831 kernel: RAPL PMU: hw unit of domain package 2^-14 Joules Oct 2 19:46:03.566837 kernel: RAPL PMU: hw unit of domain dram 2^-14 Joules Oct 2 19:46:03.566881 kernel: platform rtc_cmos: registered platform RTC device (no PNP device found) Oct 2 19:46:03.566889 kernel: Initialise system trusted keyrings Oct 2 19:46:03.566894 kernel: workingset: timestamp_bits=39 max_order=23 bucket_order=0 Oct 2 19:46:03.566901 kernel: Key type asymmetric registered Oct 2 19:46:03.566906 kernel: Asymmetric key parser 'x509' registered Oct 2 19:46:03.566911 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Oct 2 19:46:03.566916 kernel: io scheduler mq-deadline registered Oct 2 19:46:03.566922 kernel: io scheduler kyber registered Oct 2 19:46:03.566927 kernel: io scheduler bfq registered Oct 2 19:46:03.566967 kernel: pcieport 0000:00:01.0: PME: Signaling with IRQ 121 Oct 2 19:46:03.567009 kernel: pcieport 0000:00:1b.0: PME: Signaling with IRQ 122 Oct 2 19:46:03.567050 kernel: pcieport 0000:00:1b.4: PME: Signaling with IRQ 123 Oct 2 19:46:03.567094 kernel: pcieport 0000:00:1b.5: PME: Signaling with IRQ 124 Oct 2 19:46:03.567136 kernel: pcieport 0000:00:1c.0: PME: Signaling with IRQ 125 Oct 2 19:46:03.567177 kernel: pcieport 0000:00:1c.3: PME: Signaling with IRQ 126 Oct 2 19:46:03.567222 kernel: thermal LNXTHERM:00: registered as thermal_zone0 Oct 2 19:46:03.567230 kernel: ACPI: thermal: Thermal Zone [TZ00] (28 C) Oct 2 19:46:03.567236 kernel: ERST: Error Record Serialization Table (ERST) support is initialized. Oct 2 19:46:03.567241 kernel: pstore: Registered erst as persistent store backend Oct 2 19:46:03.567246 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Oct 2 19:46:03.567253 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Oct 2 19:46:03.567258 kernel: 00:02: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Oct 2 19:46:03.567264 kernel: 00:03: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A Oct 2 19:46:03.567269 kernel: hpet_acpi_add: no address or irqs in _CRS Oct 2 19:46:03.567312 kernel: tpm_tis MSFT0101:00: 2.0 TPM (device-id 0x1B, rev-id 16) Oct 2 19:46:03.567343 kernel: i8042: PNP: No PS/2 controller found. Oct 2 19:46:03.567401 kernel: rtc_cmos rtc_cmos: RTC can wake from S4 Oct 2 19:46:03.567439 kernel: rtc_cmos rtc_cmos: registered as rtc0 Oct 2 19:46:03.567478 kernel: rtc_cmos rtc_cmos: setting system clock to 2023-10-02T19:46:02 UTC (1696275962) Oct 2 19:46:03.567516 kernel: rtc_cmos rtc_cmos: alarms up to one month, y3k, 114 bytes nvram Oct 2 19:46:03.567523 kernel: fail to initialize ptp_kvm Oct 2 19:46:03.567529 kernel: intel_pstate: Intel P-state driver initializing Oct 2 19:46:03.567534 kernel: intel_pstate: Disabling energy efficiency optimization Oct 2 19:46:03.567539 kernel: intel_pstate: HWP enabled Oct 2 19:46:03.567545 kernel: vesafb: mode is 1024x768x8, linelength=1024, pages=0 Oct 2 19:46:03.567550 kernel: vesafb: scrolling: redraw Oct 2 19:46:03.567556 kernel: vesafb: Pseudocolor: size=0:8:8:8, shift=0:0:0:0 Oct 2 19:46:03.567562 kernel: vesafb: framebuffer at 0x94000000, mapped to 0x000000009b686ac1, using 768k, total 768k Oct 2 19:46:03.567567 kernel: Console: switching to colour frame buffer device 128x48 Oct 2 19:46:03.567572 kernel: fb0: VESA VGA frame buffer device Oct 2 19:46:03.567577 kernel: NET: Registered PF_INET6 protocol family Oct 2 19:46:03.567583 kernel: Segment Routing with IPv6 Oct 2 19:46:03.567588 kernel: In-situ OAM (IOAM) with IPv6 Oct 2 19:46:03.567593 kernel: NET: Registered PF_PACKET protocol family Oct 2 19:46:03.567598 kernel: Key type dns_resolver registered Oct 2 19:46:03.567604 kernel: microcode: sig=0x906ed, pf=0x2, revision=0xf4 Oct 2 19:46:03.567609 kernel: microcode: Microcode Update Driver: v2.2. Oct 2 19:46:03.567615 kernel: IPI shorthand broadcast: enabled Oct 2 19:46:03.567620 kernel: sched_clock: Marking stable (1688755602, 1338939247)->(4456358031, -1428663182) Oct 2 19:46:03.567625 kernel: registered taskstats version 1 Oct 2 19:46:03.567630 kernel: Loading compiled-in X.509 certificates Oct 2 19:46:03.567635 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.132-flatcar: 6f9e51af8b3ef67eb6e93ecfe77d55665ad3d861' Oct 2 19:46:03.567641 kernel: Key type .fscrypt registered Oct 2 19:46:03.567646 kernel: Key type fscrypt-provisioning registered Oct 2 19:46:03.567652 kernel: pstore: Using crash dump compression: deflate Oct 2 19:46:03.567657 kernel: ima: Allocated hash algorithm: sha1 Oct 2 19:46:03.567662 kernel: ima: No architecture policies found Oct 2 19:46:03.567667 kernel: Freeing unused kernel image (initmem) memory: 45372K Oct 2 19:46:03.567673 kernel: Write protecting the kernel read-only data: 28672k Oct 2 19:46:03.567678 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Oct 2 19:46:03.567683 kernel: Freeing unused kernel image (rodata/data gap) memory: 644K Oct 2 19:46:03.567688 kernel: Run /init as init process Oct 2 19:46:03.567693 kernel: with arguments: Oct 2 19:46:03.567700 kernel: /init Oct 2 19:46:03.567705 kernel: with environment: Oct 2 19:46:03.567710 kernel: HOME=/ Oct 2 19:46:03.567715 kernel: TERM=linux Oct 2 19:46:03.567720 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Oct 2 19:46:03.567726 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Oct 2 19:46:03.567733 systemd[1]: Detected architecture x86-64. Oct 2 19:46:03.567740 systemd[1]: Running in initrd. Oct 2 19:46:03.567745 systemd[1]: No hostname configured, using default hostname. Oct 2 19:46:03.567750 systemd[1]: Hostname set to . Oct 2 19:46:03.567755 systemd[1]: Initializing machine ID from random generator. Oct 2 19:46:03.567761 systemd[1]: Queued start job for default target initrd.target. Oct 2 19:46:03.567766 systemd[1]: Started systemd-ask-password-console.path. Oct 2 19:46:03.567772 systemd[1]: Reached target cryptsetup.target. Oct 2 19:46:03.567777 systemd[1]: Reached target paths.target. Oct 2 19:46:03.567782 systemd[1]: Reached target slices.target. Oct 2 19:46:03.567788 systemd[1]: Reached target swap.target. Oct 2 19:46:03.567793 systemd[1]: Reached target timers.target. Oct 2 19:46:03.567799 systemd[1]: Listening on iscsid.socket. Oct 2 19:46:03.567805 systemd[1]: Listening on iscsiuio.socket. Oct 2 19:46:03.567810 systemd[1]: Listening on systemd-journald-audit.socket. Oct 2 19:46:03.567815 systemd[1]: Listening on systemd-journald-dev-log.socket. Oct 2 19:46:03.567821 systemd[1]: Listening on systemd-journald.socket. Oct 2 19:46:03.567827 kernel: tsc: Refined TSC clocksource calibration: 3407.998 MHz Oct 2 19:46:03.567833 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x311fd208cfc, max_idle_ns: 440795283699 ns Oct 2 19:46:03.567838 kernel: clocksource: Switched to clocksource tsc Oct 2 19:46:03.567843 systemd[1]: Listening on systemd-networkd.socket. Oct 2 19:46:03.567849 systemd[1]: Listening on systemd-udevd-control.socket. Oct 2 19:46:03.567854 systemd[1]: Listening on systemd-udevd-kernel.socket. Oct 2 19:46:03.567859 systemd[1]: Reached target sockets.target. Oct 2 19:46:03.567865 systemd[1]: Starting kmod-static-nodes.service... Oct 2 19:46:03.567870 systemd[1]: Finished network-cleanup.service. Oct 2 19:46:03.567876 systemd[1]: Starting systemd-fsck-usr.service... Oct 2 19:46:03.567882 systemd[1]: Starting systemd-journald.service... Oct 2 19:46:03.567887 systemd[1]: Starting systemd-modules-load.service... Oct 2 19:46:03.567894 systemd-journald[268]: Journal started Oct 2 19:46:03.567920 systemd-journald[268]: Runtime Journal (/run/log/journal/4ed12b1023cf45c99bf69727a8719a04) is 8.0M, max 640.0M, 632.0M free. Oct 2 19:46:03.571092 systemd-modules-load[269]: Inserted module 'overlay' Oct 2 19:46:03.576000 audit: BPF prog-id=6 op=LOAD Oct 2 19:46:03.595533 kernel: audit: type=1334 audit(1696275963.576:2): prog-id=6 op=LOAD Oct 2 19:46:03.595547 systemd[1]: Starting systemd-resolved.service... Oct 2 19:46:03.644358 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Oct 2 19:46:03.644374 systemd[1]: Starting systemd-vconsole-setup.service... Oct 2 19:46:03.674304 kernel: Bridge firewalling registered Oct 2 19:46:03.674320 systemd[1]: Started systemd-journald.service. Oct 2 19:46:03.688954 systemd-modules-load[269]: Inserted module 'br_netfilter' Oct 2 19:46:03.737275 kernel: audit: type=1130 audit(1696275963.696:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:03.696000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:03.694844 systemd-resolved[271]: Positive Trust Anchors: Oct 2 19:46:03.812248 kernel: SCSI subsystem initialized Oct 2 19:46:03.812261 kernel: audit: type=1130 audit(1696275963.748:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:03.812269 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Oct 2 19:46:03.748000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:03.694850 systemd-resolved[271]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Oct 2 19:46:03.912109 kernel: device-mapper: uevent: version 1.0.3 Oct 2 19:46:03.912125 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Oct 2 19:46:03.912144 kernel: audit: type=1130 audit(1696275963.868:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:03.868000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:03.694869 systemd-resolved[271]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Oct 2 19:46:03.986562 kernel: audit: type=1130 audit(1696275963.919:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:03.919000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:03.696428 systemd-resolved[271]: Defaulting to hostname 'linux'. Oct 2 19:46:03.994000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:03.697520 systemd[1]: Started systemd-resolved.service. Oct 2 19:46:04.094174 kernel: audit: type=1130 audit(1696275963.994:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:04.094205 kernel: audit: type=1130 audit(1696275964.047:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:04.047000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:03.749491 systemd[1]: Finished kmod-static-nodes.service. Oct 2 19:46:03.869853 systemd[1]: Finished systemd-fsck-usr.service. Oct 2 19:46:03.912519 systemd-modules-load[269]: Inserted module 'dm_multipath' Oct 2 19:46:03.920472 systemd[1]: Finished systemd-modules-load.service. Oct 2 19:46:03.995679 systemd[1]: Finished systemd-vconsole-setup.service. Oct 2 19:46:04.048601 systemd[1]: Reached target nss-lookup.target. Oct 2 19:46:04.102921 systemd[1]: Starting dracut-cmdline-ask.service... Oct 2 19:46:04.123876 systemd[1]: Starting systemd-sysctl.service... Oct 2 19:46:04.124173 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Oct 2 19:46:04.127039 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Oct 2 19:46:04.125000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:04.127815 systemd[1]: Finished systemd-sysctl.service. Oct 2 19:46:04.176522 kernel: audit: type=1130 audit(1696275964.125:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:04.189000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:04.190662 systemd[1]: Finished dracut-cmdline-ask.service. Oct 2 19:46:04.257345 kernel: audit: type=1130 audit(1696275964.189:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:04.247000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:04.248919 systemd[1]: Starting dracut-cmdline.service... Oct 2 19:46:04.272403 dracut-cmdline[294]: dracut-dracut-053 Oct 2 19:46:04.272403 dracut-cmdline[294]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LA Oct 2 19:46:04.272403 dracut-cmdline[294]: BEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.first_boot=detected flatcar.oem.id=packet flatcar.autologin verity.usrhash=96b0fdb9f11bf1422adc9955c78c8182df387766badfd0b94e08fb9688739ee1 Oct 2 19:46:04.371395 kernel: Loading iSCSI transport class v2.0-870. Oct 2 19:46:04.371410 kernel: iscsi: registered transport (tcp) Oct 2 19:46:04.371418 kernel: iscsi: registered transport (qla4xxx) Oct 2 19:46:04.390740 kernel: QLogic iSCSI HBA Driver Oct 2 19:46:04.406601 systemd[1]: Finished dracut-cmdline.service. Oct 2 19:46:04.414000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:04.416011 systemd[1]: Starting dracut-pre-udev.service... Oct 2 19:46:04.472385 kernel: raid6: avx2x4 gen() 47979 MB/s Oct 2 19:46:04.508387 kernel: raid6: avx2x4 xor() 20656 MB/s Oct 2 19:46:04.544379 kernel: raid6: avx2x2 gen() 52316 MB/s Oct 2 19:46:04.578336 kernel: raid6: avx2x2 xor() 32158 MB/s Oct 2 19:46:04.612336 kernel: raid6: avx2x1 gen() 45024 MB/s Oct 2 19:46:04.646385 kernel: raid6: avx2x1 xor() 27891 MB/s Oct 2 19:46:04.680341 kernel: raid6: sse2x4 gen() 21360 MB/s Oct 2 19:46:04.714383 kernel: raid6: sse2x4 xor() 11970 MB/s Oct 2 19:46:04.748383 kernel: raid6: sse2x2 gen() 21673 MB/s Oct 2 19:46:04.782384 kernel: raid6: sse2x2 xor() 13431 MB/s Oct 2 19:46:04.816383 kernel: raid6: sse2x1 gen() 18310 MB/s Oct 2 19:46:04.867895 kernel: raid6: sse2x1 xor() 8896 MB/s Oct 2 19:46:04.867910 kernel: raid6: using algorithm avx2x2 gen() 52316 MB/s Oct 2 19:46:04.867918 kernel: raid6: .... xor() 32158 MB/s, rmw enabled Oct 2 19:46:04.885946 kernel: raid6: using avx2x2 recovery algorithm Oct 2 19:46:04.931333 kernel: xor: automatically using best checksumming function avx Oct 2 19:46:05.010358 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Oct 2 19:46:05.014872 systemd[1]: Finished dracut-pre-udev.service. Oct 2 19:46:05.023000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:05.023000 audit: BPF prog-id=7 op=LOAD Oct 2 19:46:05.023000 audit: BPF prog-id=8 op=LOAD Oct 2 19:46:05.025328 systemd[1]: Starting systemd-udevd.service... Oct 2 19:46:05.032999 systemd-udevd[476]: Using default interface naming scheme 'v252'. Oct 2 19:46:05.054000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:05.038446 systemd[1]: Started systemd-udevd.service. Oct 2 19:46:05.081429 dracut-pre-trigger[488]: rd.md=0: removing MD RAID activation Oct 2 19:46:05.056022 systemd[1]: Starting dracut-pre-trigger.service... Oct 2 19:46:05.097000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:05.086853 systemd[1]: Finished dracut-pre-trigger.service. Oct 2 19:46:05.099772 systemd[1]: Starting systemd-udev-trigger.service... Oct 2 19:46:05.151559 systemd[1]: Finished systemd-udev-trigger.service. Oct 2 19:46:05.150000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:05.177310 kernel: cryptd: max_cpu_qlen set to 1000 Oct 2 19:46:05.213917 kernel: ACPI: bus type USB registered Oct 2 19:46:05.213959 kernel: usbcore: registered new interface driver usbfs Oct 2 19:46:05.213969 kernel: usbcore: registered new interface driver hub Oct 2 19:46:05.231970 kernel: usbcore: registered new device driver usb Oct 2 19:46:05.257310 kernel: sdhci: Secure Digital Host Controller Interface driver Oct 2 19:46:05.257351 kernel: AVX2 version of gcm_enc/dec engaged. Oct 2 19:46:05.257364 kernel: igb: Intel(R) Gigabit Ethernet Network Driver Oct 2 19:46:05.257375 kernel: igb: Copyright (c) 2007-2014 Intel Corporation. Oct 2 19:46:05.257386 kernel: libata version 3.00 loaded. Oct 2 19:46:05.291814 kernel: sdhci: Copyright(c) Pierre Ossman Oct 2 19:46:05.309361 kernel: pps pps0: new PPS source ptp0 Oct 2 19:46:05.355737 kernel: mlx5_core 0000:01:00.0: firmware version: 14.28.2006 Oct 2 19:46:05.355827 kernel: igb 0000:03:00.0: added PHC on eth0 Oct 2 19:46:05.355894 kernel: mlx5_core 0000:01:00.0: 63.008 Gb/s available PCIe bandwidth (8.0 GT/s PCIe x8 link) Oct 2 19:46:05.388303 kernel: igb 0000:03:00.0: Intel(R) Gigabit Ethernet Network Connection Oct 2 19:46:05.407305 kernel: AES CTR mode by8 optimization enabled Oct 2 19:46:05.456385 kernel: igb 0000:03:00.0: eth0: (PCIe:2.5Gb/s:Width x1) 3c:ec:ef:70:d6:b8 Oct 2 19:46:05.456475 kernel: igb 0000:03:00.0: eth0: PBA No: 010000-000 Oct 2 19:46:05.488450 kernel: igb 0000:03:00.0: Using MSI-X interrupts. 4 rx queue(s), 4 tx queue(s) Oct 2 19:46:05.521590 kernel: xhci_hcd 0000:00:14.0: xHCI Host Controller Oct 2 19:46:05.521694 kernel: xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 1 Oct 2 19:46:05.522303 kernel: ahci 0000:00:17.0: version 3.0 Oct 2 19:46:05.522370 kernel: sdhci-pci 0000:00:14.5: SDHCI controller found [8086:a375] (rev 10) Oct 2 19:46:05.528303 kernel: xhci_hcd 0000:00:14.0: hcc params 0x200077c1 hci version 0x110 quirks 0x0000000000009810 Oct 2 19:46:05.528371 kernel: pps pps1: new PPS source ptp1 Oct 2 19:46:05.528441 kernel: igb 0000:04:00.0: added PHC on eth1 Oct 2 19:46:05.528506 kernel: igb 0000:04:00.0: Intel(R) Gigabit Ethernet Network Connection Oct 2 19:46:05.528566 kernel: igb 0000:04:00.0: eth1: (PCIe:2.5Gb/s:Width x1) 3c:ec:ef:70:d6:b9 Oct 2 19:46:05.528625 kernel: igb 0000:04:00.0: eth1: PBA No: 010000-000 Oct 2 19:46:05.528684 kernel: igb 0000:04:00.0: Using MSI-X interrupts. 4 rx queue(s), 4 tx queue(s) Oct 2 19:46:05.533357 kernel: ahci 0000:00:17.0: AHCI 0001.0301 32 slots 7 ports 6 Gbps 0x7f impl SATA mode Oct 2 19:46:05.533423 kernel: ahci 0000:00:17.0: flags: 64bit ncq sntf clo only pio slum part ems deso sadm sds apst Oct 2 19:46:05.552311 kernel: sdhci-pci 0000:00:14.5: SDHCI controller found [8086:a375] (rev 10) Oct 2 19:46:05.552525 kernel: scsi host0: ahci Oct 2 19:46:05.552738 kernel: scsi host1: ahci Oct 2 19:46:05.552951 kernel: scsi host2: ahci Oct 2 19:46:05.553156 kernel: scsi host3: ahci Oct 2 19:46:05.553371 kernel: scsi host4: ahci Oct 2 19:46:05.553574 kernel: scsi host5: ahci Oct 2 19:46:05.553775 kernel: scsi host6: ahci Oct 2 19:46:05.553987 kernel: ata1: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516100 irq 137 Oct 2 19:46:05.554009 kernel: ata2: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516180 irq 137 Oct 2 19:46:05.554023 kernel: ata3: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516200 irq 137 Oct 2 19:46:05.554037 kernel: ata4: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516280 irq 137 Oct 2 19:46:05.554051 kernel: ata5: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516300 irq 137 Oct 2 19:46:05.554067 kernel: ata6: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516380 irq 137 Oct 2 19:46:05.554085 kernel: ata7: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516400 irq 137 Oct 2 19:46:05.557361 kernel: xhci_hcd 0000:00:14.0: xHCI Host Controller Oct 2 19:46:05.557435 kernel: igb 0000:03:00.0 eno1: renamed from eth0 Oct 2 19:46:05.581127 kernel: sdhci-pci 0000:00:14.5: SDHCI controller found [8086:a375] (rev 10) Oct 2 19:46:05.581198 kernel: xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 2 Oct 2 19:46:05.672232 kernel: mlx5_core 0000:01:00.0: E-Switch: Total vports 10, per vport: max uc(1024) max mc(16384) Oct 2 19:46:05.672312 kernel: xhci_hcd 0000:00:14.0: Host supports USB 3.1 Enhanced SuperSpeed Oct 2 19:46:05.876306 kernel: ata3: SATA link down (SStatus 0 SControl 300) Oct 2 19:46:05.876323 kernel: hub 1-0:1.0: USB hub found Oct 2 19:46:05.889335 kernel: ata6: SATA link down (SStatus 0 SControl 300) Oct 2 19:46:05.902345 kernel: hub 1-0:1.0: 16 ports detected Oct 2 19:46:05.917354 kernel: ata7: SATA link down (SStatus 0 SControl 300) Oct 2 19:46:05.933354 kernel: sdhci-pci 0000:00:14.5: SDHCI controller found [8086:a375] (rev 10) Oct 2 19:46:05.933424 kernel: hub 2-0:1.0: USB hub found Oct 2 19:46:05.933486 kernel: hub 2-0:1.0: 10 ports detected Oct 2 19:46:05.933541 kernel: usb: port power management may be unreliable Oct 2 19:46:05.950366 kernel: ata4: SATA link down (SStatus 0 SControl 300) Oct 2 19:46:05.979376 kernel: sdhci-pci 0000:00:14.5: SDHCI controller found [8086:a375] (rev 10) Oct 2 19:46:05.979444 kernel: ata2: SATA link up 6.0 Gbps (SStatus 133 SControl 300) Oct 2 19:46:05.981353 kernel: igb 0000:04:00.0 eno2: renamed from eth1 Oct 2 19:46:06.143381 kernel: ata5: SATA link down (SStatus 0 SControl 300) Oct 2 19:46:06.156362 kernel: ata2.00: ATA-10: Micron_5200_MTFDDAK480TDN, D1MU020, max UDMA/133 Oct 2 19:46:06.172367 kernel: ata1: SATA link up 6.0 Gbps (SStatus 133 SControl 300) Oct 2 19:46:06.174341 kernel: mlx5_core 0000:01:00.0: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0) Oct 2 19:46:06.174417 kernel: usb 1-14: new high-speed USB device number 2 using xhci_hcd Oct 2 19:46:06.218363 kernel: ata1.00: ATA-10: Micron_5200_MTFDDAK480TDN, D1MU020, max UDMA/133 Oct 2 19:46:06.263332 kernel: ata2.00: 937703088 sectors, multi 16: LBA48 NCQ (depth 32), AA Oct 2 19:46:06.263349 kernel: ata2.00: Features: NCQ-prio Oct 2 19:46:06.292039 kernel: ata1.00: 937703088 sectors, multi 16: LBA48 NCQ (depth 32), AA Oct 2 19:46:06.292054 kernel: ata1.00: Features: NCQ-prio Oct 2 19:46:06.308363 kernel: ata2.00: configured for UDMA/133 Oct 2 19:46:06.308379 kernel: hub 1-14:1.0: USB hub found Oct 2 19:46:06.320387 kernel: ata1.00: configured for UDMA/133 Oct 2 19:46:06.320403 kernel: hub 1-14:1.0: 4 ports detected Oct 2 19:46:06.333359 kernel: scsi 0:0:0:0: Direct-Access ATA Micron_5200_MTFD U020 PQ: 0 ANSI: 5 Oct 2 19:46:06.345356 kernel: sdhci-pci 0000:00:14.5: SDHCI controller found [8086:a375] (rev 10) Oct 2 19:46:06.361360 kernel: scsi 1:0:0:0: Direct-Access ATA Micron_5200_MTFD U020 PQ: 0 ANSI: 5 Oct 2 19:46:06.413773 kernel: ata1.00: Enabling discard_zeroes_data Oct 2 19:46:06.413792 kernel: mlx5_core 0000:01:00.0: Supported tc offload range - chains: 4294967294, prios: 4294967295 Oct 2 19:46:06.413873 kernel: ata2.00: Enabling discard_zeroes_data Oct 2 19:46:06.413884 kernel: sd 0:0:0:0: [sda] 937703088 512-byte logical blocks: (480 GB/447 GiB) Oct 2 19:46:06.413949 kernel: sd 1:0:0:0: [sdb] 937703088 512-byte logical blocks: (480 GB/447 GiB) Oct 2 19:46:06.414014 kernel: sd 1:0:0:0: [sdb] 4096-byte physical blocks Oct 2 19:46:06.414071 kernel: sd 1:0:0:0: [sdb] Write Protect is off Oct 2 19:46:06.414124 kernel: sd 1:0:0:0: [sdb] Mode Sense: 00 3a 00 00 Oct 2 19:46:06.414177 kernel: sd 1:0:0:0: [sdb] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Oct 2 19:46:06.414229 kernel: ata2.00: Enabling discard_zeroes_data Oct 2 19:46:06.415350 kernel: ata2.00: Enabling discard_zeroes_data Oct 2 19:46:06.415367 kernel: sd 1:0:0:0: [sdb] Attached SCSI disk Oct 2 19:46:06.415437 kernel: sdhci-pci 0000:00:14.5: SDHCI controller found [8086:a375] (rev 10) Oct 2 19:46:06.442303 kernel: sdhci-pci 0000:00:14.5: SDHCI controller found [8086:a375] (rev 10) Oct 2 19:46:06.442429 kernel: mlx5_core 0000:01:00.1: firmware version: 14.28.2006 Oct 2 19:46:06.442515 kernel: mlx5_core 0000:01:00.1: 63.008 Gb/s available PCIe bandwidth (8.0 GT/s PCIe x8 link) Oct 2 19:46:06.464140 kernel: sd 0:0:0:0: [sda] 4096-byte physical blocks Oct 2 19:46:06.464246 kernel: sd 0:0:0:0: [sda] Write Protect is off Oct 2 19:46:06.496229 kernel: sdhci-pci 0000:00:14.5: SDHCI controller found [8086:a375] (rev 10) Oct 2 19:46:06.496339 kernel: sd 0:0:0:0: [sda] Mode Sense: 00 3a 00 00 Oct 2 19:46:06.645365 kernel: usb 1-14.1: new low-speed USB device number 3 using xhci_hcd Oct 2 19:46:06.645406 kernel: sd 0:0:0:0: [sda] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Oct 2 19:46:06.747324 kernel: mlx5_core 0000:01:00.1: E-Switch: Total vports 10, per vport: max uc(1024) max mc(16384) Oct 2 19:46:06.747413 kernel: ata1.00: Enabling discard_zeroes_data Oct 2 19:46:06.761944 kernel: port_module: 9 callbacks suppressed Oct 2 19:46:06.761985 kernel: mlx5_core 0000:01:00.1: Port module event: module 1, Cable plugged Oct 2 19:46:06.776621 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Oct 2 19:46:06.812019 kernel: mlx5_core 0000:01:00.1: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0) Oct 2 19:46:06.812135 kernel: GPT:9289727 != 937703087 Oct 2 19:46:06.863576 kernel: sdhci-pci 0000:00:14.5: SDHCI controller found [8086:a375] (rev 10) Oct 2 19:46:06.863693 kernel: GPT:Alternate GPT header not at the end of the disk. Oct 2 19:46:06.894638 kernel: GPT:9289727 != 937703087 Oct 2 19:46:06.894653 kernel: GPT: Use GNU Parted to correct GPT errors. Oct 2 19:46:06.894661 kernel: hid: raw HID events driver (C) Jiri Kosina Oct 2 19:46:06.910352 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Oct 2 19:46:06.956947 kernel: ata1.00: Enabling discard_zeroes_data Oct 2 19:46:06.956965 kernel: sd 0:0:0:0: [sda] Attached SCSI disk Oct 2 19:46:06.989956 kernel: sdhci-pci 0000:00:14.5: SDHCI controller found [8086:a375] (rev 10) Oct 2 19:46:06.990044 kernel: mlx5_core 0000:01:00.1: Supported tc offload range - chains: 4294967294, prios: 4294967295 Oct 2 19:46:07.038309 kernel: sdhci-pci 0000:00:14.5: SDHCI controller found [8086:a375] (rev 10) Oct 2 19:46:07.038411 kernel: usbcore: registered new interface driver usbhid Oct 2 19:46:07.038421 kernel: sdhci-pci 0000:00:14.5: SDHCI controller found [8086:a375] (rev 10) Oct 2 19:46:07.038474 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/sda6 scanned by (udev-worker) (529) Oct 2 19:46:07.038334 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Oct 2 19:46:07.143427 kernel: usbhid: USB HID core driver Oct 2 19:46:07.143439 kernel: mlx5_core 0000:01:00.0 enp1s0f0np0: renamed from eth0 Oct 2 19:46:07.143508 kernel: input: HID 0557:2419 as /devices/pci0000:00/0000:00:14.0/usb1/1-14/1-14.1/1-14.1:1.0/0003:0557:2419.0001/input/input0 Oct 2 19:46:07.115403 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Oct 2 19:46:07.178309 kernel: mlx5_core 0000:01:00.1 enp1s0f1np1: renamed from eth1 Oct 2 19:46:07.187536 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Oct 2 19:46:07.201327 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Oct 2 19:46:07.329698 kernel: hid-generic 0003:0557:2419.0001: input,hidraw0: USB HID v1.00 Keyboard [HID 0557:2419] on usb-0000:00:14.0-14.1/input0 Oct 2 19:46:07.329821 kernel: input: HID 0557:2419 as /devices/pci0000:00/0000:00:14.0/usb1/1-14/1-14.1/1-14.1:1.1/0003:0557:2419.0002/input/input1 Oct 2 19:46:07.329836 kernel: sdhci-pci 0000:00:14.5: SDHCI controller found [8086:a375] (rev 10) Oct 2 19:46:07.329898 kernel: hid-generic 0003:0557:2419.0002: input,hidraw1: USB HID v1.00 Mouse [HID 0557:2419] on usb-0000:00:14.0-14.1/input1 Oct 2 19:46:07.329965 kernel: sdhci-pci 0000:00:14.5: SDHCI controller found [8086:a375] (rev 10) Oct 2 19:46:07.350108 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Oct 2 19:46:07.370729 kernel: ata1.00: Enabling discard_zeroes_data Oct 2 19:46:07.361202 systemd[1]: Starting disk-uuid.service... Oct 2 19:46:07.415411 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Oct 2 19:46:07.415422 kernel: ata1.00: Enabling discard_zeroes_data Oct 2 19:46:07.415465 disk-uuid[682]: Primary Header is updated. Oct 2 19:46:07.415465 disk-uuid[682]: Secondary Entries is updated. Oct 2 19:46:07.415465 disk-uuid[682]: Secondary Header is updated. Oct 2 19:46:07.477398 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Oct 2 19:46:07.477408 kernel: ata1.00: Enabling discard_zeroes_data Oct 2 19:46:07.477417 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Oct 2 19:46:08.464190 kernel: ata1.00: Enabling discard_zeroes_data Oct 2 19:46:08.485080 disk-uuid[683]: The operation has completed successfully. Oct 2 19:46:08.493419 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Oct 2 19:46:08.518664 systemd[1]: disk-uuid.service: Deactivated successfully. Oct 2 19:46:08.524000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:08.518720 systemd[1]: Finished disk-uuid.service. Oct 2 19:46:08.634437 kernel: audit: type=1130 audit(1696275968.524:19): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:08.634451 kernel: audit: type=1131 audit(1696275968.524:20): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:08.634459 kernel: device-mapper: verity: sha256 using implementation "sha256-generic" Oct 2 19:46:08.524000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:08.553822 systemd[1]: Starting verity-setup.service... Oct 2 19:46:08.683677 systemd[1]: Found device dev-mapper-usr.device. Oct 2 19:46:08.693329 systemd[1]: Mounting sysusr-usr.mount... Oct 2 19:46:08.699565 systemd[1]: Finished verity-setup.service. Oct 2 19:46:08.717000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:08.768304 kernel: audit: type=1130 audit(1696275968.717:21): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:08.826303 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Oct 2 19:46:08.826462 systemd[1]: Mounted sysusr-usr.mount. Oct 2 19:46:08.833616 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Oct 2 19:46:08.926441 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Oct 2 19:46:08.926457 kernel: BTRFS info (device sda6): using free space tree Oct 2 19:46:08.926464 kernel: BTRFS info (device sda6): has skinny extents Oct 2 19:46:08.926471 kernel: BTRFS info (device sda6): enabling ssd optimizations Oct 2 19:46:08.834018 systemd[1]: Starting ignition-setup.service... Oct 2 19:46:08.853701 systemd[1]: Starting parse-ip-for-networkd.service... Oct 2 19:46:08.949000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:08.934662 systemd[1]: Finished ignition-setup.service. Oct 2 19:46:09.057477 kernel: audit: type=1130 audit(1696275968.949:22): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:09.057496 kernel: audit: type=1130 audit(1696275969.006:23): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:09.006000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:08.950664 systemd[1]: Finished parse-ip-for-networkd.service. Oct 2 19:46:09.090116 kernel: audit: type=1334 audit(1696275969.065:24): prog-id=9 op=LOAD Oct 2 19:46:09.065000 audit: BPF prog-id=9 op=LOAD Oct 2 19:46:09.007974 systemd[1]: Starting ignition-fetch-offline.service... Oct 2 19:46:09.067605 systemd[1]: Starting systemd-networkd.service... Oct 2 19:46:09.105287 systemd-networkd[865]: lo: Link UP Oct 2 19:46:09.119000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:09.155786 ignition[859]: Ignition 2.14.0 Oct 2 19:46:09.187596 kernel: audit: type=1130 audit(1696275969.119:25): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:09.105289 systemd-networkd[865]: lo: Gained carrier Oct 2 19:46:09.155790 ignition[859]: Stage: fetch-offline Oct 2 19:46:09.105574 systemd-networkd[865]: Enumeration completed Oct 2 19:46:09.211000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:09.155816 ignition[859]: reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 19:46:09.364442 kernel: audit: type=1130 audit(1696275969.211:26): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:09.364465 kernel: audit: type=1130 audit(1696275969.271:27): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:09.364475 kernel: mlx5_core 0000:01:00.1 enp1s0f1np1: Link up Oct 2 19:46:09.364571 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): enp1s0f1np1: link becomes ready Oct 2 19:46:09.271000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:09.105610 systemd[1]: Started systemd-networkd.service. Oct 2 19:46:09.155830 ignition[859]: parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Oct 2 19:46:09.106161 systemd-networkd[865]: enp1s0f1np1: Configuring with /usr/lib/systemd/network/zz-default.network. Oct 2 19:46:09.158868 ignition[859]: no config dir at "/usr/lib/ignition/base.platform.d/packet" Oct 2 19:46:09.413000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:09.120529 systemd[1]: Reached target network.target. Oct 2 19:46:09.438422 iscsid[893]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Oct 2 19:46:09.438422 iscsid[893]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Oct 2 19:46:09.438422 iscsid[893]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Oct 2 19:46:09.438422 iscsid[893]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Oct 2 19:46:09.438422 iscsid[893]: If using hardware iscsi like qla4xxx this message can be ignored. Oct 2 19:46:09.438422 iscsid[893]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Oct 2 19:46:09.438422 iscsid[893]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Oct 2 19:46:09.446000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:09.158933 ignition[859]: parsed url from cmdline: "" Oct 2 19:46:09.177180 unknown[859]: fetched base config from "system" Oct 2 19:46:09.606446 kernel: mlx5_core 0000:01:00.0 enp1s0f0np0: Link up Oct 2 19:46:09.592000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:09.158935 ignition[859]: no config URL provided Oct 2 19:46:09.177184 unknown[859]: fetched user config from "system" Oct 2 19:46:09.158937 ignition[859]: reading system config file "/usr/lib/ignition/user.ign" Oct 2 19:46:09.182001 systemd[1]: Starting iscsiuio.service... Oct 2 19:46:09.163845 ignition[859]: parsing config with SHA512: 0aaca6be24725719f75ec1fdb187061d81204fbaac8ef60533ecc43bf6a10dab4a5705a8ca19f9e7c54d7031173f12338f166d9e778d99253e35c547b58502f1 Oct 2 19:46:09.194585 systemd[1]: Started iscsiuio.service. Oct 2 19:46:09.177454 ignition[859]: fetch-offline: fetch-offline passed Oct 2 19:46:09.212603 systemd[1]: Finished ignition-fetch-offline.service. Oct 2 19:46:09.177457 ignition[859]: POST message to Packet Timeline Oct 2 19:46:09.272508 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). Oct 2 19:46:09.177461 ignition[859]: POST Status error: resource requires networking Oct 2 19:46:09.272961 systemd[1]: Starting ignition-kargs.service... Oct 2 19:46:09.177490 ignition[859]: Ignition finished successfully Oct 2 19:46:09.348707 systemd-networkd[865]: enp1s0f0np0: Configuring with /usr/lib/systemd/network/zz-default.network. Oct 2 19:46:09.351672 ignition[883]: Ignition 2.14.0 Oct 2 19:46:09.380096 systemd[1]: Starting iscsid.service... Oct 2 19:46:09.351676 ignition[883]: Stage: kargs Oct 2 19:46:09.394625 systemd[1]: Started iscsid.service. Oct 2 19:46:09.351731 ignition[883]: reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 19:46:09.414962 systemd[1]: Starting dracut-initqueue.service... Oct 2 19:46:09.351740 ignition[883]: parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Oct 2 19:46:09.431455 systemd[1]: Finished dracut-initqueue.service. Oct 2 19:46:09.352995 ignition[883]: no config dir at "/usr/lib/ignition/base.platform.d/packet" Oct 2 19:46:09.447512 systemd[1]: Reached target remote-fs-pre.target. Oct 2 19:46:09.354655 ignition[883]: kargs: kargs passed Oct 2 19:46:09.492499 systemd[1]: Reached target remote-cryptsetup.target. Oct 2 19:46:09.354659 ignition[883]: POST message to Packet Timeline Oct 2 19:46:09.527577 systemd[1]: Reached target remote-fs.target. Oct 2 19:46:09.354669 ignition[883]: GET https://metadata.packet.net/metadata: attempt #1 Oct 2 19:46:09.544179 systemd[1]: Starting dracut-pre-mount.service... Oct 2 19:46:09.356788 ignition[883]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:45584->[::1]:53: read: connection refused Oct 2 19:46:09.553724 systemd[1]: Finished dracut-pre-mount.service. Oct 2 19:46:09.557354 ignition[883]: GET https://metadata.packet.net/metadata: attempt #2 Oct 2 19:46:09.601282 systemd-networkd[865]: eno2: Configuring with /usr/lib/systemd/network/zz-default.network. Oct 2 19:46:09.557761 ignition[883]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:56187->[::1]:53: read: connection refused Oct 2 19:46:09.629652 systemd-networkd[865]: eno1: Configuring with /usr/lib/systemd/network/zz-default.network. Oct 2 19:46:09.660257 systemd-networkd[865]: enp1s0f1np1: Link UP Oct 2 19:46:09.660539 systemd-networkd[865]: enp1s0f1np1: Gained carrier Oct 2 19:46:09.671802 systemd-networkd[865]: enp1s0f0np0: Link UP Oct 2 19:46:09.672162 systemd-networkd[865]: eno2: Link UP Oct 2 19:46:09.672525 systemd-networkd[865]: eno1: Link UP Oct 2 19:46:09.957964 ignition[883]: GET https://metadata.packet.net/metadata: attempt #3 Oct 2 19:46:09.959024 ignition[883]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:58113->[::1]:53: read: connection refused Oct 2 19:46:10.433248 systemd-networkd[865]: enp1s0f0np0: Gained carrier Oct 2 19:46:10.442575 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): enp1s0f0np0: link becomes ready Oct 2 19:46:10.459538 systemd-networkd[865]: enp1s0f0np0: DHCPv4 address 145.40.82.213/31, gateway 145.40.82.212 acquired from 145.40.83.140 Oct 2 19:46:10.759567 ignition[883]: GET https://metadata.packet.net/metadata: attempt #4 Oct 2 19:46:10.760889 ignition[883]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:44363->[::1]:53: read: connection refused Oct 2 19:46:10.857784 systemd-networkd[865]: enp1s0f1np1: Gained IPv6LL Oct 2 19:46:11.945867 systemd-networkd[865]: enp1s0f0np0: Gained IPv6LL Oct 2 19:46:12.361451 ignition[883]: GET https://metadata.packet.net/metadata: attempt #5 Oct 2 19:46:12.362697 ignition[883]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:40910->[::1]:53: read: connection refused Oct 2 19:46:15.565298 ignition[883]: GET https://metadata.packet.net/metadata: attempt #6 Oct 2 19:46:15.598604 ignition[883]: GET result: OK Oct 2 19:46:15.758694 ignition[883]: Ignition finished successfully Oct 2 19:46:15.760609 systemd[1]: Finished ignition-kargs.service. Oct 2 19:46:15.851443 kernel: kauditd_printk_skb: 3 callbacks suppressed Oct 2 19:46:15.851461 kernel: audit: type=1130 audit(1696275975.773:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:15.773000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:15.782514 ignition[910]: Ignition 2.14.0 Oct 2 19:46:15.775858 systemd[1]: Starting ignition-disks.service... Oct 2 19:46:15.782517 ignition[910]: Stage: disks Oct 2 19:46:15.782571 ignition[910]: reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 19:46:15.782580 ignition[910]: parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Oct 2 19:46:15.784062 ignition[910]: no config dir at "/usr/lib/ignition/base.platform.d/packet" Oct 2 19:46:15.785379 ignition[910]: disks: disks passed Oct 2 19:46:15.785382 ignition[910]: POST message to Packet Timeline Oct 2 19:46:15.785392 ignition[910]: GET https://metadata.packet.net/metadata: attempt #1 Oct 2 19:46:15.807594 ignition[910]: GET result: OK Oct 2 19:46:15.977256 ignition[910]: Ignition finished successfully Oct 2 19:46:15.980113 systemd[1]: Finished ignition-disks.service. Oct 2 19:46:15.992000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:15.993929 systemd[1]: Reached target initrd-root-device.target. Oct 2 19:46:16.074525 kernel: audit: type=1130 audit(1696275975.992:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:16.066544 systemd[1]: Reached target local-fs-pre.target. Oct 2 19:46:16.082543 systemd[1]: Reached target local-fs.target. Oct 2 19:46:16.097498 systemd[1]: Reached target sysinit.target. Oct 2 19:46:16.110508 systemd[1]: Reached target basic.target. Oct 2 19:46:16.125779 systemd[1]: Starting systemd-fsck-root.service... Oct 2 19:46:16.162517 systemd-fsck[928]: ROOT: clean, 603/553520 files, 56012/553472 blocks Oct 2 19:46:16.174879 systemd[1]: Finished systemd-fsck-root.service. Oct 2 19:46:16.265973 kernel: audit: type=1130 audit(1696275976.183:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:16.265987 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Oct 2 19:46:16.183000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:16.189650 systemd[1]: Mounting sysroot.mount... Oct 2 19:46:16.274003 systemd[1]: Mounted sysroot.mount. Oct 2 19:46:16.287663 systemd[1]: Reached target initrd-root-fs.target. Oct 2 19:46:16.295259 systemd[1]: Mounting sysroot-usr.mount... Oct 2 19:46:16.309212 systemd[1]: Starting flatcar-metadata-hostname.service... Oct 2 19:46:16.328843 systemd[1]: Starting flatcar-static-network.service... Oct 2 19:46:16.345436 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Oct 2 19:46:16.345471 systemd[1]: Reached target ignition-diskful.target. Oct 2 19:46:16.362780 systemd[1]: Mounted sysroot-usr.mount. Oct 2 19:46:16.386159 systemd[1]: Mounting sysroot-usr-share-oem.mount... Oct 2 19:46:16.514922 kernel: BTRFS: device label OEM devid 1 transid 16 /dev/sda6 scanned by mount (941) Oct 2 19:46:16.514939 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Oct 2 19:46:16.514947 kernel: BTRFS info (device sda6): using free space tree Oct 2 19:46:16.514954 kernel: BTRFS info (device sda6): has skinny extents Oct 2 19:46:16.514961 kernel: BTRFS info (device sda6): enabling ssd optimizations Oct 2 19:46:16.515023 coreos-metadata[935]: Oct 02 19:46:16.438 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Oct 2 19:46:16.515023 coreos-metadata[935]: Oct 02 19:46:16.474 INFO Fetch successful Oct 2 19:46:16.515023 coreos-metadata[935]: Oct 02 19:46:16.492 INFO wrote hostname ci-3510.3.0-a-b66ea99ec2 to /sysroot/etc/hostname Oct 2 19:46:16.759933 kernel: audit: type=1130 audit(1696275976.522:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:16.760020 kernel: audit: type=1130 audit(1696275976.583:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:16.760029 kernel: audit: type=1130 audit(1696275976.646:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:16.760036 kernel: audit: type=1131 audit(1696275976.646:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:16.522000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:16.583000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:16.646000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:16.646000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:16.760114 coreos-metadata[936]: Oct 02 19:46:16.438 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Oct 2 19:46:16.760114 coreos-metadata[936]: Oct 02 19:46:16.460 INFO Fetch successful Oct 2 19:46:16.406140 systemd[1]: Starting initrd-setup-root.service... Oct 2 19:46:16.444605 systemd[1]: Finished initrd-setup-root.service. Oct 2 19:46:16.821548 initrd-setup-root[946]: cut: /sysroot/etc/passwd: No such file or directory Oct 2 19:46:16.524660 systemd[1]: Finished flatcar-metadata-hostname.service. Oct 2 19:46:16.840444 initrd-setup-root[954]: cut: /sysroot/etc/group: No such file or directory Oct 2 19:46:16.847000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:16.584628 systemd[1]: flatcar-static-network.service: Deactivated successfully. Oct 2 19:46:16.914545 kernel: audit: type=1130 audit(1696275976.847:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:16.914560 initrd-setup-root[962]: cut: /sysroot/etc/shadow: No such file or directory Oct 2 19:46:16.924519 ignition[1010]: INFO : Ignition 2.14.0 Oct 2 19:46:16.924519 ignition[1010]: INFO : Stage: mount Oct 2 19:46:16.924519 ignition[1010]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 19:46:16.924519 ignition[1010]: DEBUG : parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Oct 2 19:46:16.924519 ignition[1010]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/packet" Oct 2 19:46:16.924519 ignition[1010]: INFO : mount: mount passed Oct 2 19:46:16.924519 ignition[1010]: INFO : POST message to Packet Timeline Oct 2 19:46:16.924519 ignition[1010]: INFO : GET https://metadata.packet.net/metadata: attempt #1 Oct 2 19:46:16.924519 ignition[1010]: INFO : GET result: OK Oct 2 19:46:16.584667 systemd[1]: Finished flatcar-static-network.service. Oct 2 19:46:17.023694 initrd-setup-root[970]: cut: /sysroot/etc/gshadow: No such file or directory Oct 2 19:46:17.099305 kernel: audit: type=1130 audit(1696275977.030:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:17.030000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:17.099433 ignition[1010]: INFO : Ignition finished successfully Oct 2 19:46:16.647584 systemd[1]: Mounted sysroot-usr-share-oem.mount. Oct 2 19:46:16.768895 systemd[1]: Starting ignition-mount.service... Oct 2 19:46:16.784325 systemd[1]: Starting sysroot-boot.service... Oct 2 19:46:17.208381 kernel: BTRFS: device label OEM devid 1 transid 17 /dev/sda6 scanned by mount (1026) Oct 2 19:46:17.208392 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Oct 2 19:46:17.208399 kernel: BTRFS info (device sda6): using free space tree Oct 2 19:46:17.208406 kernel: BTRFS info (device sda6): has skinny extents Oct 2 19:46:17.208415 kernel: BTRFS info (device sda6): enabling ssd optimizations Oct 2 19:46:16.807630 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Oct 2 19:46:16.807853 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Oct 2 19:46:16.837661 systemd[1]: Finished sysroot-boot.service. Oct 2 19:46:17.020627 systemd[1]: Finished ignition-mount.service. Oct 2 19:46:17.280515 ignition[1045]: INFO : Ignition 2.14.0 Oct 2 19:46:17.280515 ignition[1045]: INFO : Stage: files Oct 2 19:46:17.280515 ignition[1045]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 19:46:17.280515 ignition[1045]: DEBUG : parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Oct 2 19:46:17.280515 ignition[1045]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/packet" Oct 2 19:46:17.280515 ignition[1045]: DEBUG : files: compiled without relabeling support, skipping Oct 2 19:46:17.280515 ignition[1045]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Oct 2 19:46:17.280515 ignition[1045]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Oct 2 19:46:17.280515 ignition[1045]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Oct 2 19:46:17.280515 ignition[1045]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Oct 2 19:46:17.280515 ignition[1045]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Oct 2 19:46:17.280515 ignition[1045]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.1.1.tgz" Oct 2 19:46:17.280515 ignition[1045]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://github.com/containernetworking/plugins/releases/download/v1.1.1/cni-plugins-linux-amd64-v1.1.1.tgz: attempt #1 Oct 2 19:46:17.033460 systemd[1]: Starting ignition-files.service... Oct 2 19:46:17.108269 systemd[1]: Mounting sysroot-usr-share-oem.mount... Oct 2 19:46:17.240855 systemd[1]: Mounted sysroot-usr-share-oem.mount. Oct 2 19:46:17.277978 unknown[1045]: wrote ssh authorized keys file for user: core Oct 2 19:46:17.482582 ignition[1045]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Oct 2 19:46:17.589768 ignition[1045]: DEBUG : files: createFilesystemsFiles: createFiles: op(3): file matches expected sum of: 4d0ed0abb5951b9cf83cba938ef84bdc5b681f4ac869da8143974f6a53a3ff30c666389fa462b9d14d30af09bf03f6cdf77598c572f8fb3ea00cecdda467a48d Oct 2 19:46:17.589768 ignition[1045]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.1.1.tgz" Oct 2 19:46:17.633540 ignition[1045]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/opt/crictl-v1.26.0-linux-amd64.tar.gz" Oct 2 19:46:17.633540 ignition[1045]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.26.0/crictl-v1.26.0-linux-amd64.tar.gz: attempt #1 Oct 2 19:46:17.822629 ignition[1045]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET result: OK Oct 2 19:46:17.871757 ignition[1045]: DEBUG : files: createFilesystemsFiles: createFiles: op(4): file matches expected sum of: a3a2c02a90b008686c20babaf272e703924db2a3e2a0d4e2a7c81d994cbc68c47458a4a354ecc243af095b390815c7f203348b9749351ae817bd52a522300449 Oct 2 19:46:17.896561 ignition[1045]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/crictl-v1.26.0-linux-amd64.tar.gz" Oct 2 19:46:17.896561 ignition[1045]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/opt/bin/kubeadm" Oct 2 19:46:17.896561 ignition[1045]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET https://storage.googleapis.com/kubernetes-release/release/v1.26.5/bin/linux/amd64/kubeadm: attempt #1 Oct 2 19:46:17.996934 ignition[1045]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET result: OK Oct 2 19:46:18.405236 ignition[1045]: DEBUG : files: createFilesystemsFiles: createFiles: op(5): file matches expected sum of: 1c324cd645a7bf93d19d24c87498d9a17878eb1cc927e2680200ffeab2f85051ddec47d85b79b8e774042dc6726299ad3d7caf52c060701f00deba30dc33f660 Oct 2 19:46:18.429614 ignition[1045]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/opt/bin/kubeadm" Oct 2 19:46:18.429614 ignition[1045]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/bin/kubelet" Oct 2 19:46:18.429614 ignition[1045]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://storage.googleapis.com/kubernetes-release/release/v1.26.5/bin/linux/amd64/kubelet: attempt #1 Oct 2 19:46:18.481426 ignition[1045]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK Oct 2 19:46:19.160234 ignition[1045]: DEBUG : files: createFilesystemsFiles: createFiles: op(6): file matches expected sum of: 40daf2a9b9e666c14b10e627da931bd79978628b1f23ef6429c1cb4fcba261f86ccff440c0dbb0070ee760fe55772b4fd279c4582dfbb17fa30bc94b7f00126b Oct 2 19:46:19.184724 ignition[1045]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/bin/kubelet" Oct 2 19:46:19.184724 ignition[1045]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/opt/bin/kubectl" Oct 2 19:46:19.184724 ignition[1045]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET https://storage.googleapis.com/kubernetes-release/release/v1.26.5/bin/linux/amd64/kubectl: attempt #1 Oct 2 19:46:19.261761 ignition[1045]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET result: OK Oct 2 19:46:19.577223 ignition[1045]: DEBUG : files: createFilesystemsFiles: createFiles: op(7): file matches expected sum of: 97840854134909d75a1a2563628cc4ba632067369ce7fc8a8a1e90a387d32dd7bfd73f4f5b5a82ef842088e7470692951eb7fc869c5f297dd740f855672ee628 Oct 2 19:46:19.577223 ignition[1045]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/opt/bin/kubectl" Oct 2 19:46:19.626565 kernel: BTRFS info: devid 1 device path /dev/sda6 changed to /dev/disk/by-label/OEM scanned by ignition (1049) Oct 2 19:46:19.614642 systemd[1]: mnt-oem409083225.mount: Deactivated successfully. Oct 2 19:46:19.635549 ignition[1045]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/docker/daemon.json" Oct 2 19:46:19.635549 ignition[1045]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/docker/daemon.json" Oct 2 19:46:19.635549 ignition[1045]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/home/core/install.sh" Oct 2 19:46:19.635549 ignition[1045]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/home/core/install.sh" Oct 2 19:46:19.635549 ignition[1045]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/home/core/nginx.yaml" Oct 2 19:46:19.635549 ignition[1045]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/home/core/nginx.yaml" Oct 2 19:46:19.635549 ignition[1045]: INFO : files: createFilesystemsFiles: createFiles: op(b): [started] writing file "/sysroot/etc/systemd/system/packet-phone-home.service" Oct 2 19:46:19.635549 ignition[1045]: INFO : files: createFilesystemsFiles: createFiles: op(b): oem config not found in "/usr/share/oem", looking on oem partition Oct 2 19:46:19.635549 ignition[1045]: INFO : files: createFilesystemsFiles: createFiles: op(b): op(c): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem409083225" Oct 2 19:46:19.635549 ignition[1045]: CRITICAL : files: createFilesystemsFiles: createFiles: op(b): op(c): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem409083225": device or resource busy Oct 2 19:46:19.635549 ignition[1045]: ERROR : files: createFilesystemsFiles: createFiles: op(b): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem409083225", trying btrfs: device or resource busy Oct 2 19:46:19.635549 ignition[1045]: INFO : files: createFilesystemsFiles: createFiles: op(b): op(d): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem409083225" Oct 2 19:46:19.635549 ignition[1045]: INFO : files: createFilesystemsFiles: createFiles: op(b): op(d): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem409083225" Oct 2 19:46:19.635549 ignition[1045]: INFO : files: createFilesystemsFiles: createFiles: op(b): op(e): [started] unmounting "/mnt/oem409083225" Oct 2 19:46:19.635549 ignition[1045]: INFO : files: createFilesystemsFiles: createFiles: op(b): op(e): [finished] unmounting "/mnt/oem409083225" Oct 2 19:46:19.934686 kernel: audit: type=1130 audit(1696275979.850:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:19.850000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:19.831162 systemd[1]: Finished ignition-files.service. Oct 2 19:46:19.961483 ignition[1045]: INFO : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/etc/systemd/system/packet-phone-home.service" Oct 2 19:46:19.961483 ignition[1045]: INFO : files: op(f): [started] processing unit "coreos-metadata-sshkeys@.service" Oct 2 19:46:19.961483 ignition[1045]: INFO : files: op(f): [finished] processing unit "coreos-metadata-sshkeys@.service" Oct 2 19:46:19.961483 ignition[1045]: INFO : files: op(10): [started] processing unit "packet-phone-home.service" Oct 2 19:46:19.961483 ignition[1045]: INFO : files: op(10): [finished] processing unit "packet-phone-home.service" Oct 2 19:46:19.961483 ignition[1045]: INFO : files: op(11): [started] processing unit "prepare-cni-plugins.service" Oct 2 19:46:19.961483 ignition[1045]: INFO : files: op(11): op(12): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Oct 2 19:46:19.961483 ignition[1045]: INFO : files: op(11): op(12): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Oct 2 19:46:19.961483 ignition[1045]: INFO : files: op(11): [finished] processing unit "prepare-cni-plugins.service" Oct 2 19:46:19.961483 ignition[1045]: INFO : files: op(13): [started] processing unit "prepare-critools.service" Oct 2 19:46:19.961483 ignition[1045]: INFO : files: op(13): op(14): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Oct 2 19:46:19.961483 ignition[1045]: INFO : files: op(13): op(14): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Oct 2 19:46:19.961483 ignition[1045]: INFO : files: op(13): [finished] processing unit "prepare-critools.service" Oct 2 19:46:19.961483 ignition[1045]: INFO : files: op(15): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Oct 2 19:46:19.961483 ignition[1045]: INFO : files: op(15): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Oct 2 19:46:19.961483 ignition[1045]: INFO : files: op(16): [started] setting preset to enabled for "packet-phone-home.service" Oct 2 19:46:19.961483 ignition[1045]: INFO : files: op(16): [finished] setting preset to enabled for "packet-phone-home.service" Oct 2 19:46:19.961483 ignition[1045]: INFO : files: op(17): [started] setting preset to enabled for "prepare-cni-plugins.service" Oct 2 19:46:19.961483 ignition[1045]: INFO : files: op(17): [finished] setting preset to enabled for "prepare-cni-plugins.service" Oct 2 19:46:19.970000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:19.995000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:19.995000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:20.046000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:20.046000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:20.143000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:20.262000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:19.857694 systemd[1]: Starting initrd-setup-root-after-ignition.service... Oct 2 19:46:20.381725 ignition[1045]: INFO : files: op(18): [started] setting preset to enabled for "prepare-critools.service" Oct 2 19:46:20.381725 ignition[1045]: INFO : files: op(18): [finished] setting preset to enabled for "prepare-critools.service" Oct 2 19:46:20.381725 ignition[1045]: INFO : files: createResultFile: createFiles: op(19): [started] writing file "/sysroot/etc/.ignition-result.json" Oct 2 19:46:20.381725 ignition[1045]: INFO : files: createResultFile: createFiles: op(19): [finished] writing file "/sysroot/etc/.ignition-result.json" Oct 2 19:46:20.381725 ignition[1045]: INFO : files: files passed Oct 2 19:46:20.381725 ignition[1045]: INFO : POST message to Packet Timeline Oct 2 19:46:20.381725 ignition[1045]: INFO : GET https://metadata.packet.net/metadata: attempt #1 Oct 2 19:46:20.381725 ignition[1045]: INFO : GET result: OK Oct 2 19:46:20.381725 ignition[1045]: INFO : Ignition finished successfully Oct 2 19:46:20.509000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:20.542000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:20.552953 initrd-setup-root-after-ignition[1080]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Oct 2 19:46:20.559000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:19.918577 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Oct 2 19:46:19.918885 systemd[1]: Starting ignition-quench.service... Oct 2 19:46:19.954707 systemd[1]: Finished initrd-setup-root-after-ignition.service. Oct 2 19:46:19.971727 systemd[1]: ignition-quench.service: Deactivated successfully. Oct 2 19:46:19.971800 systemd[1]: Finished ignition-quench.service. Oct 2 19:46:19.996767 systemd[1]: Reached target ignition-complete.target. Oct 2 19:46:20.668000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:20.019415 systemd[1]: Starting initrd-parse-etc.service... Oct 2 19:46:20.685000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:20.036730 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Oct 2 19:46:20.702000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:20.036784 systemd[1]: Finished initrd-parse-etc.service. Oct 2 19:46:20.726546 ignition[1095]: INFO : Ignition 2.14.0 Oct 2 19:46:20.726546 ignition[1095]: INFO : Stage: umount Oct 2 19:46:20.726546 ignition[1095]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 19:46:20.726546 ignition[1095]: DEBUG : parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Oct 2 19:46:20.726546 ignition[1095]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/packet" Oct 2 19:46:20.726546 ignition[1095]: INFO : umount: umount passed Oct 2 19:46:20.726546 ignition[1095]: INFO : POST message to Packet Timeline Oct 2 19:46:20.726546 ignition[1095]: INFO : GET https://metadata.packet.net/metadata: attempt #1 Oct 2 19:46:21.074991 kernel: kauditd_printk_skb: 14 callbacks suppressed Oct 2 19:46:21.075083 kernel: audit: type=1131 audit(1696275980.796:55): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:21.075092 kernel: audit: type=1131 audit(1696275980.885:56): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:21.075100 kernel: audit: type=1131 audit(1696275980.951:57): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:21.075107 kernel: audit: type=1131 audit(1696275981.017:58): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:20.751000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:20.796000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:20.885000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:20.951000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:21.017000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:20.047615 systemd[1]: Reached target initrd-fs.target. Oct 2 19:46:21.138839 kernel: audit: type=1131 audit(1696275981.081:59): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:21.081000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:21.138889 ignition[1095]: INFO : GET result: OK Oct 2 19:46:21.138889 ignition[1095]: INFO : Ignition finished successfully Oct 2 19:46:20.073516 systemd[1]: Reached target initrd.target. Oct 2 19:46:20.093850 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Oct 2 19:46:21.181000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:20.096072 systemd[1]: Starting dracut-pre-pivot.service... Oct 2 19:46:21.307751 kernel: audit: type=1131 audit(1696275981.181:60): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:21.307767 kernel: audit: type=1131 audit(1696275981.248:61): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:21.248000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:20.129742 systemd[1]: Finished dracut-pre-pivot.service. Oct 2 19:46:21.374864 kernel: audit: type=1131 audit(1696275981.315:62): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:21.315000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:20.146384 systemd[1]: Starting initrd-cleanup.service... Oct 2 19:46:21.443093 kernel: audit: type=1131 audit(1696275981.382:63): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:21.382000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:20.170223 systemd[1]: Stopped target nss-lookup.target. Oct 2 19:46:20.198610 systemd[1]: Stopped target remote-cryptsetup.target. Oct 2 19:46:20.223706 systemd[1]: Stopped target timers.target. Oct 2 19:46:20.241989 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Oct 2 19:46:21.552530 kernel: audit: type=1130 audit(1696275981.484:64): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:21.484000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:21.484000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:20.242365 systemd[1]: Stopped dracut-pre-pivot.service. Oct 2 19:46:21.560000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:20.264191 systemd[1]: Stopped target initrd.target. Oct 2 19:46:21.576000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:21.578000 audit: BPF prog-id=6 op=UNLOAD Oct 2 19:46:20.284997 systemd[1]: Stopped target basic.target. Oct 2 19:46:20.305002 systemd[1]: Stopped target ignition-complete.target. Oct 2 19:46:20.325906 systemd[1]: Stopped target ignition-diskful.target. Oct 2 19:46:21.623000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:20.348983 systemd[1]: Stopped target initrd-root-device.target. Oct 2 19:46:21.640000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:20.371868 systemd[1]: Stopped target remote-fs.target. Oct 2 19:46:21.656000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:20.389987 systemd[1]: Stopped target remote-fs-pre.target. Oct 2 19:46:20.411021 systemd[1]: Stopped target sysinit.target. Oct 2 19:46:21.686000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:20.431908 systemd[1]: Stopped target local-fs.target. Oct 2 19:46:20.455893 systemd[1]: Stopped target local-fs-pre.target. Oct 2 19:46:20.479896 systemd[1]: Stopped target swap.target. Oct 2 19:46:21.731000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:20.493882 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Oct 2 19:46:21.746000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:20.494238 systemd[1]: Stopped dracut-pre-mount.service. Oct 2 19:46:21.762000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:20.511111 systemd[1]: Stopped target cryptsetup.target. Oct 2 19:46:20.528792 systemd[1]: dracut-initqueue.service: Deactivated successfully. Oct 2 19:46:21.793000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:20.529152 systemd[1]: Stopped dracut-initqueue.service. Oct 2 19:46:21.809000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:21.809000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:20.544044 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Oct 2 19:46:20.544411 systemd[1]: Stopped ignition-fetch-offline.service. Oct 2 19:46:20.561098 systemd[1]: Stopped target paths.target. Oct 2 19:46:20.581728 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Oct 2 19:46:20.586517 systemd[1]: Stopped systemd-ask-password-console.path. Oct 2 19:46:20.606853 systemd[1]: Stopped target slices.target. Oct 2 19:46:20.620986 systemd[1]: Stopped target sockets.target. Oct 2 19:46:20.637817 systemd[1]: iscsid.socket: Deactivated successfully. Oct 2 19:46:20.638058 systemd[1]: Closed iscsid.socket. Oct 2 19:46:20.653058 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Oct 2 19:46:20.653445 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Oct 2 19:46:20.669998 systemd[1]: ignition-files.service: Deactivated successfully. Oct 2 19:46:20.670351 systemd[1]: Stopped ignition-files.service. Oct 2 19:46:20.686987 systemd[1]: flatcar-metadata-hostname.service: Deactivated successfully. Oct 2 19:46:20.687357 systemd[1]: Stopped flatcar-metadata-hostname.service. Oct 2 19:46:20.706049 systemd[1]: Stopping ignition-mount.service... Oct 2 19:46:20.718518 systemd[1]: Stopping iscsiuio.service... Oct 2 19:46:20.733487 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Oct 2 19:46:20.733579 systemd[1]: Stopped kmod-static-nodes.service. Oct 2 19:46:21.972000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:20.753431 systemd[1]: Stopping sysroot-boot.service... Oct 2 19:46:20.770469 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Oct 2 19:46:20.770720 systemd[1]: Stopped systemd-udev-trigger.service. Oct 2 19:46:20.798004 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Oct 2 19:46:20.798368 systemd[1]: Stopped dracut-pre-trigger.service. Oct 2 19:46:20.890336 systemd[1]: sysroot-boot.mount: Deactivated successfully. Oct 2 19:46:20.891191 systemd[1]: iscsiuio.service: Deactivated successfully. Oct 2 19:46:20.891290 systemd[1]: Stopped iscsiuio.service. Oct 2 19:46:20.952772 systemd[1]: ignition-mount.service: Deactivated successfully. Oct 2 19:46:22.084799 iscsid[893]: iscsid shutting down. Oct 2 19:46:20.952810 systemd[1]: Stopped ignition-mount.service. Oct 2 19:46:21.018708 systemd[1]: sysroot-boot.service: Deactivated successfully. Oct 2 19:46:21.018745 systemd[1]: Stopped sysroot-boot.service. Oct 2 19:46:21.082788 systemd[1]: Stopped target network.target. Oct 2 19:46:21.147573 systemd[1]: iscsiuio.socket: Deactivated successfully. Oct 2 19:46:21.147592 systemd[1]: Closed iscsiuio.socket. Oct 2 19:46:21.169517 systemd[1]: ignition-disks.service: Deactivated successfully. Oct 2 19:46:21.169540 systemd[1]: Stopped ignition-disks.service. Oct 2 19:46:21.182660 systemd[1]: ignition-kargs.service: Deactivated successfully. Oct 2 19:46:21.182701 systemd[1]: Stopped ignition-kargs.service. Oct 2 19:46:21.269497 systemd[1]: ignition-setup.service: Deactivated successfully. Oct 2 19:46:21.269578 systemd[1]: Stopped ignition-setup.service. Oct 2 19:46:21.316549 systemd[1]: initrd-setup-root.service: Deactivated successfully. Oct 2 19:46:21.316573 systemd[1]: Stopped initrd-setup-root.service. Oct 2 19:46:22.085325 systemd-journald[268]: Received SIGTERM from PID 1 (n/a). Oct 2 19:46:21.403891 systemd[1]: Stopping systemd-networkd.service... Oct 2 19:46:21.448533 systemd-networkd[865]: enp1s0f1np1: DHCPv6 lease lost Oct 2 19:46:21.450604 systemd[1]: Stopping systemd-resolved.service... Oct 2 19:46:21.457847 systemd[1]: initrd-cleanup.service: Deactivated successfully. Oct 2 19:46:21.457890 systemd[1]: Finished initrd-cleanup.service. Oct 2 19:46:21.459418 systemd-networkd[865]: enp1s0f0np0: DHCPv6 lease lost Oct 2 19:46:22.084000 audit: BPF prog-id=9 op=UNLOAD Oct 2 19:46:21.485644 systemd[1]: systemd-resolved.service: Deactivated successfully. Oct 2 19:46:21.485689 systemd[1]: Stopped systemd-resolved.service. Oct 2 19:46:21.561717 systemd[1]: systemd-networkd.service: Deactivated successfully. Oct 2 19:46:21.561760 systemd[1]: Stopped systemd-networkd.service. Oct 2 19:46:21.578034 systemd[1]: systemd-networkd.socket: Deactivated successfully. Oct 2 19:46:21.578048 systemd[1]: Closed systemd-networkd.socket. Oct 2 19:46:21.595327 systemd[1]: Stopping network-cleanup.service... Oct 2 19:46:21.607540 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Oct 2 19:46:21.607779 systemd[1]: Stopped parse-ip-for-networkd.service. Oct 2 19:46:21.624885 systemd[1]: systemd-sysctl.service: Deactivated successfully. Oct 2 19:46:21.625033 systemd[1]: Stopped systemd-sysctl.service. Oct 2 19:46:21.641990 systemd[1]: systemd-modules-load.service: Deactivated successfully. Oct 2 19:46:21.642130 systemd[1]: Stopped systemd-modules-load.service. Oct 2 19:46:21.657999 systemd[1]: Stopping systemd-udevd.service... Oct 2 19:46:21.675444 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Oct 2 19:46:21.676969 systemd[1]: systemd-udevd.service: Deactivated successfully. Oct 2 19:46:21.677330 systemd[1]: Stopped systemd-udevd.service. Oct 2 19:46:21.690109 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Oct 2 19:46:21.690243 systemd[1]: Closed systemd-udevd-control.socket. Oct 2 19:46:21.702640 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Oct 2 19:46:21.702742 systemd[1]: Closed systemd-udevd-kernel.socket. Oct 2 19:46:21.717589 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Oct 2 19:46:21.717734 systemd[1]: Stopped dracut-pre-udev.service. Oct 2 19:46:21.732702 systemd[1]: dracut-cmdline.service: Deactivated successfully. Oct 2 19:46:21.732829 systemd[1]: Stopped dracut-cmdline.service. Oct 2 19:46:21.747642 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Oct 2 19:46:21.747768 systemd[1]: Stopped dracut-cmdline-ask.service. Oct 2 19:46:21.765617 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Oct 2 19:46:21.778465 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Oct 2 19:46:21.778494 systemd[1]: Stopped systemd-vconsole-setup.service. Oct 2 19:46:21.794706 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Oct 2 19:46:21.794761 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Oct 2 19:46:21.955957 systemd[1]: network-cleanup.service: Deactivated successfully. Oct 2 19:46:21.956204 systemd[1]: Stopped network-cleanup.service. Oct 2 19:46:21.973934 systemd[1]: Reached target initrd-switch-root.target. Oct 2 19:46:21.991465 systemd[1]: Starting initrd-switch-root.service... Oct 2 19:46:22.028146 systemd[1]: Switching root. Oct 2 19:46:22.086774 systemd-journald[268]: Journal stopped Oct 2 19:46:25.760114 kernel: SELinux: Class mctp_socket not defined in policy. Oct 2 19:46:25.760128 kernel: SELinux: Class anon_inode not defined in policy. Oct 2 19:46:25.760137 kernel: SELinux: the above unknown classes and permissions will be allowed Oct 2 19:46:25.760143 kernel: SELinux: policy capability network_peer_controls=1 Oct 2 19:46:25.760148 kernel: SELinux: policy capability open_perms=1 Oct 2 19:46:25.760153 kernel: SELinux: policy capability extended_socket_class=1 Oct 2 19:46:25.760160 kernel: SELinux: policy capability always_check_network=0 Oct 2 19:46:25.760165 kernel: SELinux: policy capability cgroup_seclabel=1 Oct 2 19:46:25.760170 kernel: SELinux: policy capability nnp_nosuid_transition=1 Oct 2 19:46:25.760176 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Oct 2 19:46:25.760182 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Oct 2 19:46:25.760188 systemd[1]: Successfully loaded SELinux policy in 323.792ms. Oct 2 19:46:25.760195 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 29.266ms. Oct 2 19:46:25.760202 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Oct 2 19:46:25.760210 systemd[1]: Detected architecture x86-64. Oct 2 19:46:25.760216 systemd[1]: Detected first boot. Oct 2 19:46:25.760223 systemd[1]: Hostname set to . Oct 2 19:46:25.760229 systemd[1]: Initializing machine ID from random generator. Oct 2 19:46:25.760235 systemd[1]: Populated /etc with preset unit settings. Oct 2 19:46:25.760242 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 2 19:46:25.760249 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 2 19:46:25.760257 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 2 19:46:25.760264 systemd[1]: iscsid.service: Deactivated successfully. Oct 2 19:46:25.760270 systemd[1]: Stopped iscsid.service. Oct 2 19:46:25.760276 systemd[1]: initrd-switch-root.service: Deactivated successfully. Oct 2 19:46:25.760283 systemd[1]: Stopped initrd-switch-root.service. Oct 2 19:46:25.760289 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Oct 2 19:46:25.760296 systemd[1]: Created slice system-addon\x2dconfig.slice. Oct 2 19:46:25.760306 systemd[1]: Created slice system-addon\x2drun.slice. Oct 2 19:46:25.760313 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Oct 2 19:46:25.760319 systemd[1]: Created slice system-getty.slice. Oct 2 19:46:25.760326 systemd[1]: Created slice system-modprobe.slice. Oct 2 19:46:25.760332 systemd[1]: Created slice system-serial\x2dgetty.slice. Oct 2 19:46:25.760338 systemd[1]: Created slice system-system\x2dcloudinit.slice. Oct 2 19:46:25.760345 systemd[1]: Created slice system-systemd\x2dfsck.slice. Oct 2 19:46:25.760351 systemd[1]: Created slice user.slice. Oct 2 19:46:25.760357 systemd[1]: Started systemd-ask-password-console.path. Oct 2 19:46:25.760365 systemd[1]: Started systemd-ask-password-wall.path. Oct 2 19:46:25.760371 systemd[1]: Set up automount boot.automount. Oct 2 19:46:25.760378 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Oct 2 19:46:25.760386 systemd[1]: Stopped target initrd-switch-root.target. Oct 2 19:46:25.760393 systemd[1]: Stopped target initrd-fs.target. Oct 2 19:46:25.760399 systemd[1]: Stopped target initrd-root-fs.target. Oct 2 19:46:25.760406 systemd[1]: Reached target integritysetup.target. Oct 2 19:46:25.760413 systemd[1]: Reached target remote-cryptsetup.target. Oct 2 19:46:25.760420 systemd[1]: Reached target remote-fs.target. Oct 2 19:46:25.760427 systemd[1]: Reached target slices.target. Oct 2 19:46:25.760433 systemd[1]: Reached target swap.target. Oct 2 19:46:25.760440 systemd[1]: Reached target torcx.target. Oct 2 19:46:25.760447 systemd[1]: Reached target veritysetup.target. Oct 2 19:46:25.760454 systemd[1]: Listening on systemd-coredump.socket. Oct 2 19:46:25.760462 systemd[1]: Listening on systemd-initctl.socket. Oct 2 19:46:25.760469 systemd[1]: Listening on systemd-networkd.socket. Oct 2 19:46:25.760475 systemd[1]: Listening on systemd-udevd-control.socket. Oct 2 19:46:25.760482 systemd[1]: Listening on systemd-udevd-kernel.socket. Oct 2 19:46:25.760489 systemd[1]: Listening on systemd-userdbd.socket. Oct 2 19:46:25.760496 systemd[1]: Mounting dev-hugepages.mount... Oct 2 19:46:25.760503 systemd[1]: Mounting dev-mqueue.mount... Oct 2 19:46:25.760510 systemd[1]: Mounting media.mount... Oct 2 19:46:25.760517 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Oct 2 19:46:25.760524 systemd[1]: Mounting sys-kernel-debug.mount... Oct 2 19:46:25.760531 systemd[1]: Mounting sys-kernel-tracing.mount... Oct 2 19:46:25.760538 systemd[1]: Mounting tmp.mount... Oct 2 19:46:25.760545 systemd[1]: Starting flatcar-tmpfiles.service... Oct 2 19:46:25.760552 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Oct 2 19:46:25.760558 systemd[1]: Starting kmod-static-nodes.service... Oct 2 19:46:25.760565 systemd[1]: Starting modprobe@configfs.service... Oct 2 19:46:25.760573 systemd[1]: Starting modprobe@dm_mod.service... Oct 2 19:46:25.760580 systemd[1]: Starting modprobe@drm.service... Oct 2 19:46:25.760587 systemd[1]: Starting modprobe@efi_pstore.service... Oct 2 19:46:25.760593 systemd[1]: Starting modprobe@fuse.service... Oct 2 19:46:25.760600 kernel: fuse: init (API version 7.34) Oct 2 19:46:25.760606 systemd[1]: Starting modprobe@loop.service... Oct 2 19:46:25.760613 kernel: loop: module loaded Oct 2 19:46:25.760620 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Oct 2 19:46:25.760627 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Oct 2 19:46:25.760634 systemd[1]: Stopped systemd-fsck-root.service. Oct 2 19:46:25.760641 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Oct 2 19:46:25.760648 systemd[1]: Stopped systemd-fsck-usr.service. Oct 2 19:46:25.760655 systemd[1]: Stopped systemd-journald.service. Oct 2 19:46:25.760662 systemd[1]: Starting systemd-journald.service... Oct 2 19:46:25.760668 systemd[1]: Starting systemd-modules-load.service... Oct 2 19:46:25.760677 systemd-journald[1246]: Journal started Oct 2 19:46:25.760703 systemd-journald[1246]: Runtime Journal (/run/log/journal/d376f147c6b741b8999fd911088cede2) is 8.0M, max 640.0M, 632.0M free. Oct 2 19:46:22.496000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Oct 2 19:46:22.797000 audit[1]: AVC avc: denied { integrity } for pid=1 comm="systemd" lockdown_reason="/dev/mem,kmem,port" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Oct 2 19:46:22.799000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Oct 2 19:46:22.799000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Oct 2 19:46:22.799000 audit: BPF prog-id=10 op=LOAD Oct 2 19:46:22.799000 audit: BPF prog-id=10 op=UNLOAD Oct 2 19:46:22.799000 audit: BPF prog-id=11 op=LOAD Oct 2 19:46:22.799000 audit: BPF prog-id=11 op=UNLOAD Oct 2 19:46:24.387000 audit: BPF prog-id=12 op=LOAD Oct 2 19:46:24.387000 audit: BPF prog-id=3 op=UNLOAD Oct 2 19:46:24.388000 audit: BPF prog-id=13 op=LOAD Oct 2 19:46:24.388000 audit: BPF prog-id=14 op=LOAD Oct 2 19:46:24.388000 audit: BPF prog-id=4 op=UNLOAD Oct 2 19:46:24.388000 audit: BPF prog-id=5 op=UNLOAD Oct 2 19:46:24.388000 audit: BPF prog-id=15 op=LOAD Oct 2 19:46:24.388000 audit: BPF prog-id=12 op=UNLOAD Oct 2 19:46:24.388000 audit: BPF prog-id=16 op=LOAD Oct 2 19:46:24.389000 audit: BPF prog-id=17 op=LOAD Oct 2 19:46:24.389000 audit: BPF prog-id=13 op=UNLOAD Oct 2 19:46:24.389000 audit: BPF prog-id=14 op=UNLOAD Oct 2 19:46:24.389000 audit: BPF prog-id=18 op=LOAD Oct 2 19:46:24.389000 audit: BPF prog-id=15 op=UNLOAD Oct 2 19:46:24.389000 audit: BPF prog-id=19 op=LOAD Oct 2 19:46:24.389000 audit: BPF prog-id=20 op=LOAD Oct 2 19:46:24.389000 audit: BPF prog-id=16 op=UNLOAD Oct 2 19:46:24.389000 audit: BPF prog-id=17 op=UNLOAD Oct 2 19:46:24.389000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:24.435000 audit: BPF prog-id=18 op=UNLOAD Oct 2 19:46:24.440000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:24.494000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:24.494000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:25.674000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:25.710000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:25.731000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:25.731000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:25.731000 audit: BPF prog-id=21 op=LOAD Oct 2 19:46:25.732000 audit: BPF prog-id=22 op=LOAD Oct 2 19:46:25.732000 audit: BPF prog-id=23 op=LOAD Oct 2 19:46:25.732000 audit: BPF prog-id=19 op=UNLOAD Oct 2 19:46:25.732000 audit: BPF prog-id=20 op=UNLOAD Oct 2 19:46:25.756000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Oct 2 19:46:25.756000 audit[1246]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=6 a1=7ffe1934ea60 a2=4000 a3=7ffe1934eafc items=0 ppid=1 pid=1246 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:46:25.756000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Oct 2 19:46:24.387096 systemd[1]: Queued start job for default target multi-user.target. Oct 2 19:46:22.872291 /usr/lib/systemd/system-generators/torcx-generator[1135]: time="2023-10-02T19:46:22Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.0 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.0 /var/lib/torcx/store]" Oct 2 19:46:24.391165 systemd[1]: systemd-journald.service: Deactivated successfully. Oct 2 19:46:22.872866 /usr/lib/systemd/system-generators/torcx-generator[1135]: time="2023-10-02T19:46:22Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Oct 2 19:46:22.872878 /usr/lib/systemd/system-generators/torcx-generator[1135]: time="2023-10-02T19:46:22Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Oct 2 19:46:22.872895 /usr/lib/systemd/system-generators/torcx-generator[1135]: time="2023-10-02T19:46:22Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Oct 2 19:46:22.872901 /usr/lib/systemd/system-generators/torcx-generator[1135]: time="2023-10-02T19:46:22Z" level=debug msg="skipped missing lower profile" missing profile=oem Oct 2 19:46:22.872918 /usr/lib/systemd/system-generators/torcx-generator[1135]: time="2023-10-02T19:46:22Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Oct 2 19:46:22.872925 /usr/lib/systemd/system-generators/torcx-generator[1135]: time="2023-10-02T19:46:22Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Oct 2 19:46:22.873033 /usr/lib/systemd/system-generators/torcx-generator[1135]: time="2023-10-02T19:46:22Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Oct 2 19:46:22.873057 /usr/lib/systemd/system-generators/torcx-generator[1135]: time="2023-10-02T19:46:22Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Oct 2 19:46:22.873064 /usr/lib/systemd/system-generators/torcx-generator[1135]: time="2023-10-02T19:46:22Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Oct 2 19:46:22.873617 /usr/lib/systemd/system-generators/torcx-generator[1135]: time="2023-10-02T19:46:22Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Oct 2 19:46:22.873635 /usr/lib/systemd/system-generators/torcx-generator[1135]: time="2023-10-02T19:46:22Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Oct 2 19:46:22.873645 /usr/lib/systemd/system-generators/torcx-generator[1135]: time="2023-10-02T19:46:22Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.0: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.0 Oct 2 19:46:22.873653 /usr/lib/systemd/system-generators/torcx-generator[1135]: time="2023-10-02T19:46:22Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Oct 2 19:46:22.873662 /usr/lib/systemd/system-generators/torcx-generator[1135]: time="2023-10-02T19:46:22Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.0: no such file or directory" path=/var/lib/torcx/store/3510.3.0 Oct 2 19:46:22.873670 /usr/lib/systemd/system-generators/torcx-generator[1135]: time="2023-10-02T19:46:22Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Oct 2 19:46:24.038132 /usr/lib/systemd/system-generators/torcx-generator[1135]: time="2023-10-02T19:46:24Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 2 19:46:24.038285 /usr/lib/systemd/system-generators/torcx-generator[1135]: time="2023-10-02T19:46:24Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 2 19:46:24.038349 /usr/lib/systemd/system-generators/torcx-generator[1135]: time="2023-10-02T19:46:24Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 2 19:46:24.038444 /usr/lib/systemd/system-generators/torcx-generator[1135]: time="2023-10-02T19:46:24Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 2 19:46:24.038475 /usr/lib/systemd/system-generators/torcx-generator[1135]: time="2023-10-02T19:46:24Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Oct 2 19:46:24.038509 /usr/lib/systemd/system-generators/torcx-generator[1135]: time="2023-10-02T19:46:24Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Oct 2 19:46:25.791493 systemd[1]: Starting systemd-network-generator.service... Oct 2 19:46:25.813350 systemd[1]: Starting systemd-remount-fs.service... Oct 2 19:46:25.836356 systemd[1]: Starting systemd-udev-trigger.service... Oct 2 19:46:25.868885 systemd[1]: verity-setup.service: Deactivated successfully. Oct 2 19:46:25.868907 systemd[1]: Stopped verity-setup.service. Oct 2 19:46:25.874000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:25.902908 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Oct 2 19:46:25.902927 kernel: kauditd_printk_skb: 59 callbacks suppressed Oct 2 19:46:25.902937 kernel: audit: type=1131 audit(1696275985.874:122): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:25.916354 systemd[1]: Started systemd-journald.service. Oct 2 19:46:25.977000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:25.978837 systemd[1]: Mounted dev-hugepages.mount. Oct 2 19:46:26.021526 kernel: audit: type=1130 audit(1696275985.977:123): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:26.027570 systemd[1]: Mounted dev-mqueue.mount. Oct 2 19:46:26.034558 systemd[1]: Mounted media.mount. Oct 2 19:46:26.041555 systemd[1]: Mounted sys-kernel-debug.mount. Oct 2 19:46:26.050551 systemd[1]: Mounted sys-kernel-tracing.mount. Oct 2 19:46:26.059564 systemd[1]: Mounted tmp.mount. Oct 2 19:46:26.066618 systemd[1]: Finished flatcar-tmpfiles.service. Oct 2 19:46:26.074000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:26.075686 systemd[1]: Finished kmod-static-nodes.service. Oct 2 19:46:26.119456 kernel: audit: type=1130 audit(1696275986.074:124): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:26.126000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:26.127628 systemd[1]: modprobe@configfs.service: Deactivated successfully. Oct 2 19:46:26.127690 systemd[1]: Finished modprobe@configfs.service. Oct 2 19:46:26.173496 kernel: audit: type=1130 audit(1696275986.126:125): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:26.180000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:26.181643 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Oct 2 19:46:26.181700 systemd[1]: Finished modprobe@dm_mod.service. Oct 2 19:46:26.180000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:26.229359 kernel: audit: type=1130 audit(1696275986.180:126): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:26.229377 kernel: audit: type=1131 audit(1696275986.180:127): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:26.284000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:26.285644 systemd[1]: modprobe@drm.service: Deactivated successfully. Oct 2 19:46:26.285704 systemd[1]: Finished modprobe@drm.service. Oct 2 19:46:26.335368 kernel: audit: type=1130 audit(1696275986.284:128): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:26.335416 kernel: audit: type=1131 audit(1696275986.284:129): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:26.284000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:26.392000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:26.393628 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Oct 2 19:46:26.393689 systemd[1]: Finished modprobe@efi_pstore.service. Oct 2 19:46:26.392000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:26.445387 kernel: audit: type=1130 audit(1696275986.392:130): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:26.445423 kernel: audit: type=1131 audit(1696275986.392:131): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:26.504000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:26.504000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:26.505641 systemd[1]: modprobe@fuse.service: Deactivated successfully. Oct 2 19:46:26.505703 systemd[1]: Finished modprobe@fuse.service. Oct 2 19:46:26.513000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:26.513000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:26.514637 systemd[1]: modprobe@loop.service: Deactivated successfully. Oct 2 19:46:26.514698 systemd[1]: Finished modprobe@loop.service. Oct 2 19:46:26.522000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:26.522000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:26.523648 systemd[1]: Finished systemd-modules-load.service. Oct 2 19:46:26.531000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:26.532639 systemd[1]: Finished systemd-network-generator.service. Oct 2 19:46:26.540000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:26.541617 systemd[1]: Finished systemd-remount-fs.service. Oct 2 19:46:26.549000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:26.550653 systemd[1]: Finished systemd-udev-trigger.service. Oct 2 19:46:26.558000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:26.559828 systemd[1]: Reached target network-pre.target. Oct 2 19:46:26.569386 systemd[1]: Mounting sys-fs-fuse-connections.mount... Oct 2 19:46:26.578526 systemd[1]: Mounting sys-kernel-config.mount... Oct 2 19:46:26.585488 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Oct 2 19:46:26.587571 systemd[1]: Starting systemd-hwdb-update.service... Oct 2 19:46:26.595019 systemd[1]: Starting systemd-journal-flush.service... Oct 2 19:46:26.598278 systemd-journald[1246]: Time spent on flushing to /var/log/journal/d376f147c6b741b8999fd911088cede2 is 15.312ms for 1618 entries. Oct 2 19:46:26.598278 systemd-journald[1246]: System Journal (/var/log/journal/d376f147c6b741b8999fd911088cede2) is 8.0M, max 195.6M, 187.6M free. Oct 2 19:46:26.647508 systemd-journald[1246]: Received client request to flush runtime journal. Oct 2 19:46:26.611426 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Oct 2 19:46:26.611902 systemd[1]: Starting systemd-random-seed.service... Oct 2 19:46:26.629431 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Oct 2 19:46:26.629948 systemd[1]: Starting systemd-sysctl.service... Oct 2 19:46:26.637065 systemd[1]: Starting systemd-sysusers.service... Oct 2 19:46:26.643901 systemd[1]: Starting systemd-udev-settle.service... Oct 2 19:46:26.651558 systemd[1]: Mounted sys-fs-fuse-connections.mount. Oct 2 19:46:26.659486 systemd[1]: Mounted sys-kernel-config.mount. Oct 2 19:46:26.667507 systemd[1]: Finished systemd-journal-flush.service. Oct 2 19:46:26.674000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:26.675508 systemd[1]: Finished systemd-random-seed.service. Oct 2 19:46:26.682000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:26.683498 systemd[1]: Finished systemd-sysctl.service. Oct 2 19:46:26.690000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:26.691514 systemd[1]: Finished systemd-sysusers.service. Oct 2 19:46:26.698000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:26.700482 systemd[1]: Reached target first-boot-complete.target. Oct 2 19:46:26.708632 udevadm[1263]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Oct 2 19:46:26.891869 systemd[1]: Finished systemd-hwdb-update.service. Oct 2 19:46:26.899000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:26.899000 audit: BPF prog-id=24 op=LOAD Oct 2 19:46:26.899000 audit: BPF prog-id=25 op=LOAD Oct 2 19:46:26.899000 audit: BPF prog-id=7 op=UNLOAD Oct 2 19:46:26.899000 audit: BPF prog-id=8 op=UNLOAD Oct 2 19:46:26.901578 systemd[1]: Starting systemd-udevd.service... Oct 2 19:46:26.912670 systemd-udevd[1264]: Using default interface naming scheme 'v252'. Oct 2 19:46:26.941405 systemd[1]: Started systemd-udevd.service. Oct 2 19:46:26.948000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:26.954000 audit: BPF prog-id=26 op=LOAD Oct 2 19:46:26.955981 systemd[1]: Starting systemd-networkd.service... Oct 2 19:46:26.964817 systemd[1]: Condition check resulted in dev-ttyS1.device being skipped. Oct 2 19:46:26.964000 audit: BPF prog-id=27 op=LOAD Oct 2 19:46:26.964000 audit: BPF prog-id=28 op=LOAD Oct 2 19:46:26.964000 audit: BPF prog-id=29 op=LOAD Oct 2 19:46:26.966092 systemd[1]: Starting systemd-userdbd.service... Oct 2 19:46:26.992320 kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0E:00/input/input2 Oct 2 19:46:26.992407 kernel: ACPI: button: Sleep Button [SLPB] Oct 2 19:46:27.012309 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/sda6 scanned by (udev-worker) (1295) Oct 2 19:46:27.012347 kernel: sdhci-pci 0000:00:14.5: SDHCI controller found [8086:a375] (rev 10) Oct 2 19:46:27.012480 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input3 Oct 2 19:46:27.012500 kernel: ACPI: button: Power Button [PWRF] Oct 2 19:46:27.046142 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Oct 2 19:46:27.108311 kernel: mousedev: PS/2 mouse device common for all mice Oct 2 19:46:27.108371 kernel: sdhci-pci 0000:00:14.5: SDHCI controller found [8086:a375] (rev 10) Oct 2 19:46:27.178686 systemd[1]: Started systemd-userdbd.service. Oct 2 19:46:27.185000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:27.234315 kernel: sdhci-pci 0000:00:14.5: SDHCI controller found [8086:a375] (rev 10) Oct 2 19:46:27.234506 kernel: sdhci-pci 0000:00:14.5: SDHCI controller found [8086:a375] (rev 10) Oct 2 19:46:27.053000 audit[1339]: AVC avc: denied { confidentiality } for pid=1339 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Oct 2 19:46:27.235306 kernel: IPMI message handler: version 39.2 Oct 2 19:46:27.053000 audit[1339]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f3e29e39010 a1=df93c a2=7f3e2bbb0bc5 a3=5 items=310 ppid=1264 pid=1339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:46:27.053000 audit: CWD cwd="/" Oct 2 19:46:27.053000 audit: PATH item=0 name=(null) inode=20532 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=1 name=(null) inode=20533 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=2 name=(null) inode=20532 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=3 name=(null) inode=20534 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=4 name=(null) inode=20532 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=5 name=(null) inode=20535 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=6 name=(null) inode=20535 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=7 name=(null) inode=20536 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=8 name=(null) inode=20535 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=9 name=(null) inode=20537 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=10 name=(null) inode=20535 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=11 name=(null) inode=20538 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=12 name=(null) inode=20535 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=13 name=(null) inode=20539 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=14 name=(null) inode=20535 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=15 name=(null) inode=20540 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=16 name=(null) inode=20532 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=17 name=(null) inode=20541 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=18 name=(null) inode=20541 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=19 name=(null) inode=20542 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=20 name=(null) inode=20541 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=21 name=(null) inode=20543 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=22 name=(null) inode=20541 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=23 name=(null) inode=20544 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=24 name=(null) inode=20541 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=25 name=(null) inode=20545 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=26 name=(null) inode=20541 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=27 name=(null) inode=20546 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=28 name=(null) inode=20532 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=29 name=(null) inode=20547 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=30 name=(null) inode=20547 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=31 name=(null) inode=20548 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=32 name=(null) inode=20547 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=33 name=(null) inode=20549 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=34 name=(null) inode=20547 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=35 name=(null) inode=20550 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=36 name=(null) inode=20547 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=37 name=(null) inode=20551 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=38 name=(null) inode=20547 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=39 name=(null) inode=20552 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=40 name=(null) inode=20532 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=41 name=(null) inode=20553 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=42 name=(null) inode=20553 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=43 name=(null) inode=20554 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=44 name=(null) inode=20553 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=45 name=(null) inode=20555 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=46 name=(null) inode=20553 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=47 name=(null) inode=20556 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=48 name=(null) inode=20553 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=49 name=(null) inode=20557 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=50 name=(null) inode=20553 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=51 name=(null) inode=20558 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=52 name=(null) inode=20532 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=53 name=(null) inode=20559 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=54 name=(null) inode=20559 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=55 name=(null) inode=20560 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=56 name=(null) inode=20559 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=57 name=(null) inode=20561 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=58 name=(null) inode=20559 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=59 name=(null) inode=20562 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=60 name=(null) inode=20559 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=61 name=(null) inode=20563 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=62 name=(null) inode=20559 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=63 name=(null) inode=20564 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=64 name=(null) inode=20532 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=65 name=(null) inode=20565 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=66 name=(null) inode=20565 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=67 name=(null) inode=20566 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=68 name=(null) inode=20565 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=69 name=(null) inode=20567 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=70 name=(null) inode=20565 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=71 name=(null) inode=20568 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=72 name=(null) inode=20565 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=73 name=(null) inode=20569 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=74 name=(null) inode=20565 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=75 name=(null) inode=20570 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=76 name=(null) inode=20532 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=77 name=(null) inode=20571 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=78 name=(null) inode=20571 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=79 name=(null) inode=20572 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=80 name=(null) inode=20571 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=81 name=(null) inode=20573 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=82 name=(null) inode=20571 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=83 name=(null) inode=20574 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=84 name=(null) inode=20571 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=85 name=(null) inode=20575 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=86 name=(null) inode=20571 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=87 name=(null) inode=20576 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=88 name=(null) inode=20532 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=89 name=(null) inode=20577 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=90 name=(null) inode=20577 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=91 name=(null) inode=20578 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=92 name=(null) inode=20577 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=93 name=(null) inode=20579 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=94 name=(null) inode=20577 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=95 name=(null) inode=20580 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=96 name=(null) inode=20577 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=97 name=(null) inode=20581 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=98 name=(null) inode=20577 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=99 name=(null) inode=20582 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=100 name=(null) inode=20532 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=101 name=(null) inode=20583 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=102 name=(null) inode=20583 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=103 name=(null) inode=20584 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=104 name=(null) inode=20583 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=105 name=(null) inode=20585 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=106 name=(null) inode=20583 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=107 name=(null) inode=20586 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=108 name=(null) inode=20583 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=109 name=(null) inode=20587 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=110 name=(null) inode=20583 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=111 name=(null) inode=20588 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=112 name=(null) inode=20532 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=113 name=(null) inode=20589 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=114 name=(null) inode=20589 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=115 name=(null) inode=20590 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=116 name=(null) inode=20589 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=117 name=(null) inode=20591 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=118 name=(null) inode=20589 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=119 name=(null) inode=20592 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=120 name=(null) inode=20589 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=121 name=(null) inode=20593 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=122 name=(null) inode=20589 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=123 name=(null) inode=20594 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=124 name=(null) inode=20532 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=125 name=(null) inode=20595 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=126 name=(null) inode=20595 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=127 name=(null) inode=20596 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=128 name=(null) inode=20595 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=129 name=(null) inode=20597 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=130 name=(null) inode=20595 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=131 name=(null) inode=20598 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=132 name=(null) inode=20595 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=133 name=(null) inode=20599 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=134 name=(null) inode=20595 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=135 name=(null) inode=20600 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=136 name=(null) inode=20532 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=137 name=(null) inode=20601 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=138 name=(null) inode=20601 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=139 name=(null) inode=20602 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=140 name=(null) inode=20601 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=141 name=(null) inode=20603 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=142 name=(null) inode=20601 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=143 name=(null) inode=20604 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=144 name=(null) inode=20601 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=145 name=(null) inode=20605 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=146 name=(null) inode=20601 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=147 name=(null) inode=20606 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=148 name=(null) inode=20532 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=149 name=(null) inode=20607 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=150 name=(null) inode=20607 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=151 name=(null) inode=20608 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=152 name=(null) inode=20607 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=153 name=(null) inode=20609 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=154 name=(null) inode=20607 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=155 name=(null) inode=20610 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=156 name=(null) inode=20607 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=157 name=(null) inode=20611 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=158 name=(null) inode=20607 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=159 name=(null) inode=20612 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=160 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=161 name=(null) inode=20613 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=162 name=(null) inode=20613 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=163 name=(null) inode=20614 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=164 name=(null) inode=20613 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=165 name=(null) inode=20615 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=166 name=(null) inode=20613 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=167 name=(null) inode=20616 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=168 name=(null) inode=20616 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=169 name=(null) inode=20617 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=170 name=(null) inode=20616 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=171 name=(null) inode=20618 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=172 name=(null) inode=20616 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=173 name=(null) inode=20619 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=174 name=(null) inode=20616 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=175 name=(null) inode=20620 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=176 name=(null) inode=20616 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=177 name=(null) inode=20621 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=178 name=(null) inode=20613 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=179 name=(null) inode=20622 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=180 name=(null) inode=20622 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=181 name=(null) inode=20623 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=182 name=(null) inode=20622 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=183 name=(null) inode=20624 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=184 name=(null) inode=20622 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=185 name=(null) inode=20625 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=186 name=(null) inode=20622 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=187 name=(null) inode=20626 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=188 name=(null) inode=20622 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=189 name=(null) inode=20627 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=190 name=(null) inode=20613 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=191 name=(null) inode=20628 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=192 name=(null) inode=20628 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=193 name=(null) inode=20629 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=194 name=(null) inode=20628 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=195 name=(null) inode=20630 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=196 name=(null) inode=20628 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=197 name=(null) inode=20631 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=198 name=(null) inode=20628 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=199 name=(null) inode=20632 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=200 name=(null) inode=20628 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=201 name=(null) inode=20633 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=202 name=(null) inode=20613 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=203 name=(null) inode=20634 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=204 name=(null) inode=20634 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=205 name=(null) inode=20635 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=206 name=(null) inode=20634 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=207 name=(null) inode=20636 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=208 name=(null) inode=20634 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=209 name=(null) inode=20637 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=210 name=(null) inode=20634 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=211 name=(null) inode=20638 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=212 name=(null) inode=20634 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=213 name=(null) inode=20639 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=214 name=(null) inode=20613 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=215 name=(null) inode=20640 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=216 name=(null) inode=20640 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=217 name=(null) inode=20641 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=218 name=(null) inode=20640 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=219 name=(null) inode=20642 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=220 name=(null) inode=20640 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=221 name=(null) inode=20643 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=222 name=(null) inode=20640 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=223 name=(null) inode=20644 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=224 name=(null) inode=20640 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=225 name=(null) inode=20645 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=226 name=(null) inode=20613 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=227 name=(null) inode=20646 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=228 name=(null) inode=20646 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=229 name=(null) inode=20647 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=230 name=(null) inode=20646 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=231 name=(null) inode=20648 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=232 name=(null) inode=20646 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=233 name=(null) inode=20649 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=234 name=(null) inode=20646 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=235 name=(null) inode=20650 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=236 name=(null) inode=20646 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=237 name=(null) inode=20651 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=238 name=(null) inode=20613 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=239 name=(null) inode=20652 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=240 name=(null) inode=20652 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=241 name=(null) inode=20653 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=242 name=(null) inode=20652 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=243 name=(null) inode=20654 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=244 name=(null) inode=20652 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=245 name=(null) inode=20655 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=246 name=(null) inode=20652 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=247 name=(null) inode=20656 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=248 name=(null) inode=20652 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=249 name=(null) inode=20657 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=250 name=(null) inode=20613 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=251 name=(null) inode=20658 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=252 name=(null) inode=20658 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=253 name=(null) inode=20659 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=254 name=(null) inode=20658 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=255 name=(null) inode=20660 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=256 name=(null) inode=20658 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=257 name=(null) inode=20661 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=258 name=(null) inode=20658 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=259 name=(null) inode=20662 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=260 name=(null) inode=20658 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=261 name=(null) inode=20663 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=262 name=(null) inode=20613 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=263 name=(null) inode=20664 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=264 name=(null) inode=20664 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=265 name=(null) inode=20665 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=266 name=(null) inode=20664 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=267 name=(null) inode=20666 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=268 name=(null) inode=20664 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=269 name=(null) inode=20667 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=270 name=(null) inode=20664 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=271 name=(null) inode=20668 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=272 name=(null) inode=20664 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=273 name=(null) inode=20669 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=274 name=(null) inode=20613 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=275 name=(null) inode=20670 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=276 name=(null) inode=20670 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=277 name=(null) inode=20671 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=278 name=(null) inode=20670 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=279 name=(null) inode=20672 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=280 name=(null) inode=20670 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=281 name=(null) inode=20673 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=282 name=(null) inode=20670 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=283 name=(null) inode=20674 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=284 name=(null) inode=20670 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=285 name=(null) inode=20675 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=286 name=(null) inode=20613 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=287 name=(null) inode=20676 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=288 name=(null) inode=20676 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=289 name=(null) inode=20677 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=290 name=(null) inode=20676 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=291 name=(null) inode=20678 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=292 name=(null) inode=20676 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=293 name=(null) inode=20679 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=294 name=(null) inode=20676 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=295 name=(null) inode=20680 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.299056 kernel: i801_smbus 0000:00:1f.4: SPD Write Disable is set Oct 2 19:46:27.299211 kernel: i801_smbus 0000:00:1f.4: SMBus using PCI interrupt Oct 2 19:46:27.053000 audit: PATH item=296 name=(null) inode=20676 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=297 name=(null) inode=20681 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=298 name=(null) inode=20613 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=299 name=(null) inode=20682 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=300 name=(null) inode=20682 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=301 name=(null) inode=20683 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=302 name=(null) inode=20682 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=303 name=(null) inode=20684 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=304 name=(null) inode=20682 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=305 name=(null) inode=20685 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=306 name=(null) inode=20682 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=307 name=(null) inode=20686 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=308 name=(null) inode=20682 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PATH item=309 name=(null) inode=20687 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:46:27.053000 audit: PROCTITLE proctitle="(udev-worker)" Oct 2 19:46:27.322315 kernel: i2c i2c-0: 2/4 memory slots populated (from DMI) Oct 2 19:46:27.347306 kernel: sdhci-pci 0000:00:14.5: SDHCI controller found [8086:a375] (rev 10) Oct 2 19:46:27.368307 kernel: ipmi device interface Oct 2 19:46:27.391359 kernel: mei_me 0000:00:16.0: Device doesn't have valid ME Interface Oct 2 19:46:27.391579 kernel: mei_me 0000:00:16.4: Device doesn't have valid ME Interface Oct 2 19:46:27.414308 kernel: iTCO_vendor_support: vendor-support=0 Oct 2 19:46:27.491780 kernel: ipmi_si: IPMI System Interface driver Oct 2 19:46:27.491829 kernel: ipmi_si dmi-ipmi-si.0: ipmi_platform: probing via SMBIOS Oct 2 19:46:27.491920 kernel: ipmi_platform: ipmi_si: SMBIOS: io 0xca2 regsize 1 spacing 1 irq 0 Oct 2 19:46:27.537155 kernel: ipmi_si: Adding SMBIOS-specified kcs state machine Oct 2 19:46:27.560593 kernel: sdhci-pci 0000:00:14.5: SDHCI controller found [8086:a375] (rev 10) Oct 2 19:46:27.560689 kernel: ipmi_si IPI0001:00: ipmi_platform: probing via ACPI Oct 2 19:46:27.606133 kernel: ipmi_si IPI0001:00: ipmi_platform: [io 0x0ca2] regsize 1 spacing 1 irq 0 Oct 2 19:46:27.651253 systemd-networkd[1274]: bond0: netdev ready Oct 2 19:46:27.653352 systemd-networkd[1274]: lo: Link UP Oct 2 19:46:27.653355 systemd-networkd[1274]: lo: Gained carrier Oct 2 19:46:27.653822 systemd-networkd[1274]: Enumeration completed Oct 2 19:46:27.653879 systemd[1]: Started systemd-networkd.service. Oct 2 19:46:27.654098 systemd-networkd[1274]: bond0: Configuring with /etc/systemd/network/05-bond0.network. Oct 2 19:46:27.656240 systemd-networkd[1274]: enp1s0f1np1: Configuring with /etc/systemd/network/10-0c:42:a1:97:f6:25.network. Oct 2 19:46:27.657576 kernel: iTCO_wdt iTCO_wdt: Found a Intel PCH TCO device (Version=6, TCOBASE=0x0400) Oct 2 19:46:27.657664 kernel: sdhci-pci 0000:00:14.5: SDHCI controller found [8086:a375] (rev 10) Oct 2 19:46:27.657748 kernel: iTCO_wdt iTCO_wdt: initialized. heartbeat=30 sec (nowayout=0) Oct 2 19:46:27.680304 kernel: sdhci-pci 0000:00:14.5: SDHCI controller found [8086:a375] (rev 10) Oct 2 19:46:27.702307 kernel: ipmi_si dmi-ipmi-si.0: Removing SMBIOS-specified kcs state machine in favor of ACPI Oct 2 19:46:27.702418 kernel: sdhci-pci 0000:00:14.5: SDHCI controller found [8086:a375] (rev 10) Oct 2 19:46:27.717000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:27.748960 kernel: ipmi_si: Adding ACPI-specified kcs state machine Oct 2 19:46:27.748984 kernel: ipmi_si: Trying ACPI-specified kcs state machine at i/o address 0xca2, slave address 0x20, irq 0 Oct 2 19:46:27.769318 kernel: sdhci-pci 0000:00:14.5: SDHCI controller found [8086:a375] (rev 10) Oct 2 19:46:27.794305 kernel: ipmi_si IPI0001:00: The BMC does not support clearing the recv irq bit, compensating, but the BMC needs to be fixed. Oct 2 19:46:27.867349 kernel: intel_rapl_common: Found RAPL domain package Oct 2 19:46:27.867388 kernel: ipmi_si IPI0001:00: IPMI message handler: Found new BMC (man_id: 0x002a7c, prod_id: 0x1b0f, dev_id: 0x20) Oct 2 19:46:27.867507 kernel: sdhci-pci 0000:00:14.5: SDHCI controller found [8086:a375] (rev 10) Oct 2 19:46:27.924343 kernel: intel_rapl_common: Found RAPL domain core Oct 2 19:46:27.959955 kernel: intel_rapl_common: Found RAPL domain dram Oct 2 19:46:27.980339 kernel: sdhci-pci 0000:00:14.5: SDHCI controller found [8086:a375] (rev 10) Oct 2 19:46:28.076305 kernel: ipmi_si IPI0001:00: IPMI kcs interface initialized Oct 2 19:46:28.095320 kernel: ipmi_ssif: IPMI SSIF Interface driver Oct 2 19:46:28.101580 systemd[1]: Finished systemd-udev-settle.service. Oct 2 19:46:28.108000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:28.110071 systemd[1]: Starting lvm2-activation-early.service... Oct 2 19:46:28.126035 lvm[1370]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Oct 2 19:46:28.168643 systemd[1]: Finished lvm2-activation-early.service. Oct 2 19:46:28.175000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:28.176425 systemd[1]: Reached target cryptsetup.target. Oct 2 19:46:28.184951 systemd[1]: Starting lvm2-activation.service... Oct 2 19:46:28.188654 lvm[1371]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Oct 2 19:46:28.227713 systemd[1]: Finished lvm2-activation.service. Oct 2 19:46:28.240000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:28.241456 systemd[1]: Reached target local-fs-pre.target. Oct 2 19:46:28.246338 kernel: mlx5_core 0000:01:00.1 enp1s0f1np1: Link up Oct 2 19:46:28.266353 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Oct 2 19:46:28.266371 systemd[1]: Reached target local-fs.target. Oct 2 19:46:28.272380 kernel: bond0: (slave enp1s0f1np1): Enslaving as a backup interface with an up link Oct 2 19:46:28.273199 systemd-networkd[1274]: enp1s0f0np0: Configuring with /etc/systemd/network/10-0c:42:a1:97:f6:24.network. Oct 2 19:46:28.279498 systemd[1]: Reached target machines.target. Oct 2 19:46:28.297801 systemd[1]: Starting ldconfig.service... Oct 2 19:46:28.303347 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Oct 2 19:46:28.310029 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Oct 2 19:46:28.310055 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 2 19:46:28.310627 systemd[1]: Starting systemd-boot-update.service... Oct 2 19:46:28.317866 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Oct 2 19:46:28.327895 systemd[1]: Starting systemd-machine-id-commit.service... Oct 2 19:46:28.328033 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Oct 2 19:46:28.328072 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Oct 2 19:46:28.328616 systemd[1]: Starting systemd-tmpfiles-setup.service... Oct 2 19:46:28.328883 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1373 (bootctl) Oct 2 19:46:28.329504 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Oct 2 19:46:28.349963 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Oct 2 19:46:28.348000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:28.440351 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Oct 2 19:46:28.440449 kernel: mlx5_core 0000:01:00.0 enp1s0f0np0: Link up Oct 2 19:46:28.479306 kernel: bond0: (slave enp1s0f0np0): Enslaving as a backup interface with an up link Oct 2 19:46:28.479347 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready Oct 2 19:46:28.479670 systemd-tmpfiles[1377]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Oct 2 19:46:28.498263 systemd-networkd[1274]: bond0: Link UP Oct 2 19:46:28.534186 kernel: bond0: (slave enp1s0f1np1): link status definitely up, 10000 Mbps full duplex Oct 2 19:46:28.534215 kernel: bond0: active interface up! Oct 2 19:46:28.534398 systemd-networkd[1274]: enp1s0f1np1: Link UP Oct 2 19:46:28.534520 systemd-networkd[1274]: enp1s0f1np1: Gained carrier Oct 2 19:46:28.535494 systemd-networkd[1274]: enp1s0f1np1: Reconfiguring with /etc/systemd/network/10-0c:42:a1:97:f6:24.network. Oct 2 19:46:28.566306 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Oct 2 19:46:28.636178 systemd-networkd[1274]: enp1s0f0np0: Link UP Oct 2 19:46:28.636356 systemd-networkd[1274]: bond0: Gained carrier Oct 2 19:46:28.636436 systemd-networkd[1274]: enp1s0f0np0: Gained carrier Oct 2 19:46:28.643702 systemd-tmpfiles[1377]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Oct 2 19:46:28.679632 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Oct 2 19:46:28.679659 kernel: bond0: (slave enp1s0f1np1): invalid new link 1 on slave Oct 2 19:46:28.700940 systemd-networkd[1274]: enp1s0f1np1: Link DOWN Oct 2 19:46:28.700942 systemd-networkd[1274]: enp1s0f1np1: Lost carrier Oct 2 19:46:28.701306 kernel: bond0: (slave enp1s0f0np0): link status definitely up, 10000 Mbps full duplex Oct 2 19:46:28.738403 systemd-tmpfiles[1377]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Oct 2 19:46:28.854363 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Oct 2 19:46:28.854921 systemd[1]: Finished systemd-machine-id-commit.service. Oct 2 19:46:28.853000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:28.871757 systemd-fsck[1381]: fsck.fat 4.2 (2021-01-31) Oct 2 19:46:28.871757 systemd-fsck[1381]: /dev/sda1: 789 files, 115069/258078 clusters Oct 2 19:46:28.872674 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Oct 2 19:46:28.877305 kernel: mlx5_core 0000:01:00.1 enp1s0f1np1: Link up Oct 2 19:46:28.892000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:28.895604 systemd[1]: Mounting boot.mount... Oct 2 19:46:28.898305 kernel: bond0: (slave enp1s0f1np1): speed changed to 0 on port 1 Oct 2 19:46:28.899185 systemd-networkd[1274]: enp1s0f1np1: Link UP Oct 2 19:46:28.899367 systemd-networkd[1274]: enp1s0f1np1: Gained carrier Oct 2 19:46:28.927608 systemd[1]: Mounted boot.mount. Oct 2 19:46:28.946244 kernel: bond0: (slave enp1s0f1np1): link status up again after 200 ms Oct 2 19:46:28.946281 kernel: bond0: (slave enp1s0f1np1): link status definitely up, 10000 Mbps full duplex Oct 2 19:46:28.965983 systemd[1]: Finished systemd-boot-update.service. Oct 2 19:46:28.973000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:28.994478 systemd[1]: Finished systemd-tmpfiles-setup.service. Oct 2 19:46:29.001000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:29.003142 systemd[1]: Starting audit-rules.service... Oct 2 19:46:29.010878 systemd[1]: Starting clean-ca-certificates.service... Oct 2 19:46:29.021048 systemd[1]: Starting systemd-journal-catalog-update.service... Oct 2 19:46:29.021000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Oct 2 19:46:29.021000 audit[1401]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc8f90ce60 a2=420 a3=0 items=0 ppid=1384 pid=1401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:46:29.021000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Oct 2 19:46:29.023019 augenrules[1401]: No rules Oct 2 19:46:29.031336 systemd[1]: Starting systemd-resolved.service... Oct 2 19:46:29.040251 systemd[1]: Starting systemd-timesyncd.service... Oct 2 19:46:29.048850 systemd[1]: Starting systemd-update-utmp.service... Oct 2 19:46:29.056650 systemd[1]: Finished audit-rules.service. Oct 2 19:46:29.064452 systemd[1]: Finished clean-ca-certificates.service. Oct 2 19:46:29.072443 systemd[1]: Finished systemd-journal-catalog-update.service. Oct 2 19:46:29.084657 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Oct 2 19:46:29.085108 systemd[1]: Finished systemd-update-utmp.service. Oct 2 19:46:29.085649 ldconfig[1372]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Oct 2 19:46:29.093505 systemd[1]: Finished ldconfig.service. Oct 2 19:46:29.101015 systemd[1]: Starting systemd-update-done.service... Oct 2 19:46:29.108547 systemd[1]: Finished systemd-update-done.service. Oct 2 19:46:29.113112 systemd-resolved[1406]: Positive Trust Anchors: Oct 2 19:46:29.113117 systemd-resolved[1406]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Oct 2 19:46:29.113135 systemd-resolved[1406]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Oct 2 19:46:29.116450 systemd[1]: Started systemd-timesyncd.service. Oct 2 19:46:29.117189 systemd-resolved[1406]: Using system hostname 'ci-3510.3.0-a-b66ea99ec2'. Oct 2 19:46:29.124459 systemd[1]: Started systemd-resolved.service. Oct 2 19:46:29.132432 systemd[1]: Reached target network.target. Oct 2 19:46:29.140375 systemd[1]: Reached target nss-lookup.target. Oct 2 19:46:29.148371 systemd[1]: Reached target sysinit.target. Oct 2 19:46:29.156407 systemd[1]: Started motdgen.path. Oct 2 19:46:29.163393 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Oct 2 19:46:29.173500 systemd[1]: Started systemd-tmpfiles-clean.timer. Oct 2 19:46:29.181505 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Oct 2 19:46:29.181522 systemd[1]: Reached target paths.target. Oct 2 19:46:29.188375 systemd[1]: Reached target time-set.target. Oct 2 19:46:29.196436 systemd[1]: Started logrotate.timer. Oct 2 19:46:29.203425 systemd[1]: Started mdadm.timer. Oct 2 19:46:29.210366 systemd[1]: Reached target timers.target. Oct 2 19:46:29.217507 systemd[1]: Listening on dbus.socket. Oct 2 19:46:29.224888 systemd[1]: Starting docker.socket... Oct 2 19:46:29.232606 systemd[1]: Listening on sshd.socket. Oct 2 19:46:29.239421 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 2 19:46:29.239657 systemd[1]: Listening on docker.socket. Oct 2 19:46:29.246416 systemd[1]: Reached target sockets.target. Oct 2 19:46:29.254370 systemd[1]: Reached target basic.target. Oct 2 19:46:29.261390 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Oct 2 19:46:29.261407 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Oct 2 19:46:29.261877 systemd[1]: Starting containerd.service... Oct 2 19:46:29.268777 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Oct 2 19:46:29.277816 systemd[1]: Starting coreos-metadata.service... Oct 2 19:46:29.284847 systemd[1]: Starting dbus.service... Oct 2 19:46:29.290947 systemd[1]: Starting enable-oem-cloudinit.service... Oct 2 19:46:29.296101 jq[1422]: false Oct 2 19:46:29.298049 systemd[1]: Starting extend-filesystems.service... Oct 2 19:46:29.298120 coreos-metadata[1415]: Oct 02 19:46:29.298 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Oct 2 19:46:29.304438 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Oct 2 19:46:29.305104 systemd[1]: Starting motdgen.service... Oct 2 19:46:29.305533 dbus-daemon[1421]: [system] SELinux support is enabled Oct 2 19:46:29.306637 extend-filesystems[1423]: Found sda Oct 2 19:46:29.306637 extend-filesystems[1423]: Found sda1 Oct 2 19:46:29.349425 kernel: EXT4-fs (sda9): resizing filesystem from 553472 to 116605649 blocks Oct 2 19:46:29.313063 systemd[1]: Starting prepare-cni-plugins.service... Oct 2 19:46:29.349507 coreos-metadata[1418]: Oct 02 19:46:29.307 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Oct 2 19:46:29.349608 extend-filesystems[1423]: Found sda2 Oct 2 19:46:29.349608 extend-filesystems[1423]: Found sda3 Oct 2 19:46:29.349608 extend-filesystems[1423]: Found usr Oct 2 19:46:29.349608 extend-filesystems[1423]: Found sda4 Oct 2 19:46:29.349608 extend-filesystems[1423]: Found sda6 Oct 2 19:46:29.349608 extend-filesystems[1423]: Found sda7 Oct 2 19:46:29.349608 extend-filesystems[1423]: Found sda9 Oct 2 19:46:29.349608 extend-filesystems[1423]: Checking size of /dev/sda9 Oct 2 19:46:29.349608 extend-filesystems[1423]: Resized partition /dev/sda9 Oct 2 19:46:29.343075 systemd[1]: Starting prepare-critools.service... Oct 2 19:46:29.459482 extend-filesystems[1439]: resize2fs 1.46.5 (30-Dec-2021) Oct 2 19:46:29.356909 systemd[1]: Starting ssh-key-proc-cmdline.service... Oct 2 19:46:29.386019 systemd[1]: Starting sshd-keygen.service... Oct 2 19:46:29.398638 systemd[1]: Starting systemd-logind.service... Oct 2 19:46:29.411340 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 2 19:46:29.411935 systemd[1]: Starting tcsd.service... Oct 2 19:46:29.474746 jq[1454]: true Oct 2 19:46:29.418876 systemd-logind[1451]: Watching system buttons on /dev/input/event3 (Power Button) Oct 2 19:46:29.418885 systemd-logind[1451]: Watching system buttons on /dev/input/event2 (Sleep Button) Oct 2 19:46:29.418894 systemd-logind[1451]: Watching system buttons on /dev/input/event0 (HID 0557:2419) Oct 2 19:46:29.419031 systemd-logind[1451]: New seat seat0. Oct 2 19:46:29.424583 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Oct 2 19:46:29.424940 systemd[1]: Starting update-engine.service... Oct 2 19:46:29.432010 systemd[1]: Starting update-ssh-keys-after-ignition.service... Oct 2 19:46:29.451645 systemd[1]: Started dbus.service. Oct 2 19:46:29.467945 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Oct 2 19:46:29.468031 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Oct 2 19:46:29.468180 systemd[1]: motdgen.service: Deactivated successfully. Oct 2 19:46:29.468259 systemd[1]: Finished motdgen.service. Oct 2 19:46:29.477078 update_engine[1453]: I1002 19:46:29.476519 1453 main.cc:92] Flatcar Update Engine starting Oct 2 19:46:29.480226 update_engine[1453]: I1002 19:46:29.480188 1453 update_check_scheduler.cc:74] Next update check in 8m52s Oct 2 19:46:29.482237 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Oct 2 19:46:29.482328 systemd[1]: Finished ssh-key-proc-cmdline.service. Oct 2 19:46:29.488281 tar[1456]: ./ Oct 2 19:46:29.488281 tar[1456]: ./macvlan Oct 2 19:46:29.493242 jq[1460]: true Oct 2 19:46:29.493529 dbus-daemon[1421]: [system] Successfully activated service 'org.freedesktop.systemd1' Oct 2 19:46:29.494751 tar[1457]: crictl Oct 2 19:46:29.498906 systemd[1]: tcsd.service: Skipped due to 'exec-condition'. Oct 2 19:46:29.499005 systemd[1]: Condition check resulted in tcsd.service being skipped. Oct 2 19:46:29.500978 systemd[1]: Started systemd-logind.service. Oct 2 19:46:29.502803 env[1461]: time="2023-10-02T19:46:29.502779838Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Oct 2 19:46:29.509923 tar[1456]: ./static Oct 2 19:46:29.511765 env[1461]: time="2023-10-02T19:46:29.511721350Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Oct 2 19:46:29.513352 env[1461]: time="2023-10-02T19:46:29.513340257Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Oct 2 19:46:29.513407 systemd[1]: Started update-engine.service. Oct 2 19:46:29.513960 env[1461]: time="2023-10-02T19:46:29.513943689Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.132-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Oct 2 19:46:29.513994 env[1461]: time="2023-10-02T19:46:29.513965029Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Oct 2 19:46:29.515667 env[1461]: time="2023-10-02T19:46:29.515654478Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Oct 2 19:46:29.515697 env[1461]: time="2023-10-02T19:46:29.515667207Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Oct 2 19:46:29.515697 env[1461]: time="2023-10-02T19:46:29.515675652Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Oct 2 19:46:29.515697 env[1461]: time="2023-10-02T19:46:29.515681253Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Oct 2 19:46:29.515776 env[1461]: time="2023-10-02T19:46:29.515722332Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Oct 2 19:46:29.515857 env[1461]: time="2023-10-02T19:46:29.515848553Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Oct 2 19:46:29.515921 env[1461]: time="2023-10-02T19:46:29.515911628Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Oct 2 19:46:29.515942 env[1461]: time="2023-10-02T19:46:29.515920977Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Oct 2 19:46:29.517790 env[1461]: time="2023-10-02T19:46:29.517753449Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Oct 2 19:46:29.517790 env[1461]: time="2023-10-02T19:46:29.517765789Z" level=info msg="metadata content store policy set" policy=shared Oct 2 19:46:29.522919 systemd[1]: Started locksmithd.service. Oct 2 19:46:29.527630 bash[1488]: Updated "/home/core/.ssh/authorized_keys" Oct 2 19:46:29.529435 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Oct 2 19:46:29.529521 systemd[1]: Reached target system-config.target. Oct 2 19:46:29.532030 env[1461]: time="2023-10-02T19:46:29.532014522Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Oct 2 19:46:29.532068 env[1461]: time="2023-10-02T19:46:29.532034367Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Oct 2 19:46:29.532068 env[1461]: time="2023-10-02T19:46:29.532042568Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Oct 2 19:46:29.532068 env[1461]: time="2023-10-02T19:46:29.532060759Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Oct 2 19:46:29.532131 env[1461]: time="2023-10-02T19:46:29.532069195Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Oct 2 19:46:29.532131 env[1461]: time="2023-10-02T19:46:29.532076863Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Oct 2 19:46:29.532131 env[1461]: time="2023-10-02T19:46:29.532083782Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Oct 2 19:46:29.532131 env[1461]: time="2023-10-02T19:46:29.532091685Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Oct 2 19:46:29.532131 env[1461]: time="2023-10-02T19:46:29.532099195Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Oct 2 19:46:29.532131 env[1461]: time="2023-10-02T19:46:29.532108096Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Oct 2 19:46:29.532131 env[1461]: time="2023-10-02T19:46:29.532114834Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Oct 2 19:46:29.532131 env[1461]: time="2023-10-02T19:46:29.532121591Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Oct 2 19:46:29.532271 env[1461]: time="2023-10-02T19:46:29.532172636Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Oct 2 19:46:29.532271 env[1461]: time="2023-10-02T19:46:29.532218270Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Oct 2 19:46:29.532360 env[1461]: time="2023-10-02T19:46:29.532352213Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Oct 2 19:46:29.532386 env[1461]: time="2023-10-02T19:46:29.532366812Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Oct 2 19:46:29.532386 env[1461]: time="2023-10-02T19:46:29.532374032Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Oct 2 19:46:29.532420 env[1461]: time="2023-10-02T19:46:29.532399653Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Oct 2 19:46:29.532420 env[1461]: time="2023-10-02T19:46:29.532406941Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Oct 2 19:46:29.532420 env[1461]: time="2023-10-02T19:46:29.532414385Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Oct 2 19:46:29.532470 env[1461]: time="2023-10-02T19:46:29.532420575Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Oct 2 19:46:29.532470 env[1461]: time="2023-10-02T19:46:29.532427210Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Oct 2 19:46:29.532470 env[1461]: time="2023-10-02T19:46:29.532433455Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Oct 2 19:46:29.532470 env[1461]: time="2023-10-02T19:46:29.532439279Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Oct 2 19:46:29.532470 env[1461]: time="2023-10-02T19:46:29.532446899Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Oct 2 19:46:29.532470 env[1461]: time="2023-10-02T19:46:29.532458302Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Oct 2 19:46:29.532570 env[1461]: time="2023-10-02T19:46:29.532530162Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Oct 2 19:46:29.532570 env[1461]: time="2023-10-02T19:46:29.532539270Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Oct 2 19:46:29.532570 env[1461]: time="2023-10-02T19:46:29.532545714Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Oct 2 19:46:29.532570 env[1461]: time="2023-10-02T19:46:29.532552461Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Oct 2 19:46:29.532570 env[1461]: time="2023-10-02T19:46:29.532561053Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Oct 2 19:46:29.532570 env[1461]: time="2023-10-02T19:46:29.532567320Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Oct 2 19:46:29.532668 env[1461]: time="2023-10-02T19:46:29.532577524Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Oct 2 19:46:29.532668 env[1461]: time="2023-10-02T19:46:29.532598480Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Oct 2 19:46:29.532737 env[1461]: time="2023-10-02T19:46:29.532711322Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Oct 2 19:46:29.535247 env[1461]: time="2023-10-02T19:46:29.532742433Z" level=info msg="Connect containerd service" Oct 2 19:46:29.535247 env[1461]: time="2023-10-02T19:46:29.532759510Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Oct 2 19:46:29.535247 env[1461]: time="2023-10-02T19:46:29.533312438Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Oct 2 19:46:29.535247 env[1461]: time="2023-10-02T19:46:29.533395930Z" level=info msg="Start subscribing containerd event" Oct 2 19:46:29.535247 env[1461]: time="2023-10-02T19:46:29.533427076Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Oct 2 19:46:29.535247 env[1461]: time="2023-10-02T19:46:29.533453639Z" level=info msg=serving... address=/run/containerd/containerd.sock Oct 2 19:46:29.535247 env[1461]: time="2023-10-02T19:46:29.533427552Z" level=info msg="Start recovering state" Oct 2 19:46:29.535247 env[1461]: time="2023-10-02T19:46:29.533476372Z" level=info msg="containerd successfully booted in 0.031025s" Oct 2 19:46:29.535247 env[1461]: time="2023-10-02T19:46:29.533504805Z" level=info msg="Start event monitor" Oct 2 19:46:29.535247 env[1461]: time="2023-10-02T19:46:29.533521505Z" level=info msg="Start snapshots syncer" Oct 2 19:46:29.535247 env[1461]: time="2023-10-02T19:46:29.533527691Z" level=info msg="Start cni network conf syncer for default" Oct 2 19:46:29.535247 env[1461]: time="2023-10-02T19:46:29.533534267Z" level=info msg="Start streaming server" Oct 2 19:46:29.535480 tar[1456]: ./vlan Oct 2 19:46:29.537438 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Oct 2 19:46:29.537516 systemd[1]: Reached target user-config.target. Oct 2 19:46:29.546820 systemd[1]: Started containerd.service. Oct 2 19:46:29.553600 systemd[1]: Finished update-ssh-keys-after-ignition.service. Oct 2 19:46:29.554427 tar[1456]: ./portmap Oct 2 19:46:29.573577 tar[1456]: ./host-local Oct 2 19:46:29.588738 locksmithd[1494]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Oct 2 19:46:29.590476 tar[1456]: ./vrf Oct 2 19:46:29.608776 tar[1456]: ./bridge Oct 2 19:46:29.630704 tar[1456]: ./tuning Oct 2 19:46:29.648202 tar[1456]: ./firewall Oct 2 19:46:29.670796 tar[1456]: ./host-device Oct 2 19:46:29.690465 tar[1456]: ./sbr Oct 2 19:46:29.708515 tar[1456]: ./loopback Oct 2 19:46:29.725593 tar[1456]: ./dhcp Oct 2 19:46:29.758085 systemd[1]: Finished prepare-critools.service. Oct 2 19:46:29.775925 tar[1456]: ./ptp Oct 2 19:46:29.797255 tar[1456]: ./ipvlan Oct 2 19:46:29.817981 tar[1456]: ./bandwidth Oct 2 19:46:29.829353 kernel: EXT4-fs (sda9): resized filesystem to 116605649 Oct 2 19:46:29.857234 extend-filesystems[1439]: Filesystem at /dev/sda9 is mounted on /; on-line resizing required Oct 2 19:46:29.857234 extend-filesystems[1439]: old_desc_blocks = 1, new_desc_blocks = 56 Oct 2 19:46:29.857234 extend-filesystems[1439]: The filesystem on /dev/sda9 is now 116605649 (4k) blocks long. Oct 2 19:46:29.886452 extend-filesystems[1423]: Resized filesystem in /dev/sda9 Oct 2 19:46:29.886452 extend-filesystems[1423]: Found sdb Oct 2 19:46:29.857732 systemd[1]: extend-filesystems.service: Deactivated successfully. Oct 2 19:46:29.857821 systemd[1]: Finished extend-filesystems.service. Oct 2 19:46:29.882161 systemd[1]: Finished prepare-cni-plugins.service. Oct 2 19:46:30.386857 sshd_keygen[1450]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Oct 2 19:46:30.399780 systemd[1]: Finished sshd-keygen.service. Oct 2 19:46:30.407360 systemd[1]: Starting issuegen.service... Oct 2 19:46:30.414698 systemd[1]: issuegen.service: Deactivated successfully. Oct 2 19:46:30.414815 systemd[1]: Finished issuegen.service. Oct 2 19:46:30.422344 systemd[1]: Starting systemd-user-sessions.service... Oct 2 19:46:30.430670 systemd[1]: Finished systemd-user-sessions.service. Oct 2 19:46:30.439148 systemd[1]: Started getty@tty1.service. Oct 2 19:46:30.441453 systemd-networkd[1274]: bond0: Gained IPv6LL Oct 2 19:46:30.446999 systemd[1]: Started serial-getty@ttyS1.service. Oct 2 19:46:30.455488 systemd[1]: Reached target getty.target. Oct 2 19:46:31.230532 kernel: mlx5_core 0000:01:00.0: lag map port 1:1 port 2:2 shared_fdb:0 Oct 2 19:46:31.334354 kernel: sdhci-pci 0000:00:14.5: SDHCI controller found [8086:a375] (rev 10) Oct 2 19:46:34.552124 coreos-metadata[1415]: Oct 02 19:46:34.552 INFO Failed to fetch: error sending request for url (https://metadata.packet.net/metadata): error trying to connect: dns error: failed to lookup address information: Temporary failure in name resolution Oct 2 19:46:34.552305 coreos-metadata[1418]: Oct 02 19:46:34.552 INFO Failed to fetch: error sending request for url (https://metadata.packet.net/metadata): error trying to connect: dns error: failed to lookup address information: Temporary failure in name resolution Oct 2 19:46:35.488104 login[1519]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Oct 2 19:46:35.493568 login[1518]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Oct 2 19:46:35.500488 systemd-logind[1451]: New session 1 of user core. Oct 2 19:46:35.501793 systemd[1]: Created slice user-500.slice. Oct 2 19:46:35.502769 systemd[1]: Starting user-runtime-dir@500.service... Oct 2 19:46:35.504740 systemd-logind[1451]: New session 2 of user core. Oct 2 19:46:35.510742 systemd[1]: Finished user-runtime-dir@500.service. Oct 2 19:46:35.512001 systemd[1]: Starting user@500.service... Oct 2 19:46:35.514441 (systemd)[1529]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:46:35.552329 coreos-metadata[1418]: Oct 02 19:46:35.552 INFO Fetching https://metadata.packet.net/metadata: Attempt #2 Oct 2 19:46:35.552888 coreos-metadata[1415]: Oct 02 19:46:35.552 INFO Fetching https://metadata.packet.net/metadata: Attempt #2 Oct 2 19:46:35.557454 coreos-metadata[1415]: Oct 02 19:46:35.557 INFO Failed to fetch: error sending request for url (https://metadata.packet.net/metadata): error trying to connect: dns error: failed to lookup address information: Temporary failure in name resolution Oct 2 19:46:35.561731 coreos-metadata[1418]: Oct 02 19:46:35.561 INFO Failed to fetch: error sending request for url (https://metadata.packet.net/metadata): error trying to connect: dns error: failed to lookup address information: Temporary failure in name resolution Oct 2 19:46:35.627541 systemd[1529]: Queued start job for default target default.target. Oct 2 19:46:35.627769 systemd[1529]: Reached target paths.target. Oct 2 19:46:35.627781 systemd[1529]: Reached target sockets.target. Oct 2 19:46:35.627789 systemd[1529]: Reached target timers.target. Oct 2 19:46:35.627796 systemd[1529]: Reached target basic.target. Oct 2 19:46:35.627814 systemd[1529]: Reached target default.target. Oct 2 19:46:35.627827 systemd[1529]: Startup finished in 108ms. Oct 2 19:46:35.627860 systemd[1]: Started user@500.service. Oct 2 19:46:35.628577 systemd[1]: Started session-1.scope. Oct 2 19:46:35.629047 systemd[1]: Started session-2.scope. Oct 2 19:46:36.655531 kernel: mlx5_core 0000:01:00.0: modify lag map port 1:2 port 2:2 Oct 2 19:46:36.655698 kernel: mlx5_core 0000:01:00.0: modify lag map port 1:1 port 2:2 Oct 2 19:46:37.145063 systemd[1]: Created slice system-sshd.slice. Oct 2 19:46:37.145643 systemd[1]: Started sshd@0-145.40.82.213:22-139.178.89.65:50924.service. Oct 2 19:46:37.187807 sshd[1550]: Accepted publickey for core from 139.178.89.65 port 50924 ssh2: RSA SHA256:M4fPbwtaE29dxMxiSyaa1yIvxglYsCEa+0scmSZWaB4 Oct 2 19:46:37.189032 sshd[1550]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:46:37.193103 systemd-logind[1451]: New session 3 of user core. Oct 2 19:46:37.194407 systemd[1]: Started session-3.scope. Oct 2 19:46:37.250664 systemd[1]: Started sshd@1-145.40.82.213:22-139.178.89.65:50936.service. Oct 2 19:46:37.279617 sshd[1555]: Accepted publickey for core from 139.178.89.65 port 50936 ssh2: RSA SHA256:M4fPbwtaE29dxMxiSyaa1yIvxglYsCEa+0scmSZWaB4 Oct 2 19:46:37.280279 sshd[1555]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:46:37.282685 systemd-logind[1451]: New session 4 of user core. Oct 2 19:46:37.283161 systemd[1]: Started session-4.scope. Oct 2 19:46:37.332882 sshd[1555]: pam_unix(sshd:session): session closed for user core Oct 2 19:46:37.334791 systemd[1]: sshd@1-145.40.82.213:22-139.178.89.65:50936.service: Deactivated successfully. Oct 2 19:46:37.335231 systemd[1]: session-4.scope: Deactivated successfully. Oct 2 19:46:37.335693 systemd-logind[1451]: Session 4 logged out. Waiting for processes to exit. Oct 2 19:46:37.336463 systemd[1]: Started sshd@2-145.40.82.213:22-139.178.89.65:50948.service. Oct 2 19:46:37.337045 systemd-logind[1451]: Removed session 4. Oct 2 19:46:37.368102 sshd[1561]: Accepted publickey for core from 139.178.89.65 port 50948 ssh2: RSA SHA256:M4fPbwtaE29dxMxiSyaa1yIvxglYsCEa+0scmSZWaB4 Oct 2 19:46:37.369030 sshd[1561]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:46:37.372046 systemd-logind[1451]: New session 5 of user core. Oct 2 19:46:37.373091 systemd[1]: Started session-5.scope. Oct 2 19:46:37.428947 sshd[1561]: pam_unix(sshd:session): session closed for user core Oct 2 19:46:37.430170 systemd[1]: sshd@2-145.40.82.213:22-139.178.89.65:50948.service: Deactivated successfully. Oct 2 19:46:37.430623 systemd[1]: session-5.scope: Deactivated successfully. Oct 2 19:46:37.430978 systemd-logind[1451]: Session 5 logged out. Waiting for processes to exit. Oct 2 19:46:37.431378 systemd-logind[1451]: Removed session 5. Oct 2 19:46:37.557627 coreos-metadata[1415]: Oct 02 19:46:37.557 INFO Fetching https://metadata.packet.net/metadata: Attempt #3 Oct 2 19:46:37.561940 coreos-metadata[1418]: Oct 02 19:46:37.561 INFO Fetching https://metadata.packet.net/metadata: Attempt #3 Oct 2 19:46:37.582983 coreos-metadata[1415]: Oct 02 19:46:37.582 INFO Fetch successful Oct 2 19:46:37.585079 coreos-metadata[1418]: Oct 02 19:46:37.585 INFO Fetch successful Oct 2 19:46:37.608110 systemd[1]: Finished coreos-metadata.service. Oct 2 19:46:37.608262 unknown[1415]: wrote ssh authorized keys file for user: core Oct 2 19:46:37.608981 systemd[1]: Started packet-phone-home.service. Oct 2 19:46:37.614899 curl[1568]: % Total % Received % Xferd Average Speed Time Time Time Current Oct 2 19:46:37.615041 curl[1568]: Dload Upload Total Spent Left Speed Oct 2 19:46:37.619142 update-ssh-keys[1569]: Updated "/home/core/.ssh/authorized_keys" Oct 2 19:46:37.619493 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Oct 2 19:46:37.619731 systemd[1]: Reached target multi-user.target. Oct 2 19:46:37.620439 systemd[1]: Starting systemd-update-utmp-runlevel.service... Oct 2 19:46:37.624406 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Oct 2 19:46:37.624489 systemd[1]: Finished systemd-update-utmp-runlevel.service. Oct 2 19:46:37.624629 systemd[1]: Startup finished in 1.859s (kernel) + 19.320s (initrd) + 15.471s (userspace) = 36.651s. Oct 2 19:46:37.769785 curl[1568]: \u000d 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0\u000d 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 Oct 2 19:46:37.772189 systemd[1]: packet-phone-home.service: Deactivated successfully. Oct 2 19:46:47.437913 systemd[1]: Started sshd@3-145.40.82.213:22-139.178.89.65:34372.service. Oct 2 19:46:47.468619 sshd[1572]: Accepted publickey for core from 139.178.89.65 port 34372 ssh2: RSA SHA256:M4fPbwtaE29dxMxiSyaa1yIvxglYsCEa+0scmSZWaB4 Oct 2 19:46:47.469417 sshd[1572]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:46:47.471977 systemd-logind[1451]: New session 6 of user core. Oct 2 19:46:47.472500 systemd[1]: Started session-6.scope. Oct 2 19:46:47.526717 sshd[1572]: pam_unix(sshd:session): session closed for user core Oct 2 19:46:47.528263 systemd[1]: sshd@3-145.40.82.213:22-139.178.89.65:34372.service: Deactivated successfully. Oct 2 19:46:47.528664 systemd[1]: session-6.scope: Deactivated successfully. Oct 2 19:46:47.529037 systemd-logind[1451]: Session 6 logged out. Waiting for processes to exit. Oct 2 19:46:47.529615 systemd[1]: Started sshd@4-145.40.82.213:22-139.178.89.65:34378.service. Oct 2 19:46:47.530056 systemd-logind[1451]: Removed session 6. Oct 2 19:46:47.559836 sshd[1578]: Accepted publickey for core from 139.178.89.65 port 34378 ssh2: RSA SHA256:M4fPbwtaE29dxMxiSyaa1yIvxglYsCEa+0scmSZWaB4 Oct 2 19:46:47.560565 sshd[1578]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:46:47.562942 systemd-logind[1451]: New session 7 of user core. Oct 2 19:46:47.563456 systemd[1]: Started session-7.scope. Oct 2 19:46:47.612808 sshd[1578]: pam_unix(sshd:session): session closed for user core Oct 2 19:46:47.617661 systemd[1]: sshd@4-145.40.82.213:22-139.178.89.65:34378.service: Deactivated successfully. Oct 2 19:46:47.618958 systemd[1]: session-7.scope: Deactivated successfully. Oct 2 19:46:47.620376 systemd-logind[1451]: Session 7 logged out. Waiting for processes to exit. Oct 2 19:46:47.622900 systemd[1]: Started sshd@5-145.40.82.213:22-139.178.89.65:34388.service. Oct 2 19:46:47.625209 systemd-logind[1451]: Removed session 7. Oct 2 19:46:47.677722 sshd[1585]: Accepted publickey for core from 139.178.89.65 port 34388 ssh2: RSA SHA256:M4fPbwtaE29dxMxiSyaa1yIvxglYsCEa+0scmSZWaB4 Oct 2 19:46:47.678383 sshd[1585]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:46:47.680535 systemd-logind[1451]: New session 8 of user core. Oct 2 19:46:47.680933 systemd[1]: Started session-8.scope. Oct 2 19:46:47.731542 sshd[1585]: pam_unix(sshd:session): session closed for user core Oct 2 19:46:47.733005 systemd[1]: sshd@5-145.40.82.213:22-139.178.89.65:34388.service: Deactivated successfully. Oct 2 19:46:47.733332 systemd[1]: session-8.scope: Deactivated successfully. Oct 2 19:46:47.733711 systemd-logind[1451]: Session 8 logged out. Waiting for processes to exit. Oct 2 19:46:47.734226 systemd[1]: Started sshd@6-145.40.82.213:22-139.178.89.65:34396.service. Oct 2 19:46:47.734791 systemd-logind[1451]: Removed session 8. Oct 2 19:46:47.766737 sshd[1591]: Accepted publickey for core from 139.178.89.65 port 34396 ssh2: RSA SHA256:M4fPbwtaE29dxMxiSyaa1yIvxglYsCEa+0scmSZWaB4 Oct 2 19:46:47.767832 sshd[1591]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:46:47.771239 systemd-logind[1451]: New session 9 of user core. Oct 2 19:46:47.771997 systemd[1]: Started session-9.scope. Oct 2 19:46:47.857874 sudo[1594]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Oct 2 19:46:47.858478 sudo[1594]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 2 19:46:47.883796 dbus-daemon[1421]: н\xe9\x99\xe5U: received setenforce notice (enforcing=-1729079056) Oct 2 19:46:47.888858 sudo[1594]: pam_unix(sudo:session): session closed for user root Oct 2 19:46:47.894740 sshd[1591]: pam_unix(sshd:session): session closed for user core Oct 2 19:46:47.901668 systemd[1]: sshd@6-145.40.82.213:22-139.178.89.65:34396.service: Deactivated successfully. Oct 2 19:46:47.902655 systemd[1]: session-9.scope: Deactivated successfully. Oct 2 19:46:47.903039 systemd-logind[1451]: Session 9 logged out. Waiting for processes to exit. Oct 2 19:46:47.903546 systemd[1]: Started sshd@7-145.40.82.213:22-139.178.89.65:34412.service. Oct 2 19:46:47.903993 systemd-logind[1451]: Removed session 9. Oct 2 19:46:47.934797 sshd[1598]: Accepted publickey for core from 139.178.89.65 port 34412 ssh2: RSA SHA256:M4fPbwtaE29dxMxiSyaa1yIvxglYsCEa+0scmSZWaB4 Oct 2 19:46:47.935650 sshd[1598]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:46:47.938553 systemd-logind[1451]: New session 10 of user core. Oct 2 19:46:47.939085 systemd[1]: Started session-10.scope. Oct 2 19:46:48.000498 sudo[1602]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Oct 2 19:46:48.001086 sudo[1602]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 2 19:46:48.008361 sudo[1602]: pam_unix(sudo:session): session closed for user root Oct 2 19:46:48.020651 sudo[1601]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Oct 2 19:46:48.021225 sudo[1601]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 2 19:46:48.045545 systemd[1]: Stopping audit-rules.service... Oct 2 19:46:48.046000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Oct 2 19:46:48.048703 auditctl[1605]: No rules Oct 2 19:46:48.049550 systemd[1]: audit-rules.service: Deactivated successfully. Oct 2 19:46:48.049974 systemd[1]: Stopped audit-rules.service. Oct 2 19:46:48.053843 systemd[1]: Starting audit-rules.service... Oct 2 19:46:48.054225 kernel: kauditd_printk_skb: 351 callbacks suppressed Oct 2 19:46:48.054381 kernel: audit: type=1305 audit(1696276008.046:168): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Oct 2 19:46:48.046000 audit[1605]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffe62483610 a2=420 a3=0 items=0 ppid=1 pid=1605 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:46:48.089906 augenrules[1622]: No rules Oct 2 19:46:48.090544 systemd[1]: Finished audit-rules.service. Oct 2 19:46:48.091376 sudo[1601]: pam_unix(sudo:session): session closed for user root Oct 2 19:46:48.092617 sshd[1598]: pam_unix(sshd:session): session closed for user core Oct 2 19:46:48.094935 systemd[1]: sshd@7-145.40.82.213:22-139.178.89.65:34412.service: Deactivated successfully. Oct 2 19:46:48.095487 systemd[1]: session-10.scope: Deactivated successfully. Oct 2 19:46:48.096101 systemd-logind[1451]: Session 10 logged out. Waiting for processes to exit. Oct 2 19:46:48.097049 systemd[1]: Started sshd@8-145.40.82.213:22-139.178.89.65:34418.service. Oct 2 19:46:48.097828 systemd-logind[1451]: Removed session 10. Oct 2 19:46:48.101430 kernel: audit: type=1300 audit(1696276008.046:168): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffe62483610 a2=420 a3=0 items=0 ppid=1 pid=1605 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:46:48.101480 kernel: audit: type=1327 audit(1696276008.046:168): proctitle=2F7362696E2F617564697463746C002D44 Oct 2 19:46:48.046000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Oct 2 19:46:48.110954 kernel: audit: type=1131 audit(1696276008.048:169): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:48.048000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:48.113014 systemd[1]: Started sshd@9-145.40.82.213:22-182.43.83.179:42414.service. Oct 2 19:46:48.133450 kernel: audit: type=1130 audit(1696276008.089:170): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:48.089000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:48.155902 kernel: audit: type=1106 audit(1696276008.090:171): pid=1601 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:46:48.090000 audit[1601]: USER_END pid=1601 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:46:48.157366 sshd[1628]: Accepted publickey for core from 139.178.89.65 port 34418 ssh2: RSA SHA256:M4fPbwtaE29dxMxiSyaa1yIvxglYsCEa+0scmSZWaB4 Oct 2 19:46:48.158614 sshd[1628]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:46:48.160868 systemd-logind[1451]: New session 11 of user core. Oct 2 19:46:48.161266 systemd[1]: Started session-11.scope. Oct 2 19:46:48.181989 kernel: audit: type=1104 audit(1696276008.090:172): pid=1601 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:46:48.090000 audit[1601]: CRED_DISP pid=1601 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:46:48.205580 kernel: audit: type=1106 audit(1696276008.092:173): pid=1598 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:46:48.092000 audit[1598]: USER_END pid=1598 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:46:48.208627 sudo[1633]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Oct 2 19:46:48.208735 sudo[1633]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 2 19:46:48.237751 kernel: audit: type=1104 audit(1696276008.092:174): pid=1598 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:46:48.092000 audit[1598]: CRED_DISP pid=1598 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:46:48.263584 kernel: audit: type=1131 audit(1696276008.093:175): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-145.40.82.213:22-139.178.89.65:34412 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:48.093000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-145.40.82.213:22-139.178.89.65:34412 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:48.095000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-145.40.82.213:22-139.178.89.65:34418 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:48.111000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-145.40.82.213:22-182.43.83.179:42414 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:48.155000 audit[1628]: USER_ACCT pid=1628 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:46:48.157000 audit[1628]: CRED_ACQ pid=1628 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:46:48.157000 audit[1628]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe68468800 a2=3 a3=0 items=0 ppid=1 pid=1628 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:46:48.157000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:46:48.162000 audit[1628]: USER_START pid=1628 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:46:48.163000 audit[1632]: CRED_ACQ pid=1632 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:46:48.207000 audit[1633]: USER_ACCT pid=1633 uid=500 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:46:48.207000 audit[1633]: CRED_REFR pid=1633 uid=500 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:46:48.208000 audit[1633]: USER_START pid=1633 uid=500 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:46:48.709030 systemd[1]: Starting systemd-networkd-wait-online.service... Oct 2 19:46:48.713103 systemd[1]: Finished systemd-networkd-wait-online.service. Oct 2 19:46:48.711000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:48.713273 systemd[1]: Reached target network-online.target. Oct 2 19:46:48.713908 systemd[1]: Starting docker.service... Oct 2 19:46:48.733657 env[1656]: time="2023-10-02T19:46:48.733595066Z" level=info msg="Starting up" Oct 2 19:46:48.734426 env[1656]: time="2023-10-02T19:46:48.734388185Z" level=info msg="parsed scheme: \"unix\"" module=grpc Oct 2 19:46:48.734426 env[1656]: time="2023-10-02T19:46:48.734400558Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Oct 2 19:46:48.734426 env[1656]: time="2023-10-02T19:46:48.734414898Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Oct 2 19:46:48.734426 env[1656]: time="2023-10-02T19:46:48.734423142Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Oct 2 19:46:48.735425 env[1656]: time="2023-10-02T19:46:48.735366709Z" level=info msg="parsed scheme: \"unix\"" module=grpc Oct 2 19:46:48.735425 env[1656]: time="2023-10-02T19:46:48.735378052Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Oct 2 19:46:48.735425 env[1656]: time="2023-10-02T19:46:48.735391292Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Oct 2 19:46:48.735425 env[1656]: time="2023-10-02T19:46:48.735399533Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Oct 2 19:46:48.752036 env[1656]: time="2023-10-02T19:46:48.752019659Z" level=info msg="Loading containers: start." Oct 2 19:46:48.784000 audit[1700]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1700 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:46:48.784000 audit[1700]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffeeb8bfc70 a2=0 a3=7ffeeb8bfc5c items=0 ppid=1656 pid=1700 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:46:48.784000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Oct 2 19:46:48.786000 audit[1702]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1702 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:46:48.786000 audit[1702]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffdf1620000 a2=0 a3=7ffdf161ffec items=0 ppid=1656 pid=1702 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:46:48.786000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Oct 2 19:46:48.787000 audit[1704]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1704 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:46:48.787000 audit[1704]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7fff1760fbe0 a2=0 a3=7fff1760fbcc items=0 ppid=1656 pid=1704 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:46:48.787000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Oct 2 19:46:48.788000 audit[1706]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1706 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:46:48.788000 audit[1706]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffca840fff0 a2=0 a3=7ffca840ffdc items=0 ppid=1656 pid=1706 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:46:48.788000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Oct 2 19:46:48.789000 audit[1708]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1708 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:46:48.789000 audit[1708]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffcec2145b0 a2=0 a3=7ffcec21459c items=0 ppid=1656 pid=1708 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:46:48.789000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Oct 2 19:46:48.816000 audit[1713]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1713 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:46:48.816000 audit[1713]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffcb0ec48e0 a2=0 a3=7ffcb0ec48cc items=0 ppid=1656 pid=1713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:46:48.816000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Oct 2 19:46:48.820000 audit[1715]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1715 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:46:48.820000 audit[1715]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffdc04297d0 a2=0 a3=7ffdc04297bc items=0 ppid=1656 pid=1715 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:46:48.820000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Oct 2 19:46:48.821000 audit[1717]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1717 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:46:48.821000 audit[1717]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7ffdbc2863e0 a2=0 a3=7ffdbc2863cc items=0 ppid=1656 pid=1717 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:46:48.821000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Oct 2 19:46:48.823000 audit[1719]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1719 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:46:48.823000 audit[1719]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffda5c8bf50 a2=0 a3=7ffda5c8bf3c items=0 ppid=1656 pid=1719 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:46:48.823000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Oct 2 19:46:48.828000 audit[1723]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1723 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:46:48.828000 audit[1723]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffdb8e7b550 a2=0 a3=7ffdb8e7b53c items=0 ppid=1656 pid=1723 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:46:48.828000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Oct 2 19:46:48.829000 audit[1724]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1724 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:46:48.829000 audit[1724]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffec642b6f0 a2=0 a3=7ffec642b6dc items=0 ppid=1656 pid=1724 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:46:48.829000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Oct 2 19:46:48.844357 kernel: Initializing XFRM netlink socket Oct 2 19:46:48.883984 env[1656]: time="2023-10-02T19:46:48.883935879Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Oct 2 19:46:48.884565 systemd-timesyncd[1407]: Network configuration changed, trying to establish connection. Oct 2 19:46:48.913000 audit[1732]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1732 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:46:48.913000 audit[1732]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7ffc05f89700 a2=0 a3=7ffc05f896ec items=0 ppid=1656 pid=1732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:46:48.913000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Oct 2 19:46:48.941000 audit[1735]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1735 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:46:48.941000 audit[1735]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffde37437e0 a2=0 a3=7ffde37437cc items=0 ppid=1656 pid=1735 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:46:48.941000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Oct 2 19:46:48.950000 audit[1738]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1738 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:46:48.950000 audit[1738]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffeb1861800 a2=0 a3=7ffeb18617ec items=0 ppid=1656 pid=1738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:46:48.950000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Oct 2 19:46:48.955000 audit[1740]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1740 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:46:48.955000 audit[1740]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7fff83ecaed0 a2=0 a3=7fff83ecaebc items=0 ppid=1656 pid=1740 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:46:48.955000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Oct 2 19:46:48.961000 audit[1742]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1742 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:46:48.961000 audit[1742]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7ffc700d3b10 a2=0 a3=7ffc700d3afc items=0 ppid=1656 pid=1742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:46:48.961000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Oct 2 19:46:48.966000 audit[1744]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1744 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:46:48.966000 audit[1744]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7ffe76a0cb90 a2=0 a3=7ffe76a0cb7c items=0 ppid=1656 pid=1744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:46:48.966000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Oct 2 19:46:48.972000 audit[1746]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1746 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:46:48.972000 audit[1746]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffd97eb8200 a2=0 a3=7ffd97eb81ec items=0 ppid=1656 pid=1746 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:46:48.972000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Oct 2 19:46:48.996000 audit[1749]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1749 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:46:48.996000 audit[1749]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7ffe645606c0 a2=0 a3=7ffe645606ac items=0 ppid=1656 pid=1749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:46:48.996000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Oct 2 19:46:49.002000 audit[1751]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1751 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:46:49.002000 audit[1751]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7ffd05a934a0 a2=0 a3=7ffd05a9348c items=0 ppid=1656 pid=1751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:46:49.002000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Oct 2 19:46:49.007000 audit[1753]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1753 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:46:49.007000 audit[1753]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7fff7c495290 a2=0 a3=7fff7c49527c items=0 ppid=1656 pid=1753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:46:49.007000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Oct 2 19:46:49.013000 audit[1755]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1755 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:46:49.013000 audit[1755]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffc51c925a0 a2=0 a3=7ffc51c9258c items=0 ppid=1656 pid=1755 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:46:49.013000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Oct 2 19:46:49.015477 systemd-networkd[1274]: docker0: Link UP Oct 2 19:46:49.029000 audit[1759]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1759 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:46:49.029000 audit[1759]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe0c4a2530 a2=0 a3=7ffe0c4a251c items=0 ppid=1656 pid=1759 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:46:49.029000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Oct 2 19:46:49.031000 audit[1760]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1760 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:46:49.031000 audit[1760]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffdebad4d20 a2=0 a3=7ffdebad4d0c items=0 ppid=1656 pid=1760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:46:49.031000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Oct 2 19:46:49.033890 env[1656]: time="2023-10-02T19:46:49.033797076Z" level=info msg="Loading containers: done." Oct 2 19:46:49.056894 env[1656]: time="2023-10-02T19:46:49.056820688Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Oct 2 19:46:49.057279 env[1656]: time="2023-10-02T19:46:49.057232464Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Oct 2 19:46:49.057572 env[1656]: time="2023-10-02T19:46:49.057481763Z" level=info msg="Daemon has completed initialization" Oct 2 19:46:49.058899 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck411657496-merged.mount: Deactivated successfully. Oct 2 19:46:49.082511 systemd[1]: Started docker.service. Oct 2 19:46:49.081000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:49.093941 env[1656]: time="2023-10-02T19:46:49.093821118Z" level=info msg="API listen on /run/docker.sock" Oct 2 19:46:49.130639 systemd-timesyncd[1407]: Contacted time server [2600:3c02:e000:bc::123:0]:123 (2.flatcar.pool.ntp.org). Oct 2 19:46:49.130776 systemd-timesyncd[1407]: Initial clock synchronization to Mon 2023-10-02 19:46:49.068871 UTC. Oct 2 19:46:49.144134 systemd[1]: Reloading. Oct 2 19:46:49.210753 /usr/lib/systemd/system-generators/torcx-generator[1812]: time="2023-10-02T19:46:49Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.0 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.0 /var/lib/torcx/store]" Oct 2 19:46:49.210780 /usr/lib/systemd/system-generators/torcx-generator[1812]: time="2023-10-02T19:46:49Z" level=info msg="torcx already run" Oct 2 19:46:49.327606 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 2 19:46:49.327618 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 2 19:46:49.342010 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 2 19:46:49.386000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:49.386000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:49.386000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:49.386000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:49.386000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:49.386000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:49.386000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:49.386000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:49.386000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:49.387000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:49.387000 audit: BPF prog-id=37 op=LOAD Oct 2 19:46:49.387000 audit: BPF prog-id=32 op=UNLOAD Oct 2 19:46:49.387000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:49.387000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:49.387000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:49.387000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:49.387000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:49.387000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:49.387000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:49.387000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:49.387000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:49.387000 audit: BPF prog-id=38 op=LOAD Oct 2 19:46:49.387000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:49.387000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:49.387000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:49.387000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:49.387000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:49.387000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:49.387000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:49.387000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:49.387000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:49.387000 audit: BPF prog-id=39 op=LOAD Oct 2 19:46:49.387000 audit: BPF prog-id=33 op=UNLOAD Oct 2 19:46:49.387000 audit: BPF prog-id=34 op=UNLOAD Oct 2 19:46:49.388000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:49.388000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:49.388000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:49.388000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:49.388000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:49.388000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:49.388000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:49.388000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:49.388000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:49.388000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:49.388000 audit: BPF prog-id=40 op=LOAD Oct 2 19:46:49.388000 audit: BPF prog-id=30 op=UNLOAD Oct 2 19:46:49.388000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:49.388000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:49.388000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:49.388000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:49.388000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:49.388000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:49.388000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:49.388000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:49.388000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:49.388000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:49.388000 audit: BPF prog-id=41 op=LOAD Oct 2 19:46:49.388000 audit: BPF prog-id=27 op=UNLOAD Oct 2 19:46:49.388000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:49.388000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:49.388000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:49.388000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:49.388000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:49.388000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:49.388000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:49.388000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:49.389000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:49.389000 audit: BPF prog-id=42 op=LOAD Oct 2 19:46:49.389000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:49.389000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:49.389000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:49.389000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:49.389000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:49.389000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:49.389000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:49.389000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:49.389000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:49.389000 audit: BPF prog-id=43 op=LOAD Oct 2 19:46:49.389000 audit: BPF prog-id=28 op=UNLOAD Oct 2 19:46:49.389000 audit: BPF prog-id=29 op=UNLOAD Oct 2 19:46:49.389000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:49.389000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:49.389000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:49.389000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:49.389000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:49.389000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:49.389000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:49.389000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:49.389000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:49.389000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:49.389000 audit: BPF prog-id=44 op=LOAD Oct 2 19:46:49.389000 audit: BPF prog-id=35 op=UNLOAD Oct 2 19:46:49.390000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:49.390000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:49.390000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:49.390000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:49.390000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:49.390000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:49.390000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:49.390000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:49.390000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:49.391000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:49.391000 audit: BPF prog-id=45 op=LOAD Oct 2 19:46:49.391000 audit: BPF prog-id=31 op=UNLOAD Oct 2 19:46:49.391000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:49.391000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:49.391000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:49.391000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:49.391000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:49.391000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:49.391000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:49.391000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:49.391000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:49.391000 audit: BPF prog-id=46 op=LOAD Oct 2 19:46:49.391000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:49.391000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:49.391000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:49.391000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:49.391000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:49.391000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:49.391000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:49.391000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:49.391000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:49.391000 audit: BPF prog-id=47 op=LOAD Oct 2 19:46:49.391000 audit: BPF prog-id=24 op=UNLOAD Oct 2 19:46:49.391000 audit: BPF prog-id=25 op=UNLOAD Oct 2 19:46:49.392000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:49.392000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:49.392000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:49.392000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:49.392000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:49.392000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:49.392000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:49.392000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:49.392000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:49.392000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:49.392000 audit: BPF prog-id=48 op=LOAD Oct 2 19:46:49.392000 audit: BPF prog-id=26 op=UNLOAD Oct 2 19:46:49.392000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:49.392000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:49.392000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:49.392000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:49.392000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:49.392000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:49.392000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:49.392000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:49.392000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:49.392000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:49.392000 audit: BPF prog-id=49 op=LOAD Oct 2 19:46:49.392000 audit: BPF prog-id=21 op=UNLOAD Oct 2 19:46:49.392000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:49.392000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:49.392000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:49.392000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:49.392000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:49.392000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:49.392000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:49.392000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:49.392000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:49.392000 audit: BPF prog-id=50 op=LOAD Oct 2 19:46:49.392000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:49.392000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:49.392000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:49.392000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:49.392000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:49.392000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:49.392000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:49.392000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:49.392000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:46:49.392000 audit: BPF prog-id=51 op=LOAD Oct 2 19:46:49.393000 audit: BPF prog-id=22 op=UNLOAD Oct 2 19:46:49.393000 audit: BPF prog-id=23 op=UNLOAD Oct 2 19:46:49.397492 systemd[1]: Started kubelet.service. Oct 2 19:46:49.396000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:49.421177 kubelet[1868]: E1002 19:46:49.421095 1868 run.go:74] "command failed" err="failed to validate kubelet flags: the container runtime endpoint address was not specified or empty, use --container-runtime-endpoint to set" Oct 2 19:46:49.422394 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Oct 2 19:46:49.422464 systemd[1]: kubelet.service: Failed with result 'exit-code'. Oct 2 19:46:49.421000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 2 19:46:50.265659 env[1461]: time="2023-10-02T19:46:50.265588969Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.26.9\"" Oct 2 19:46:51.082880 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4022130252.mount: Deactivated successfully. Oct 2 19:46:52.375075 env[1461]: time="2023-10-02T19:46:52.375010199Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.26.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:46:52.375622 env[1461]: time="2023-10-02T19:46:52.375580363Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6c52a40ca2c2b6ae662714743a505c761236790f8bfce772fc577c3c965462d2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:46:52.376976 env[1461]: time="2023-10-02T19:46:52.376963972Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.26.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:46:52.377865 env[1461]: time="2023-10-02T19:46:52.377807599Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:5f354253b464a8802ce01ffdd1bb8d0d17785daca4b6c8b84df06e9949e21449,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:46:52.378328 env[1461]: time="2023-10-02T19:46:52.378267996Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.26.9\" returns image reference \"sha256:6c52a40ca2c2b6ae662714743a505c761236790f8bfce772fc577c3c965462d2\"" Oct 2 19:46:52.384788 env[1461]: time="2023-10-02T19:46:52.384721680Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.26.9\"" Oct 2 19:46:53.971415 env[1461]: time="2023-10-02T19:46:53.971384127Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.26.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:46:53.971991 env[1461]: time="2023-10-02T19:46:53.971960982Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:139e76b0f613cb0698b528828be26fb99b86eb7374a2372b3ff41657e2e24c7c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:46:53.973377 env[1461]: time="2023-10-02T19:46:53.973348633Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.26.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:46:53.974222 env[1461]: time="2023-10-02T19:46:53.974209355Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:27bf12cdfcccc8893cd66e4573044ec46fb05964a02f67b3e1a59f66db7ee101,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:46:53.974711 env[1461]: time="2023-10-02T19:46:53.974696927Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.26.9\" returns image reference \"sha256:139e76b0f613cb0698b528828be26fb99b86eb7374a2372b3ff41657e2e24c7c\"" Oct 2 19:46:53.981405 env[1461]: time="2023-10-02T19:46:53.981384406Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.26.9\"" Oct 2 19:46:55.006727 env[1461]: time="2023-10-02T19:46:55.006666619Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.26.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:46:55.007291 env[1461]: time="2023-10-02T19:46:55.007277067Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:93796172d009be2c7ea43f869773c64826626d7f09a926298e9a046781b30999,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:46:55.008443 env[1461]: time="2023-10-02T19:46:55.008431291Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.26.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:46:55.009489 env[1461]: time="2023-10-02T19:46:55.009475759Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:cf0312a97893a0ff42b2863cdb43243afc6397c77f2f2036a73708069e9af315,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:46:55.010291 env[1461]: time="2023-10-02T19:46:55.010277024Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.26.9\" returns image reference \"sha256:93796172d009be2c7ea43f869773c64826626d7f09a926298e9a046781b30999\"" Oct 2 19:46:55.015747 env[1461]: time="2023-10-02T19:46:55.015706039Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.26.9\"" Oct 2 19:46:55.798068 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1384530889.mount: Deactivated successfully. Oct 2 19:46:56.087075 env[1461]: time="2023-10-02T19:46:56.086960607Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.26.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:46:56.087577 env[1461]: time="2023-10-02T19:46:56.087543261Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:95433ef6ee1d55f93a09fe73299b8b95f623d791acd4da21a86bb749626df9ad,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:46:56.088262 env[1461]: time="2023-10-02T19:46:56.088219227Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.26.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:46:56.088999 env[1461]: time="2023-10-02T19:46:56.088960210Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:d8c8e3e8fe630c3f2d84a22722d4891343196483ac4cc02c1ba9345b1bfc8a3d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:46:56.089249 env[1461]: time="2023-10-02T19:46:56.089213987Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.26.9\" returns image reference \"sha256:95433ef6ee1d55f93a09fe73299b8b95f623d791acd4da21a86bb749626df9ad\"" Oct 2 19:46:56.095124 env[1461]: time="2023-10-02T19:46:56.095106532Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" Oct 2 19:46:56.672430 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2517401244.mount: Deactivated successfully. Oct 2 19:46:56.673907 env[1461]: time="2023-10-02T19:46:56.673866803Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:46:56.674580 env[1461]: time="2023-10-02T19:46:56.674544248Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:46:56.675243 env[1461]: time="2023-10-02T19:46:56.675210990Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:46:56.675930 env[1461]: time="2023-10-02T19:46:56.675882860Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:46:56.676259 env[1461]: time="2023-10-02T19:46:56.676222907Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c\"" Oct 2 19:46:56.681200 env[1461]: time="2023-10-02T19:46:56.681183937Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.6-0\"" Oct 2 19:46:57.385053 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3316579074.mount: Deactivated successfully. Oct 2 19:46:59.519321 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Oct 2 19:46:59.519000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:59.519484 systemd[1]: Stopped kubelet.service. Oct 2 19:46:59.520310 systemd[1]: Started kubelet.service. Oct 2 19:46:59.542031 kernel: kauditd_printk_skb: 260 callbacks suppressed Oct 2 19:46:59.542179 kernel: audit: type=1130 audit(1696276019.519:386): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:59.544473 kubelet[1961]: E1002 19:46:59.544399 1961 run.go:74] "command failed" err="failed to validate kubelet flags: the container runtime endpoint address was not specified or empty, use --container-runtime-endpoint to set" Oct 2 19:46:59.546599 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Oct 2 19:46:59.546683 systemd[1]: kubelet.service: Failed with result 'exit-code'. Oct 2 19:46:59.519000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:59.653939 kernel: audit: type=1131 audit(1696276019.519:387): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:59.653975 kernel: audit: type=1130 audit(1696276019.520:388): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:59.520000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:46:59.710805 kernel: audit: type=1131 audit(1696276019.546:389): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 2 19:46:59.546000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 2 19:47:00.285536 env[1461]: time="2023-10-02T19:47:00.285473181Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.6-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:47:00.286068 env[1461]: time="2023-10-02T19:47:00.286025093Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fce326961ae2d51a5f726883fd59d2a8c2ccc3e45d3bb859882db58e422e59e7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:47:00.286998 env[1461]: time="2023-10-02T19:47:00.286959632Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.6-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:47:00.287757 env[1461]: time="2023-10-02T19:47:00.287711702Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:dd75ec974b0a2a6f6bb47001ba09207976e625db898d1b16735528c009cb171c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:47:00.288531 env[1461]: time="2023-10-02T19:47:00.288487851Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.6-0\" returns image reference \"sha256:fce326961ae2d51a5f726883fd59d2a8c2ccc3e45d3bb859882db58e422e59e7\"" Oct 2 19:47:00.293801 env[1461]: time="2023-10-02T19:47:00.293756483Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.9.3\"" Oct 2 19:47:00.888857 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount6721380.mount: Deactivated successfully. Oct 2 19:47:01.316424 systemd[1]: Started sshd@10-145.40.82.213:22-101.33.80.197:50016.service. Oct 2 19:47:01.315000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-145.40.82.213:22-101.33.80.197:50016 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:47:01.325207 env[1461]: time="2023-10-02T19:47:01.325165110Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.9.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:47:01.325735 env[1461]: time="2023-10-02T19:47:01.325688167Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5185b96f0becf59032b8e3646e99f84d9655dff3ac9e2605e0dc77f9c441ae4a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:47:01.326483 env[1461]: time="2023-10-02T19:47:01.326448521Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.9.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:47:01.327262 env[1461]: time="2023-10-02T19:47:01.327226716Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:8e352a029d304ca7431c6507b56800636c321cb52289686a581ab70aaa8a2e2a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:47:01.327690 env[1461]: time="2023-10-02T19:47:01.327637955Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.9.3\" returns image reference \"sha256:5185b96f0becf59032b8e3646e99f84d9655dff3ac9e2605e0dc77f9c441ae4a\"" Oct 2 19:47:01.402540 kernel: audit: type=1130 audit(1696276021.315:390): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-145.40.82.213:22-101.33.80.197:50016 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:47:02.661560 systemd[1]: Stopped kubelet.service. Oct 2 19:47:02.660000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:47:02.669793 systemd[1]: Reloading. Oct 2 19:47:02.701731 /usr/lib/systemd/system-generators/torcx-generator[2121]: time="2023-10-02T19:47:02Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.0 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.0 /var/lib/torcx/store]" Oct 2 19:47:02.701746 /usr/lib/systemd/system-generators/torcx-generator[2121]: time="2023-10-02T19:47:02Z" level=info msg="torcx already run" Oct 2 19:47:02.660000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:47:02.790085 kernel: audit: type=1130 audit(1696276022.660:391): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:47:02.790121 kernel: audit: type=1131 audit(1696276022.660:392): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:47:02.808713 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 2 19:47:02.808720 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 2 19:47:02.819477 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 2 19:47:02.866000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:02.866000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:02.990912 kernel: audit: type=1400 audit(1696276022.866:393): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:02.990987 kernel: audit: type=1400 audit(1696276022.866:394): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:02.991005 kernel: audit: type=1400 audit(1696276022.866:395): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:02.866000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:02.866000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:02.866000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:02.866000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:02.866000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:02.866000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:02.866000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:02.989000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:02.989000 audit: BPF prog-id=52 op=LOAD Oct 2 19:47:02.989000 audit: BPF prog-id=37 op=UNLOAD Oct 2 19:47:02.989000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:02.989000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:02.989000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:02.989000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:02.989000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:02.989000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:02.989000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:02.989000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:03.053000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:03.053000 audit: BPF prog-id=53 op=LOAD Oct 2 19:47:03.053000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:03.053000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:03.053000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:03.053000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:03.053000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:03.053000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:03.053000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:03.053000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:03.053000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:03.053000 audit: BPF prog-id=54 op=LOAD Oct 2 19:47:03.053000 audit: BPF prog-id=38 op=UNLOAD Oct 2 19:47:03.053000 audit: BPF prog-id=39 op=UNLOAD Oct 2 19:47:03.053000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:03.053000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:03.053000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:03.053000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:03.053000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:03.053000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:03.053000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:03.053000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:03.053000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:03.054000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:03.054000 audit: BPF prog-id=55 op=LOAD Oct 2 19:47:03.054000 audit: BPF prog-id=40 op=UNLOAD Oct 2 19:47:03.054000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:03.054000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:03.054000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:03.054000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:03.054000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:03.054000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:03.054000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:03.054000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:03.054000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:03.054000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:03.054000 audit: BPF prog-id=56 op=LOAD Oct 2 19:47:03.054000 audit: BPF prog-id=41 op=UNLOAD Oct 2 19:47:03.054000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:03.054000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:03.054000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:03.054000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:03.054000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:03.054000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:03.054000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:03.054000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:03.054000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:03.054000 audit: BPF prog-id=57 op=LOAD Oct 2 19:47:03.054000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:03.054000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:03.054000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:03.054000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:03.054000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:03.054000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:03.054000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:03.054000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:03.055000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:03.055000 audit: BPF prog-id=58 op=LOAD Oct 2 19:47:03.055000 audit: BPF prog-id=42 op=UNLOAD Oct 2 19:47:03.055000 audit: BPF prog-id=43 op=UNLOAD Oct 2 19:47:03.055000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:03.055000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:03.055000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:03.055000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:03.055000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:03.055000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:03.055000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:03.055000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:03.055000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:03.055000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:03.055000 audit: BPF prog-id=59 op=LOAD Oct 2 19:47:03.055000 audit: BPF prog-id=44 op=UNLOAD Oct 2 19:47:03.056000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:03.056000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:03.056000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:03.056000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:03.056000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:03.056000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:03.056000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:03.056000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:03.056000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:03.056000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:03.056000 audit: BPF prog-id=60 op=LOAD Oct 2 19:47:03.056000 audit: BPF prog-id=45 op=UNLOAD Oct 2 19:47:03.057000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:03.057000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:03.057000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:03.057000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:03.057000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:03.057000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:03.057000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:03.057000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:03.057000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:03.057000 audit: BPF prog-id=61 op=LOAD Oct 2 19:47:03.057000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:03.057000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:03.057000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:03.057000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:03.057000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:03.057000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:03.057000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:03.057000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:03.057000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:03.057000 audit: BPF prog-id=62 op=LOAD Oct 2 19:47:03.057000 audit: BPF prog-id=46 op=UNLOAD Oct 2 19:47:03.057000 audit: BPF prog-id=47 op=UNLOAD Oct 2 19:47:03.057000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:03.057000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:03.057000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:03.057000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:03.057000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:03.057000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:03.057000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:03.057000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:03.057000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:03.058000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:03.058000 audit: BPF prog-id=63 op=LOAD Oct 2 19:47:03.058000 audit: BPF prog-id=48 op=UNLOAD Oct 2 19:47:03.058000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:03.058000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:03.058000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:03.058000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:03.058000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:03.058000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:03.058000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:03.058000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:03.058000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:03.058000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:03.058000 audit: BPF prog-id=64 op=LOAD Oct 2 19:47:03.058000 audit: BPF prog-id=49 op=UNLOAD Oct 2 19:47:03.058000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:03.058000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:03.058000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:03.058000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:03.058000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:03.058000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:03.058000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:03.058000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:03.058000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:03.058000 audit: BPF prog-id=65 op=LOAD Oct 2 19:47:03.058000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:03.058000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:03.058000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:03.058000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:03.058000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:03.058000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:03.058000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:03.058000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:03.058000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:03.058000 audit: BPF prog-id=66 op=LOAD Oct 2 19:47:03.058000 audit: BPF prog-id=50 op=UNLOAD Oct 2 19:47:03.058000 audit: BPF prog-id=51 op=UNLOAD Oct 2 19:47:03.066002 systemd[1]: Started kubelet.service. Oct 2 19:47:03.064000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:47:03.088578 kubelet[2182]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Oct 2 19:47:03.088578 kubelet[2182]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Oct 2 19:47:03.088578 kubelet[2182]: I1002 19:47:03.088566 2182 server.go:198] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Oct 2 19:47:03.089345 kubelet[2182]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Oct 2 19:47:03.089345 kubelet[2182]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Oct 2 19:47:03.203524 sshd[1986]: Invalid user yzc from 101.33.80.197 port 50016 Oct 2 19:47:03.204649 sshd[1986]: pam_faillock(sshd:auth): User unknown Oct 2 19:47:03.204920 sshd[1986]: pam_unix(sshd:auth): check pass; user unknown Oct 2 19:47:03.204935 sshd[1986]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.33.80.197 Oct 2 19:47:03.205119 sshd[1986]: pam_faillock(sshd:auth): User unknown Oct 2 19:47:03.203000 audit[1986]: USER_AUTH pid=1986 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="yzc" exe="/usr/sbin/sshd" hostname=101.33.80.197 addr=101.33.80.197 terminal=ssh res=failed' Oct 2 19:47:03.380101 kubelet[2182]: I1002 19:47:03.380064 2182 server.go:412] "Kubelet version" kubeletVersion="v1.26.5" Oct 2 19:47:03.380101 kubelet[2182]: I1002 19:47:03.380075 2182 server.go:414] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Oct 2 19:47:03.380198 kubelet[2182]: I1002 19:47:03.380192 2182 server.go:836] "Client rotation is on, will bootstrap in background" Oct 2 19:47:03.381579 kubelet[2182]: I1002 19:47:03.381535 2182 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Oct 2 19:47:03.381938 kubelet[2182]: E1002 19:47:03.381902 2182 certificate_manager.go:471] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://145.40.82.213:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 145.40.82.213:6443: connect: connection refused Oct 2 19:47:03.400923 kubelet[2182]: I1002 19:47:03.400887 2182 server.go:659] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Oct 2 19:47:03.401020 kubelet[2182]: I1002 19:47:03.400978 2182 container_manager_linux.go:267] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Oct 2 19:47:03.401020 kubelet[2182]: I1002 19:47:03.401014 2182 container_manager_linux.go:272] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:} {Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:} {Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] ExperimentalTopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] ExperimentalPodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms ExperimentalTopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]} Oct 2 19:47:03.401112 kubelet[2182]: I1002 19:47:03.401024 2182 topology_manager.go:134] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Oct 2 19:47:03.401112 kubelet[2182]: I1002 19:47:03.401031 2182 container_manager_linux.go:308] "Creating device plugin manager" Oct 2 19:47:03.401112 kubelet[2182]: I1002 19:47:03.401079 2182 state_mem.go:36] "Initialized new in-memory state store" Oct 2 19:47:03.402416 kubelet[2182]: I1002 19:47:03.402409 2182 kubelet.go:398] "Attempting to sync node with API server" Oct 2 19:47:03.402447 kubelet[2182]: I1002 19:47:03.402418 2182 kubelet.go:286] "Adding static pod path" path="/etc/kubernetes/manifests" Oct 2 19:47:03.402447 kubelet[2182]: I1002 19:47:03.402431 2182 kubelet.go:297] "Adding apiserver pod source" Oct 2 19:47:03.402447 kubelet[2182]: I1002 19:47:03.402438 2182 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Oct 2 19:47:03.402697 kubelet[2182]: I1002 19:47:03.402688 2182 kuberuntime_manager.go:244] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Oct 2 19:47:03.402734 kubelet[2182]: W1002 19:47:03.402714 2182 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://145.40.82.213:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.0-a-b66ea99ec2&limit=500&resourceVersion=0": dial tcp 145.40.82.213:6443: connect: connection refused Oct 2 19:47:03.402756 kubelet[2182]: E1002 19:47:03.402740 2182 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://145.40.82.213:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.0-a-b66ea99ec2&limit=500&resourceVersion=0": dial tcp 145.40.82.213:6443: connect: connection refused Oct 2 19:47:03.402803 kubelet[2182]: W1002 19:47:03.402782 2182 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://145.40.82.213:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 145.40.82.213:6443: connect: connection refused Oct 2 19:47:03.402827 kubelet[2182]: E1002 19:47:03.402811 2182 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://145.40.82.213:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 145.40.82.213:6443: connect: connection refused Oct 2 19:47:03.402845 kubelet[2182]: W1002 19:47:03.402839 2182 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Oct 2 19:47:03.403063 kubelet[2182]: I1002 19:47:03.403057 2182 server.go:1186] "Started kubelet" Oct 2 19:47:03.403137 kubelet[2182]: I1002 19:47:03.403130 2182 server.go:161] "Starting to listen" address="0.0.0.0" port=10250 Oct 2 19:47:03.403349 kubelet[2182]: E1002 19:47:03.403293 2182 event.go:276] Unable to write event: '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510.3.0-a-b66ea99ec2.178a620e57f36b86", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510.3.0-a-b66ea99ec2", UID:"ci-3510.3.0-a-b66ea99ec2", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.0-a-b66ea99ec2"}, FirstTimestamp:time.Date(2023, time.October, 2, 19, 47, 3, 403047814, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 19, 47, 3, 403047814, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'Post "https://145.40.82.213:6443/api/v1/namespaces/default/events": dial tcp 145.40.82.213:6443: connect: connection refused'(may retry after sleeping) Oct 2 19:47:03.403414 kubelet[2182]: E1002 19:47:03.403367 2182 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Oct 2 19:47:03.403414 kubelet[2182]: E1002 19:47:03.403377 2182 kubelet.go:1386] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Oct 2 19:47:03.403000 audit[2182]: AVC avc: denied { mac_admin } for pid=2182 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:03.403000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 19:47:03.403000 audit[2182]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00055ede0 a1=c0010a8660 a2=c00055edb0 a3=25 items=0 ppid=1 pid=2182 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:03.403000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 19:47:03.403000 audit[2182]: AVC avc: denied { mac_admin } for pid=2182 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:03.403000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 19:47:03.403000 audit[2182]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000299640 a1=c0010a8678 a2=c00055ee70 a3=25 items=0 ppid=1 pid=2182 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:03.403000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 19:47:03.404001 kubelet[2182]: I1002 19:47:03.403776 2182 server.go:451] "Adding debug handlers to kubelet server" Oct 2 19:47:03.404001 kubelet[2182]: I1002 19:47:03.403790 2182 kubelet.go:1341] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Oct 2 19:47:03.404001 kubelet[2182]: I1002 19:47:03.403819 2182 kubelet.go:1345] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Oct 2 19:47:03.404001 kubelet[2182]: I1002 19:47:03.403859 2182 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Oct 2 19:47:03.404001 kubelet[2182]: I1002 19:47:03.403889 2182 volume_manager.go:293] "Starting Kubelet Volume Manager" Oct 2 19:47:03.404001 kubelet[2182]: I1002 19:47:03.403913 2182 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Oct 2 19:47:03.404155 kubelet[2182]: E1002 19:47:03.404023 2182 controller.go:146] failed to ensure lease exists, will retry in 200ms, error: Get "https://145.40.82.213:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.0-a-b66ea99ec2?timeout=10s": dial tcp 145.40.82.213:6443: connect: connection refused Oct 2 19:47:03.404383 kubelet[2182]: W1002 19:47:03.404249 2182 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://145.40.82.213:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 145.40.82.213:6443: connect: connection refused Oct 2 19:47:03.404431 kubelet[2182]: E1002 19:47:03.404390 2182 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://145.40.82.213:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 145.40.82.213:6443: connect: connection refused Oct 2 19:47:03.405000 audit[2205]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=2205 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:47:03.405000 audit[2205]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffc47ead7c0 a2=0 a3=7ffc47ead7ac items=0 ppid=2182 pid=2205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:03.405000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Oct 2 19:47:03.405000 audit[2206]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=2206 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:47:03.405000 audit[2206]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd1a582e20 a2=0 a3=7ffd1a582e0c items=0 ppid=2182 pid=2206 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:03.405000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Oct 2 19:47:03.406000 audit[2208]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=2208 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:47:03.406000 audit[2208]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fff147560f0 a2=0 a3=7fff147560dc items=0 ppid=2182 pid=2208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:03.406000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 2 19:47:03.407000 audit[2210]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=2210 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:47:03.407000 audit[2210]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffddf776b00 a2=0 a3=7ffddf776aec items=0 ppid=2182 pid=2210 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:03.407000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 2 19:47:03.410000 audit[2213]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=2213 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:47:03.410000 audit[2213]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7fff151d6fb0 a2=0 a3=7fff151d6f9c items=0 ppid=2182 pid=2213 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:03.410000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Oct 2 19:47:03.411000 audit[2214]: NETFILTER_CFG table=nat:31 family=2 entries=1 op=nft_register_chain pid=2214 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:47:03.411000 audit[2214]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffea369e150 a2=0 a3=7ffea369e13c items=0 ppid=2182 pid=2214 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:03.411000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D44524F50002D74006E6174 Oct 2 19:47:03.413000 audit[2218]: NETFILTER_CFG table=nat:32 family=2 entries=1 op=nft_register_rule pid=2218 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:47:03.413000 audit[2218]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffdc40fd9b0 a2=0 a3=7ffdc40fd99c items=0 ppid=2182 pid=2218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:03.413000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D44524F50002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303038303030 Oct 2 19:47:03.415000 audit[2221]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=2221 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:47:03.415000 audit[2221]: SYSCALL arch=c000003e syscall=46 success=yes exit=664 a0=3 a1=7ffdec1164f0 a2=0 a3=7ffdec1164dc items=0 ppid=2182 pid=2221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:03.415000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206669726577616C6C20666F722064726F7070696E67206D61726B6564207061636B657473002D6D006D61726B Oct 2 19:47:03.416000 audit[2222]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=2222 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:47:03.416000 audit[2222]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffed8e06890 a2=0 a3=7ffed8e0687c items=0 ppid=2182 pid=2222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:03.416000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D4D415351002D74006E6174 Oct 2 19:47:03.416000 audit[2223]: NETFILTER_CFG table=nat:35 family=2 entries=1 op=nft_register_chain pid=2223 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:47:03.416000 audit[2223]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcf744baf0 a2=0 a3=7ffcf744badc items=0 ppid=2182 pid=2223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:03.416000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Oct 2 19:47:03.417929 kubelet[2182]: I1002 19:47:03.417895 2182 cpu_manager.go:214] "Starting CPU manager" policy="none" Oct 2 19:47:03.417929 kubelet[2182]: I1002 19:47:03.417923 2182 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Oct 2 19:47:03.417929 kubelet[2182]: I1002 19:47:03.417932 2182 state_mem.go:36] "Initialized new in-memory state store" Oct 2 19:47:03.418000 audit[2225]: NETFILTER_CFG table=nat:36 family=2 entries=1 op=nft_register_rule pid=2225 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:47:03.418000 audit[2225]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7fff704339f0 a2=0 a3=7fff704339dc items=0 ppid=2182 pid=2225 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:03.418000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D4D415351002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303034303030 Oct 2 19:47:03.418828 kubelet[2182]: I1002 19:47:03.418793 2182 policy_none.go:49] "None policy: Start" Oct 2 19:47:03.419136 kubelet[2182]: I1002 19:47:03.419127 2182 memory_manager.go:169] "Starting memorymanager" policy="None" Oct 2 19:47:03.419136 kubelet[2182]: I1002 19:47:03.419138 2182 state_mem.go:35] "Initializing new in-memory state store" Oct 2 19:47:03.419000 audit[2227]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_rule pid=2227 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:47:03.419000 audit[2227]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7ffd240bf620 a2=0 a3=7ffd240bf60c items=0 ppid=2182 pid=2227 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:03.419000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Oct 2 19:47:03.420000 audit[2229]: NETFILTER_CFG table=nat:38 family=2 entries=1 op=nft_register_rule pid=2229 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:47:03.420000 audit[2229]: SYSCALL arch=c000003e syscall=46 success=yes exit=364 a0=3 a1=7ffc9b3bd2c0 a2=0 a3=7ffc9b3bd2ac items=0 ppid=2182 pid=2229 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:03.420000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D006D61726B0000002D2D6D61726B00307830303030343030302F30783030303034303030002D6A0052455455524E Oct 2 19:47:03.421460 systemd[1]: Created slice kubepods.slice. Oct 2 19:47:03.421000 audit[2231]: NETFILTER_CFG table=nat:39 family=2 entries=1 op=nft_register_rule pid=2231 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:47:03.421000 audit[2231]: SYSCALL arch=c000003e syscall=46 success=yes exit=220 a0=3 a1=7ffccbfb91e0 a2=0 a3=7ffccbfb91cc items=0 ppid=2182 pid=2231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:03.421000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6A004D41524B002D2D786F722D6D61726B0030783030303034303030 Oct 2 19:47:03.422000 audit[2233]: NETFILTER_CFG table=nat:40 family=2 entries=1 op=nft_register_rule pid=2233 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:47:03.422000 audit[2233]: SYSCALL arch=c000003e syscall=46 success=yes exit=540 a0=3 a1=7ffeb4f98640 a2=0 a3=7ffeb4f9862c items=0 ppid=2182 pid=2233 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:03.422000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732073657276696365207472616666696320726571756972696E6720534E4154002D6A004D415351554552414445 Oct 2 19:47:03.423179 kubelet[2182]: I1002 19:47:03.423127 2182 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Oct 2 19:47:03.423249 systemd[1]: Created slice kubepods-burstable.slice. Oct 2 19:47:03.423000 audit[2234]: NETFILTER_CFG table=mangle:41 family=10 entries=2 op=nft_register_chain pid=2234 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:47:03.423000 audit[2234]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffcccc95990 a2=0 a3=7ffcccc9597c items=0 ppid=2182 pid=2234 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:03.423000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Oct 2 19:47:03.423000 audit[2235]: NETFILTER_CFG table=mangle:42 family=2 entries=1 op=nft_register_chain pid=2235 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:47:03.423000 audit[2235]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff89c20e90 a2=0 a3=7fff89c20e7c items=0 ppid=2182 pid=2235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:03.423000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Oct 2 19:47:03.423000 audit[2236]: NETFILTER_CFG table=nat:43 family=10 entries=2 op=nft_register_chain pid=2236 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:47:03.423000 audit[2236]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffd4af09150 a2=0 a3=7ffd4af0913c items=0 ppid=2182 pid=2236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:03.423000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D44524F50002D74006E6174 Oct 2 19:47:03.423000 audit[2237]: NETFILTER_CFG table=nat:44 family=2 entries=1 op=nft_register_chain pid=2237 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:47:03.423000 audit[2237]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff9cd87e40 a2=0 a3=7fff9cd87e2c items=0 ppid=2182 pid=2237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:03.423000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Oct 2 19:47:03.424529 systemd[1]: Created slice kubepods-besteffort.slice. Oct 2 19:47:03.424000 audit[2239]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_chain pid=2239 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:47:03.424000 audit[2239]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc3413ac30 a2=0 a3=7ffc3413ac1c items=0 ppid=2182 pid=2239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:03.424000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Oct 2 19:47:03.424000 audit[2240]: NETFILTER_CFG table=nat:46 family=10 entries=1 op=nft_register_rule pid=2240 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:47:03.424000 audit[2240]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffc60c7eff0 a2=0 a3=7ffc60c7efdc items=0 ppid=2182 pid=2240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:03.424000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D44524F50002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303038303030 Oct 2 19:47:03.425000 audit[2241]: NETFILTER_CFG table=filter:47 family=10 entries=2 op=nft_register_chain pid=2241 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:47:03.425000 audit[2241]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7ffc49097120 a2=0 a3=7ffc4909710c items=0 ppid=2182 pid=2241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:03.425000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Oct 2 19:47:03.426000 audit[2243]: NETFILTER_CFG table=filter:48 family=10 entries=1 op=nft_register_rule pid=2243 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:47:03.426000 audit[2243]: SYSCALL arch=c000003e syscall=46 success=yes exit=664 a0=3 a1=7ffe50767a90 a2=0 a3=7ffe50767a7c items=0 ppid=2182 pid=2243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:03.426000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206669726577616C6C20666F722064726F7070696E67206D61726B6564207061636B657473002D6D006D61726B Oct 2 19:47:03.426000 audit[2244]: NETFILTER_CFG table=nat:49 family=10 entries=1 op=nft_register_chain pid=2244 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:47:03.426000 audit[2244]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff28d39e30 a2=0 a3=7fff28d39e1c items=0 ppid=2182 pid=2244 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:03.426000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D4D415351002D74006E6174 Oct 2 19:47:03.427000 audit[2245]: NETFILTER_CFG table=nat:50 family=10 entries=1 op=nft_register_chain pid=2245 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:47:03.427000 audit[2245]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffce9d7ddd0 a2=0 a3=7ffce9d7ddbc items=0 ppid=2182 pid=2245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:03.427000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Oct 2 19:47:03.428000 audit[2247]: NETFILTER_CFG table=nat:51 family=10 entries=1 op=nft_register_rule pid=2247 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:47:03.428000 audit[2247]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7fff811bece0 a2=0 a3=7fff811beccc items=0 ppid=2182 pid=2247 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:03.428000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D4D415351002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303034303030 Oct 2 19:47:03.429000 audit[2249]: NETFILTER_CFG table=nat:52 family=10 entries=2 op=nft_register_chain pid=2249 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:47:03.429000 audit[2249]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffff6ca95f0 a2=0 a3=7ffff6ca95dc items=0 ppid=2182 pid=2249 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:03.429000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Oct 2 19:47:03.430000 audit[2251]: NETFILTER_CFG table=nat:53 family=10 entries=1 op=nft_register_rule pid=2251 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:47:03.430000 audit[2251]: SYSCALL arch=c000003e syscall=46 success=yes exit=364 a0=3 a1=7fff3dc07040 a2=0 a3=7fff3dc0702c items=0 ppid=2182 pid=2251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:03.430000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D006D61726B0000002D2D6D61726B00307830303030343030302F30783030303034303030002D6A0052455455524E Oct 2 19:47:03.431000 audit[2253]: NETFILTER_CFG table=nat:54 family=10 entries=1 op=nft_register_rule pid=2253 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:47:03.431000 audit[2253]: SYSCALL arch=c000003e syscall=46 success=yes exit=220 a0=3 a1=7ffdb0dc4880 a2=0 a3=7ffdb0dc486c items=0 ppid=2182 pid=2253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:03.431000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6A004D41524B002D2D786F722D6D61726B0030783030303034303030 Oct 2 19:47:03.433000 audit[2255]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_rule pid=2255 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:47:03.433000 audit[2255]: SYSCALL arch=c000003e syscall=46 success=yes exit=556 a0=3 a1=7ffd84aff930 a2=0 a3=7ffd84aff91c items=0 ppid=2182 pid=2255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:03.433000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732073657276696365207472616666696320726571756972696E6720534E4154002D6A004D415351554552414445 Oct 2 19:47:03.434238 kubelet[2182]: I1002 19:47:03.434197 2182 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Oct 2 19:47:03.434238 kubelet[2182]: I1002 19:47:03.434208 2182 status_manager.go:176] "Starting to sync pod status with apiserver" Oct 2 19:47:03.434238 kubelet[2182]: I1002 19:47:03.434218 2182 kubelet.go:2113] "Starting kubelet main sync loop" Oct 2 19:47:03.434313 kubelet[2182]: E1002 19:47:03.434246 2182 kubelet.go:2137] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Oct 2 19:47:03.434460 kubelet[2182]: W1002 19:47:03.434438 2182 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://145.40.82.213:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 145.40.82.213:6443: connect: connection refused Oct 2 19:47:03.434493 kubelet[2182]: E1002 19:47:03.434466 2182 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://145.40.82.213:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 145.40.82.213:6443: connect: connection refused Oct 2 19:47:03.434000 audit[2256]: NETFILTER_CFG table=mangle:56 family=10 entries=1 op=nft_register_chain pid=2256 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:47:03.434000 audit[2256]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdacecf210 a2=0 a3=7ffdacecf1fc items=0 ppid=2182 pid=2256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:03.434000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Oct 2 19:47:03.434000 audit[2182]: AVC avc: denied { mac_admin } for pid=2182 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:03.434000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 19:47:03.434000 audit[2182]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0016365a0 a1=c000bacde0 a2=c001636570 a3=25 items=0 ppid=1 pid=2182 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:03.434000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 19:47:03.434951 kubelet[2182]: I1002 19:47:03.434710 2182 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Oct 2 19:47:03.434951 kubelet[2182]: I1002 19:47:03.434742 2182 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Oct 2 19:47:03.434951 kubelet[2182]: I1002 19:47:03.434825 2182 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Oct 2 19:47:03.435033 kubelet[2182]: E1002 19:47:03.435024 2182 eviction_manager.go:261] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ci-3510.3.0-a-b66ea99ec2\" not found" Oct 2 19:47:03.435000 audit[2257]: NETFILTER_CFG table=nat:57 family=10 entries=1 op=nft_register_chain pid=2257 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:47:03.435000 audit[2257]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe93580a30 a2=0 a3=7ffe93580a1c items=0 ppid=2182 pid=2257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:03.435000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Oct 2 19:47:03.435000 audit[2258]: NETFILTER_CFG table=filter:58 family=10 entries=1 op=nft_register_chain pid=2258 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:47:03.435000 audit[2258]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc780d31b0 a2=0 a3=7ffc780d319c items=0 ppid=2182 pid=2258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:03.435000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Oct 2 19:47:03.508334 kubelet[2182]: I1002 19:47:03.508278 2182 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.0-a-b66ea99ec2" Oct 2 19:47:03.509062 kubelet[2182]: E1002 19:47:03.509027 2182 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://145.40.82.213:6443/api/v1/nodes\": dial tcp 145.40.82.213:6443: connect: connection refused" node="ci-3510.3.0-a-b66ea99ec2" Oct 2 19:47:03.535391 kubelet[2182]: I1002 19:47:03.535282 2182 topology_manager.go:210] "Topology Admit Handler" Oct 2 19:47:03.539180 kubelet[2182]: I1002 19:47:03.539102 2182 topology_manager.go:210] "Topology Admit Handler" Oct 2 19:47:03.542924 kubelet[2182]: I1002 19:47:03.542882 2182 topology_manager.go:210] "Topology Admit Handler" Oct 2 19:47:03.543252 kubelet[2182]: I1002 19:47:03.543214 2182 status_manager.go:698] "Failed to get status for pod" podUID=0a3e0129099f3f25b830d7c475f44bd0 pod="kube-system/kube-controller-manager-ci-3510.3.0-a-b66ea99ec2" err="Get \"https://145.40.82.213:6443/api/v1/namespaces/kube-system/pods/kube-controller-manager-ci-3510.3.0-a-b66ea99ec2\": dial tcp 145.40.82.213:6443: connect: connection refused" Oct 2 19:47:03.546857 kubelet[2182]: I1002 19:47:03.546778 2182 status_manager.go:698] "Failed to get status for pod" podUID=1a4c2fac264b3ef47d95ed4d486696a1 pod="kube-system/kube-scheduler-ci-3510.3.0-a-b66ea99ec2" err="Get \"https://145.40.82.213:6443/api/v1/namespaces/kube-system/pods/kube-scheduler-ci-3510.3.0-a-b66ea99ec2\": dial tcp 145.40.82.213:6443: connect: connection refused" Oct 2 19:47:03.550161 kubelet[2182]: I1002 19:47:03.550075 2182 status_manager.go:698] "Failed to get status for pod" podUID=a52de6ca71f09230da0edc883ab11b7d pod="kube-system/kube-apiserver-ci-3510.3.0-a-b66ea99ec2" err="Get \"https://145.40.82.213:6443/api/v1/namespaces/kube-system/pods/kube-apiserver-ci-3510.3.0-a-b66ea99ec2\": dial tcp 145.40.82.213:6443: connect: connection refused" Oct 2 19:47:03.555508 systemd[1]: Created slice kubepods-burstable-pod0a3e0129099f3f25b830d7c475f44bd0.slice. Oct 2 19:47:03.575245 systemd[1]: Created slice kubepods-burstable-pod1a4c2fac264b3ef47d95ed4d486696a1.slice. Oct 2 19:47:03.598109 systemd[1]: Created slice kubepods-burstable-poda52de6ca71f09230da0edc883ab11b7d.slice. Oct 2 19:47:03.605610 kubelet[2182]: E1002 19:47:03.605494 2182 controller.go:146] failed to ensure lease exists, will retry in 400ms, error: Get "https://145.40.82.213:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.0-a-b66ea99ec2?timeout=10s": dial tcp 145.40.82.213:6443: connect: connection refused Oct 2 19:47:03.706427 kubelet[2182]: I1002 19:47:03.706194 2182 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/a52de6ca71f09230da0edc883ab11b7d-ca-certs\") pod \"kube-apiserver-ci-3510.3.0-a-b66ea99ec2\" (UID: \"a52de6ca71f09230da0edc883ab11b7d\") " pod="kube-system/kube-apiserver-ci-3510.3.0-a-b66ea99ec2" Oct 2 19:47:03.706427 kubelet[2182]: I1002 19:47:03.706344 2182 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/a52de6ca71f09230da0edc883ab11b7d-k8s-certs\") pod \"kube-apiserver-ci-3510.3.0-a-b66ea99ec2\" (UID: \"a52de6ca71f09230da0edc883ab11b7d\") " pod="kube-system/kube-apiserver-ci-3510.3.0-a-b66ea99ec2" Oct 2 19:47:03.706872 kubelet[2182]: I1002 19:47:03.706463 2182 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/0a3e0129099f3f25b830d7c475f44bd0-ca-certs\") pod \"kube-controller-manager-ci-3510.3.0-a-b66ea99ec2\" (UID: \"0a3e0129099f3f25b830d7c475f44bd0\") " pod="kube-system/kube-controller-manager-ci-3510.3.0-a-b66ea99ec2" Oct 2 19:47:03.706872 kubelet[2182]: I1002 19:47:03.706569 2182 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/0a3e0129099f3f25b830d7c475f44bd0-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.0-a-b66ea99ec2\" (UID: \"0a3e0129099f3f25b830d7c475f44bd0\") " pod="kube-system/kube-controller-manager-ci-3510.3.0-a-b66ea99ec2" Oct 2 19:47:03.706872 kubelet[2182]: I1002 19:47:03.706684 2182 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/1a4c2fac264b3ef47d95ed4d486696a1-kubeconfig\") pod \"kube-scheduler-ci-3510.3.0-a-b66ea99ec2\" (UID: \"1a4c2fac264b3ef47d95ed4d486696a1\") " pod="kube-system/kube-scheduler-ci-3510.3.0-a-b66ea99ec2" Oct 2 19:47:03.706872 kubelet[2182]: I1002 19:47:03.706781 2182 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/a52de6ca71f09230da0edc883ab11b7d-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.0-a-b66ea99ec2\" (UID: \"a52de6ca71f09230da0edc883ab11b7d\") " pod="kube-system/kube-apiserver-ci-3510.3.0-a-b66ea99ec2" Oct 2 19:47:03.706872 kubelet[2182]: I1002 19:47:03.706844 2182 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/0a3e0129099f3f25b830d7c475f44bd0-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.0-a-b66ea99ec2\" (UID: \"0a3e0129099f3f25b830d7c475f44bd0\") " pod="kube-system/kube-controller-manager-ci-3510.3.0-a-b66ea99ec2" Oct 2 19:47:03.707672 kubelet[2182]: I1002 19:47:03.706902 2182 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/0a3e0129099f3f25b830d7c475f44bd0-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.0-a-b66ea99ec2\" (UID: \"0a3e0129099f3f25b830d7c475f44bd0\") " pod="kube-system/kube-controller-manager-ci-3510.3.0-a-b66ea99ec2" Oct 2 19:47:03.707672 kubelet[2182]: I1002 19:47:03.707027 2182 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/0a3e0129099f3f25b830d7c475f44bd0-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.0-a-b66ea99ec2\" (UID: \"0a3e0129099f3f25b830d7c475f44bd0\") " pod="kube-system/kube-controller-manager-ci-3510.3.0-a-b66ea99ec2" Oct 2 19:47:03.713259 kubelet[2182]: I1002 19:47:03.713209 2182 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.0-a-b66ea99ec2" Oct 2 19:47:03.713924 kubelet[2182]: E1002 19:47:03.713875 2182 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://145.40.82.213:6443/api/v1/nodes\": dial tcp 145.40.82.213:6443: connect: connection refused" node="ci-3510.3.0-a-b66ea99ec2" Oct 2 19:47:03.873416 env[1461]: time="2023-10-02T19:47:03.873272684Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.0-a-b66ea99ec2,Uid:0a3e0129099f3f25b830d7c475f44bd0,Namespace:kube-system,Attempt:0,}" Oct 2 19:47:03.894176 env[1461]: time="2023-10-02T19:47:03.894073517Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.0-a-b66ea99ec2,Uid:1a4c2fac264b3ef47d95ed4d486696a1,Namespace:kube-system,Attempt:0,}" Oct 2 19:47:03.903250 env[1461]: time="2023-10-02T19:47:03.903140784Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.0-a-b66ea99ec2,Uid:a52de6ca71f09230da0edc883ab11b7d,Namespace:kube-system,Attempt:0,}" Oct 2 19:47:04.007271 kubelet[2182]: E1002 19:47:04.007027 2182 controller.go:146] failed to ensure lease exists, will retry in 800ms, error: Get "https://145.40.82.213:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.0-a-b66ea99ec2?timeout=10s": dial tcp 145.40.82.213:6443: connect: connection refused Oct 2 19:47:04.119848 kubelet[2182]: I1002 19:47:04.119792 2182 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.0-a-b66ea99ec2" Oct 2 19:47:04.120681 kubelet[2182]: E1002 19:47:04.120475 2182 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://145.40.82.213:6443/api/v1/nodes\": dial tcp 145.40.82.213:6443: connect: connection refused" node="ci-3510.3.0-a-b66ea99ec2" Oct 2 19:47:04.251538 kubelet[2182]: W1002 19:47:04.251429 2182 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://145.40.82.213:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 145.40.82.213:6443: connect: connection refused Oct 2 19:47:04.251538 kubelet[2182]: E1002 19:47:04.251550 2182 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://145.40.82.213:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 145.40.82.213:6443: connect: connection refused Oct 2 19:47:04.382704 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4216127337.mount: Deactivated successfully. Oct 2 19:47:04.397218 env[1461]: time="2023-10-02T19:47:04.397195997Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:47:04.397841 env[1461]: time="2023-10-02T19:47:04.397826350Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:47:04.398430 env[1461]: time="2023-10-02T19:47:04.398417265Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:47:04.399538 env[1461]: time="2023-10-02T19:47:04.399525628Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:47:04.400149 env[1461]: time="2023-10-02T19:47:04.400127951Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:47:04.400533 env[1461]: time="2023-10-02T19:47:04.400490660Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:47:04.400922 env[1461]: time="2023-10-02T19:47:04.400882148Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:47:04.402540 env[1461]: time="2023-10-02T19:47:04.402500430Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:47:04.404224 env[1461]: time="2023-10-02T19:47:04.404180437Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:47:04.405510 env[1461]: time="2023-10-02T19:47:04.405497849Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:47:04.405885 env[1461]: time="2023-10-02T19:47:04.405871583Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:47:04.406345 env[1461]: time="2023-10-02T19:47:04.406329328Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:47:04.412826 env[1461]: time="2023-10-02T19:47:04.412789743Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:47:04.412826 env[1461]: time="2023-10-02T19:47:04.412820462Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:47:04.412935 env[1461]: time="2023-10-02T19:47:04.412833635Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:47:04.412935 env[1461]: time="2023-10-02T19:47:04.412918766Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/df976805ba9af4545c44f39ddc8ffdfea001e68cb27d35562342080da4f8f375 pid=2271 runtime=io.containerd.runc.v2 Oct 2 19:47:04.413301 env[1461]: time="2023-10-02T19:47:04.413272131Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:47:04.413346 env[1461]: time="2023-10-02T19:47:04.413292765Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:47:04.413346 env[1461]: time="2023-10-02T19:47:04.413309218Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:47:04.413398 env[1461]: time="2023-10-02T19:47:04.413377218Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/aeb79698cec3290f9ed1bc8a2957ea4736271ce03c534b3cf0b9f9f38cb181d9 pid=2280 runtime=io.containerd.runc.v2 Oct 2 19:47:04.415528 env[1461]: time="2023-10-02T19:47:04.415487775Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:47:04.415528 env[1461]: time="2023-10-02T19:47:04.415511432Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:47:04.415528 env[1461]: time="2023-10-02T19:47:04.415519091Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:47:04.415674 env[1461]: time="2023-10-02T19:47:04.415586898Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/571a87bcd9f9cdb28589ac461d69799816576dd3b89e1617f9a66296fed90415 pid=2303 runtime=io.containerd.runc.v2 Oct 2 19:47:04.419558 systemd[1]: Started cri-containerd-df976805ba9af4545c44f39ddc8ffdfea001e68cb27d35562342080da4f8f375.scope. Oct 2 19:47:04.424000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.424000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.424000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.424000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.424000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.424000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.424000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.424000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.424000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.424000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.424000 audit: BPF prog-id=67 op=LOAD Oct 2 19:47:04.424000 audit[2299]: AVC avc: denied { bpf } for pid=2299 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.424000 audit[2299]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2271 pid=2299 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:04.424000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466393736383035626139616634353435633434663339646463386666 Oct 2 19:47:04.424000 audit[2299]: AVC avc: denied { perfmon } for pid=2299 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.424000 audit[2299]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=2271 pid=2299 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:04.424000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466393736383035626139616634353435633434663339646463386666 Oct 2 19:47:04.424000 audit[2299]: AVC avc: denied { bpf } for pid=2299 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.424000 audit[2299]: AVC avc: denied { bpf } for pid=2299 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.424000 audit[2299]: AVC avc: denied { bpf } for pid=2299 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.424000 audit[2299]: AVC avc: denied { perfmon } for pid=2299 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.424000 audit[2299]: AVC avc: denied { perfmon } for pid=2299 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.424000 audit[2299]: AVC avc: denied { perfmon } for pid=2299 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.424000 audit[2299]: AVC avc: denied { perfmon } for pid=2299 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.424000 audit[2299]: AVC avc: denied { perfmon } for pid=2299 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.424000 audit[2299]: AVC avc: denied { bpf } for pid=2299 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.424000 audit[2299]: AVC avc: denied { bpf } for pid=2299 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.424000 audit: BPF prog-id=68 op=LOAD Oct 2 19:47:04.424000 audit[2299]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c000025230 items=0 ppid=2271 pid=2299 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:04.424000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466393736383035626139616634353435633434663339646463386666 Oct 2 19:47:04.424000 audit[2299]: AVC avc: denied { bpf } for pid=2299 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.424000 audit[2299]: AVC avc: denied { bpf } for pid=2299 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.424000 audit[2299]: AVC avc: denied { perfmon } for pid=2299 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.424000 audit[2299]: AVC avc: denied { perfmon } for pid=2299 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.424000 audit[2299]: AVC avc: denied { perfmon } for pid=2299 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.424000 audit[2299]: AVC avc: denied { perfmon } for pid=2299 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.424000 audit[2299]: AVC avc: denied { perfmon } for pid=2299 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.424000 audit[2299]: AVC avc: denied { bpf } for pid=2299 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.424000 audit[2299]: AVC avc: denied { bpf } for pid=2299 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.424000 audit: BPF prog-id=69 op=LOAD Oct 2 19:47:04.424000 audit[2299]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c000025278 items=0 ppid=2271 pid=2299 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:04.424000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466393736383035626139616634353435633434663339646463386666 Oct 2 19:47:04.425000 audit: BPF prog-id=69 op=UNLOAD Oct 2 19:47:04.425000 audit: BPF prog-id=68 op=UNLOAD Oct 2 19:47:04.425000 audit[2299]: AVC avc: denied { bpf } for pid=2299 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.425000 audit[2299]: AVC avc: denied { bpf } for pid=2299 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.425000 audit[2299]: AVC avc: denied { bpf } for pid=2299 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.425000 audit[2299]: AVC avc: denied { perfmon } for pid=2299 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.425000 audit[2299]: AVC avc: denied { perfmon } for pid=2299 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.425000 audit[2299]: AVC avc: denied { perfmon } for pid=2299 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.425000 audit[2299]: AVC avc: denied { perfmon } for pid=2299 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.425000 audit[2299]: AVC avc: denied { perfmon } for pid=2299 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.425000 audit[2299]: AVC avc: denied { bpf } for pid=2299 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.425000 audit[2299]: AVC avc: denied { bpf } for pid=2299 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.425000 audit: BPF prog-id=70 op=LOAD Oct 2 19:47:04.425000 audit[2299]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c000025688 items=0 ppid=2271 pid=2299 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:04.425000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466393736383035626139616634353435633434663339646463386666 Oct 2 19:47:04.431932 systemd[1]: Started cri-containerd-aeb79698cec3290f9ed1bc8a2957ea4736271ce03c534b3cf0b9f9f38cb181d9.scope. Oct 2 19:47:04.433739 systemd[1]: Started cri-containerd-571a87bcd9f9cdb28589ac461d69799816576dd3b89e1617f9a66296fed90415.scope. Oct 2 19:47:04.437000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.437000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.437000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.437000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.437000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.437000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.437000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.437000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.437000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.437000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.437000 audit: BPF prog-id=71 op=LOAD Oct 2 19:47:04.437000 audit[2298]: AVC avc: denied { bpf } for pid=2298 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.437000 audit[2298]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2280 pid=2298 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:04.437000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165623739363938636563333239306639656431626338613239353765 Oct 2 19:47:04.437000 audit[2298]: AVC avc: denied { perfmon } for pid=2298 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.437000 audit[2298]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2280 pid=2298 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:04.437000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165623739363938636563333239306639656431626338613239353765 Oct 2 19:47:04.437000 audit[2298]: AVC avc: denied { bpf } for pid=2298 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.437000 audit[2298]: AVC avc: denied { bpf } for pid=2298 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.437000 audit[2298]: AVC avc: denied { bpf } for pid=2298 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.437000 audit[2298]: AVC avc: denied { perfmon } for pid=2298 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.437000 audit[2298]: AVC avc: denied { perfmon } for pid=2298 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.437000 audit[2298]: AVC avc: denied { perfmon } for pid=2298 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.437000 audit[2298]: AVC avc: denied { perfmon } for pid=2298 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.437000 audit[2298]: AVC avc: denied { perfmon } for pid=2298 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.437000 audit[2298]: AVC avc: denied { bpf } for pid=2298 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.437000 audit[2298]: AVC avc: denied { bpf } for pid=2298 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.437000 audit: BPF prog-id=72 op=LOAD Oct 2 19:47:04.437000 audit[2298]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001c8dd0 items=0 ppid=2280 pid=2298 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:04.437000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165623739363938636563333239306639656431626338613239353765 Oct 2 19:47:04.437000 audit[2298]: AVC avc: denied { bpf } for pid=2298 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.437000 audit[2298]: AVC avc: denied { bpf } for pid=2298 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.437000 audit[2298]: AVC avc: denied { perfmon } for pid=2298 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.437000 audit[2298]: AVC avc: denied { perfmon } for pid=2298 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.437000 audit[2298]: AVC avc: denied { perfmon } for pid=2298 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.437000 audit[2298]: AVC avc: denied { perfmon } for pid=2298 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.437000 audit[2298]: AVC avc: denied { perfmon } for pid=2298 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.437000 audit[2298]: AVC avc: denied { bpf } for pid=2298 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.437000 audit[2298]: AVC avc: denied { bpf } for pid=2298 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.437000 audit: BPF prog-id=73 op=LOAD Oct 2 19:47:04.437000 audit[2298]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001c8e18 items=0 ppid=2280 pid=2298 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:04.437000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165623739363938636563333239306639656431626338613239353765 Oct 2 19:47:04.437000 audit: BPF prog-id=73 op=UNLOAD Oct 2 19:47:04.438000 audit: BPF prog-id=72 op=UNLOAD Oct 2 19:47:04.438000 audit[2298]: AVC avc: denied { bpf } for pid=2298 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.438000 audit[2298]: AVC avc: denied { bpf } for pid=2298 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.438000 audit[2298]: AVC avc: denied { bpf } for pid=2298 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.438000 audit[2298]: AVC avc: denied { perfmon } for pid=2298 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.438000 audit[2298]: AVC avc: denied { perfmon } for pid=2298 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.438000 audit[2298]: AVC avc: denied { perfmon } for pid=2298 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.438000 audit[2298]: AVC avc: denied { perfmon } for pid=2298 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.438000 audit[2298]: AVC avc: denied { perfmon } for pid=2298 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.438000 audit[2298]: AVC avc: denied { bpf } for pid=2298 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.438000 audit[2298]: AVC avc: denied { bpf } for pid=2298 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.438000 audit: BPF prog-id=74 op=LOAD Oct 2 19:47:04.438000 audit[2298]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001c9228 items=0 ppid=2280 pid=2298 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:04.438000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165623739363938636563333239306639656431626338613239353765 Oct 2 19:47:04.438000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.438000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.438000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.438000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.438000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.438000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.438000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.438000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.438000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.438000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.438000 audit: BPF prog-id=75 op=LOAD Oct 2 19:47:04.438000 audit[2323]: AVC avc: denied { bpf } for pid=2323 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.438000 audit[2323]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2303 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:04.438000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537316138376263643966396364623238353839616334363164363937 Oct 2 19:47:04.438000 audit[2323]: AVC avc: denied { perfmon } for pid=2323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.438000 audit[2323]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2303 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:04.438000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537316138376263643966396364623238353839616334363164363937 Oct 2 19:47:04.438000 audit[2323]: AVC avc: denied { bpf } for pid=2323 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.438000 audit[2323]: AVC avc: denied { bpf } for pid=2323 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.438000 audit[2323]: AVC avc: denied { bpf } for pid=2323 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.438000 audit[2323]: AVC avc: denied { perfmon } for pid=2323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.438000 audit[2323]: AVC avc: denied { perfmon } for pid=2323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.438000 audit[2323]: AVC avc: denied { perfmon } for pid=2323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.438000 audit[2323]: AVC avc: denied { perfmon } for pid=2323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.438000 audit[2323]: AVC avc: denied { perfmon } for pid=2323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.438000 audit[2323]: AVC avc: denied { bpf } for pid=2323 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.438000 audit[2323]: AVC avc: denied { bpf } for pid=2323 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.438000 audit: BPF prog-id=76 op=LOAD Oct 2 19:47:04.438000 audit[2323]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000300c90 items=0 ppid=2303 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:04.438000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537316138376263643966396364623238353839616334363164363937 Oct 2 19:47:04.438000 audit[2323]: AVC avc: denied { bpf } for pid=2323 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.438000 audit[2323]: AVC avc: denied { bpf } for pid=2323 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.438000 audit[2323]: AVC avc: denied { perfmon } for pid=2323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.438000 audit[2323]: AVC avc: denied { perfmon } for pid=2323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.438000 audit[2323]: AVC avc: denied { perfmon } for pid=2323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.438000 audit[2323]: AVC avc: denied { perfmon } for pid=2323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.438000 audit[2323]: AVC avc: denied { perfmon } for pid=2323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.438000 audit[2323]: AVC avc: denied { bpf } for pid=2323 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.438000 audit[2323]: AVC avc: denied { bpf } for pid=2323 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.438000 audit: BPF prog-id=77 op=LOAD Oct 2 19:47:04.438000 audit[2323]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000300cd8 items=0 ppid=2303 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:04.438000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537316138376263643966396364623238353839616334363164363937 Oct 2 19:47:04.438000 audit: BPF prog-id=77 op=UNLOAD Oct 2 19:47:04.438000 audit: BPF prog-id=76 op=UNLOAD Oct 2 19:47:04.438000 audit[2323]: AVC avc: denied { bpf } for pid=2323 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.438000 audit[2323]: AVC avc: denied { bpf } for pid=2323 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.438000 audit[2323]: AVC avc: denied { bpf } for pid=2323 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.438000 audit[2323]: AVC avc: denied { perfmon } for pid=2323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.438000 audit[2323]: AVC avc: denied { perfmon } for pid=2323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.438000 audit[2323]: AVC avc: denied { perfmon } for pid=2323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.438000 audit[2323]: AVC avc: denied { perfmon } for pid=2323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.438000 audit[2323]: AVC avc: denied { perfmon } for pid=2323 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.438000 audit[2323]: AVC avc: denied { bpf } for pid=2323 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.438000 audit[2323]: AVC avc: denied { bpf } for pid=2323 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.438000 audit: BPF prog-id=78 op=LOAD Oct 2 19:47:04.438000 audit[2323]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0003010e8 items=0 ppid=2303 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:04.438000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537316138376263643966396364623238353839616334363164363937 Oct 2 19:47:04.450228 kubelet[2182]: W1002 19:47:04.450167 2182 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://145.40.82.213:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.0-a-b66ea99ec2&limit=500&resourceVersion=0": dial tcp 145.40.82.213:6443: connect: connection refused Oct 2 19:47:04.450228 kubelet[2182]: E1002 19:47:04.450209 2182 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://145.40.82.213:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.0-a-b66ea99ec2&limit=500&resourceVersion=0": dial tcp 145.40.82.213:6443: connect: connection refused Oct 2 19:47:04.455869 env[1461]: time="2023-10-02T19:47:04.455837587Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.0-a-b66ea99ec2,Uid:0a3e0129099f3f25b830d7c475f44bd0,Namespace:kube-system,Attempt:0,} returns sandbox id \"df976805ba9af4545c44f39ddc8ffdfea001e68cb27d35562342080da4f8f375\"" Oct 2 19:47:04.457678 env[1461]: time="2023-10-02T19:47:04.457647543Z" level=info msg="CreateContainer within sandbox \"df976805ba9af4545c44f39ddc8ffdfea001e68cb27d35562342080da4f8f375\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Oct 2 19:47:04.457776 env[1461]: time="2023-10-02T19:47:04.457759392Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.0-a-b66ea99ec2,Uid:1a4c2fac264b3ef47d95ed4d486696a1,Namespace:kube-system,Attempt:0,} returns sandbox id \"571a87bcd9f9cdb28589ac461d69799816576dd3b89e1617f9a66296fed90415\"" Oct 2 19:47:04.458605 env[1461]: time="2023-10-02T19:47:04.458589947Z" level=info msg="CreateContainer within sandbox \"571a87bcd9f9cdb28589ac461d69799816576dd3b89e1617f9a66296fed90415\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Oct 2 19:47:04.462908 env[1461]: time="2023-10-02T19:47:04.462863109Z" level=info msg="CreateContainer within sandbox \"df976805ba9af4545c44f39ddc8ffdfea001e68cb27d35562342080da4f8f375\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"64f528c8e8d259fb647932b9bbeea236da6bdc6c7d1b79288f92cebd72aadcce\"" Oct 2 19:47:04.463131 env[1461]: time="2023-10-02T19:47:04.463117414Z" level=info msg="StartContainer for \"64f528c8e8d259fb647932b9bbeea236da6bdc6c7d1b79288f92cebd72aadcce\"" Oct 2 19:47:04.465603 env[1461]: time="2023-10-02T19:47:04.465555505Z" level=info msg="CreateContainer within sandbox \"571a87bcd9f9cdb28589ac461d69799816576dd3b89e1617f9a66296fed90415\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"2fdd363ad55cab5d2d170e329a05622d5397d2290208bc565657708472717bf7\"" Oct 2 19:47:04.465785 env[1461]: time="2023-10-02T19:47:04.465743429Z" level=info msg="StartContainer for \"2fdd363ad55cab5d2d170e329a05622d5397d2290208bc565657708472717bf7\"" Oct 2 19:47:04.469160 env[1461]: time="2023-10-02T19:47:04.469126571Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.0-a-b66ea99ec2,Uid:a52de6ca71f09230da0edc883ab11b7d,Namespace:kube-system,Attempt:0,} returns sandbox id \"aeb79698cec3290f9ed1bc8a2957ea4736271ce03c534b3cf0b9f9f38cb181d9\"" Oct 2 19:47:04.469247 kubelet[2182]: W1002 19:47:04.469133 2182 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://145.40.82.213:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 145.40.82.213:6443: connect: connection refused Oct 2 19:47:04.469247 kubelet[2182]: E1002 19:47:04.469170 2182 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://145.40.82.213:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 145.40.82.213:6443: connect: connection refused Oct 2 19:47:04.470364 env[1461]: time="2023-10-02T19:47:04.470347396Z" level=info msg="CreateContainer within sandbox \"aeb79698cec3290f9ed1bc8a2957ea4736271ce03c534b3cf0b9f9f38cb181d9\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Oct 2 19:47:04.474495 env[1461]: time="2023-10-02T19:47:04.474451606Z" level=info msg="CreateContainer within sandbox \"aeb79698cec3290f9ed1bc8a2957ea4736271ce03c534b3cf0b9f9f38cb181d9\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"6783d0a75eb756e88043a84a6f2a987ac8b94f1d1f4dba5a12316ed76ce2a96f\"" Oct 2 19:47:04.474640 env[1461]: time="2023-10-02T19:47:04.474597933Z" level=info msg="StartContainer for \"6783d0a75eb756e88043a84a6f2a987ac8b94f1d1f4dba5a12316ed76ce2a96f\"" Oct 2 19:47:04.482550 systemd[1]: Started cri-containerd-6783d0a75eb756e88043a84a6f2a987ac8b94f1d1f4dba5a12316ed76ce2a96f.scope. Oct 2 19:47:04.484023 systemd[1]: Started cri-containerd-64f528c8e8d259fb647932b9bbeea236da6bdc6c7d1b79288f92cebd72aadcce.scope. Oct 2 19:47:04.485526 systemd[1]: Started cri-containerd-2fdd363ad55cab5d2d170e329a05622d5397d2290208bc565657708472717bf7.scope. Oct 2 19:47:04.489000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.489000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.489000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.489000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.489000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.489000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.489000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.489000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.489000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.489000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.489000 audit: BPF prog-id=79 op=LOAD Oct 2 19:47:04.489000 audit[2387]: AVC avc: denied { bpf } for pid=2387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.489000 audit[2387]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2271 pid=2387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:04.489000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634663532386338653864323539666236343739333262396262656561 Oct 2 19:47:04.489000 audit[2387]: AVC avc: denied { perfmon } for pid=2387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.489000 audit[2387]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2271 pid=2387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:04.489000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634663532386338653864323539666236343739333262396262656561 Oct 2 19:47:04.489000 audit[2387]: AVC avc: denied { bpf } for pid=2387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.489000 audit[2387]: AVC avc: denied { bpf } for pid=2387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.489000 audit[2387]: AVC avc: denied { bpf } for pid=2387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.489000 audit[2387]: AVC avc: denied { perfmon } for pid=2387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.489000 audit[2387]: AVC avc: denied { perfmon } for pid=2387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.489000 audit[2387]: AVC avc: denied { perfmon } for pid=2387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.489000 audit[2387]: AVC avc: denied { perfmon } for pid=2387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.489000 audit[2387]: AVC avc: denied { perfmon } for pid=2387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.489000 audit[2387]: AVC avc: denied { bpf } for pid=2387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.489000 audit[2387]: AVC avc: denied { bpf } for pid=2387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.489000 audit: BPF prog-id=80 op=LOAD Oct 2 19:47:04.489000 audit[2387]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003ca120 items=0 ppid=2271 pid=2387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:04.489000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634663532386338653864323539666236343739333262396262656561 Oct 2 19:47:04.489000 audit[2387]: AVC avc: denied { bpf } for pid=2387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.489000 audit[2387]: AVC avc: denied { bpf } for pid=2387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.489000 audit[2387]: AVC avc: denied { perfmon } for pid=2387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.489000 audit[2387]: AVC avc: denied { perfmon } for pid=2387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.489000 audit[2387]: AVC avc: denied { perfmon } for pid=2387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.489000 audit[2387]: AVC avc: denied { perfmon } for pid=2387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.489000 audit[2387]: AVC avc: denied { perfmon } for pid=2387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.489000 audit[2387]: AVC avc: denied { bpf } for pid=2387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.489000 audit[2387]: AVC avc: denied { bpf } for pid=2387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.489000 audit: BPF prog-id=81 op=LOAD Oct 2 19:47:04.489000 audit[2387]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003ca168 items=0 ppid=2271 pid=2387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:04.489000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634663532386338653864323539666236343739333262396262656561 Oct 2 19:47:04.490000 audit: BPF prog-id=81 op=UNLOAD Oct 2 19:47:04.490000 audit: BPF prog-id=80 op=UNLOAD Oct 2 19:47:04.490000 audit[2387]: AVC avc: denied { bpf } for pid=2387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.490000 audit[2387]: AVC avc: denied { bpf } for pid=2387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.490000 audit[2387]: AVC avc: denied { bpf } for pid=2387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.490000 audit[2387]: AVC avc: denied { perfmon } for pid=2387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.490000 audit[2387]: AVC avc: denied { perfmon } for pid=2387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.490000 audit[2387]: AVC avc: denied { perfmon } for pid=2387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.490000 audit[2387]: AVC avc: denied { perfmon } for pid=2387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.490000 audit[2387]: AVC avc: denied { perfmon } for pid=2387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.490000 audit[2387]: AVC avc: denied { bpf } for pid=2387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.490000 audit[2387]: AVC avc: denied { bpf } for pid=2387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.490000 audit: BPF prog-id=82 op=LOAD Oct 2 19:47:04.490000 audit[2387]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003ca578 items=0 ppid=2271 pid=2387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:04.490000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634663532386338653864323539666236343739333262396262656561 Oct 2 19:47:04.490000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.490000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.490000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.490000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.490000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.490000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.490000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.490000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.490000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.490000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.490000 audit: BPF prog-id=83 op=LOAD Oct 2 19:47:04.490000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.490000 audit[2413]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2280 pid=2413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:04.490000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637383364306137356562373536653838303433613834613666326139 Oct 2 19:47:04.490000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.490000 audit[2413]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2280 pid=2413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:04.490000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637383364306137356562373536653838303433613834613666326139 Oct 2 19:47:04.490000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.490000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.490000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.490000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.490000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.490000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.490000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.490000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.490000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.490000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.490000 audit: BPF prog-id=84 op=LOAD Oct 2 19:47:04.490000 audit[2413]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000025e30 items=0 ppid=2280 pid=2413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:04.490000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637383364306137356562373536653838303433613834613666326139 Oct 2 19:47:04.490000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.490000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.490000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.490000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.490000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.490000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.490000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.490000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.490000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.490000 audit: BPF prog-id=85 op=LOAD Oct 2 19:47:04.490000 audit[2413]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000025e78 items=0 ppid=2280 pid=2413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:04.490000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637383364306137356562373536653838303433613834613666326139 Oct 2 19:47:04.490000 audit: BPF prog-id=85 op=UNLOAD Oct 2 19:47:04.490000 audit: BPF prog-id=84 op=UNLOAD Oct 2 19:47:04.490000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.490000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.490000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.490000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.490000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.490000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.490000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.490000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.490000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.490000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.490000 audit: BPF prog-id=86 op=LOAD Oct 2 19:47:04.490000 audit[2413]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0002e8288 items=0 ppid=2280 pid=2413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:04.490000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637383364306137356562373536653838303433613834613666326139 Oct 2 19:47:04.491000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.491000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.491000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.491000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.491000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.491000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.491000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.491000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.491000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.491000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.491000 audit: BPF prog-id=87 op=LOAD Oct 2 19:47:04.491000 audit[2400]: AVC avc: denied { bpf } for pid=2400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.491000 audit[2400]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=2303 pid=2400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:04.491000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266646433363361643535636162356432643137306533323961303536 Oct 2 19:47:04.491000 audit[2400]: AVC avc: denied { perfmon } for pid=2400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.491000 audit[2400]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=2303 pid=2400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:04.491000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266646433363361643535636162356432643137306533323961303536 Oct 2 19:47:04.491000 audit[2400]: AVC avc: denied { bpf } for pid=2400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.491000 audit[2400]: AVC avc: denied { bpf } for pid=2400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.491000 audit[2400]: AVC avc: denied { bpf } for pid=2400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.491000 audit[2400]: AVC avc: denied { perfmon } for pid=2400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.491000 audit[2400]: AVC avc: denied { perfmon } for pid=2400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.491000 audit[2400]: AVC avc: denied { perfmon } for pid=2400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.491000 audit[2400]: AVC avc: denied { perfmon } for pid=2400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.491000 audit[2400]: AVC avc: denied { perfmon } for pid=2400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.491000 audit[2400]: AVC avc: denied { bpf } for pid=2400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.491000 audit[2400]: AVC avc: denied { bpf } for pid=2400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.491000 audit: BPF prog-id=88 op=LOAD Oct 2 19:47:04.491000 audit[2400]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c0003ee120 items=0 ppid=2303 pid=2400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:04.491000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266646433363361643535636162356432643137306533323961303536 Oct 2 19:47:04.491000 audit[2400]: AVC avc: denied { bpf } for pid=2400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.491000 audit[2400]: AVC avc: denied { bpf } for pid=2400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.491000 audit[2400]: AVC avc: denied { perfmon } for pid=2400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.491000 audit[2400]: AVC avc: denied { perfmon } for pid=2400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.491000 audit[2400]: AVC avc: denied { perfmon } for pid=2400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.491000 audit[2400]: AVC avc: denied { perfmon } for pid=2400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.491000 audit[2400]: AVC avc: denied { perfmon } for pid=2400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.491000 audit[2400]: AVC avc: denied { bpf } for pid=2400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.491000 audit[2400]: AVC avc: denied { bpf } for pid=2400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.491000 audit: BPF prog-id=89 op=LOAD Oct 2 19:47:04.491000 audit[2400]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c0003ee168 items=0 ppid=2303 pid=2400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:04.491000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266646433363361643535636162356432643137306533323961303536 Oct 2 19:47:04.491000 audit: BPF prog-id=89 op=UNLOAD Oct 2 19:47:04.491000 audit: BPF prog-id=88 op=UNLOAD Oct 2 19:47:04.491000 audit[2400]: AVC avc: denied { bpf } for pid=2400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.491000 audit[2400]: AVC avc: denied { bpf } for pid=2400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.491000 audit[2400]: AVC avc: denied { bpf } for pid=2400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.491000 audit[2400]: AVC avc: denied { perfmon } for pid=2400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.491000 audit[2400]: AVC avc: denied { perfmon } for pid=2400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.491000 audit[2400]: AVC avc: denied { perfmon } for pid=2400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.491000 audit[2400]: AVC avc: denied { perfmon } for pid=2400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.491000 audit[2400]: AVC avc: denied { perfmon } for pid=2400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.491000 audit[2400]: AVC avc: denied { bpf } for pid=2400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.491000 audit[2400]: AVC avc: denied { bpf } for pid=2400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:04.491000 audit: BPF prog-id=90 op=LOAD Oct 2 19:47:04.491000 audit[2400]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c0003ee578 items=0 ppid=2303 pid=2400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:04.491000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266646433363361643535636162356432643137306533323961303536 Oct 2 19:47:04.510356 env[1461]: time="2023-10-02T19:47:04.510325229Z" level=info msg="StartContainer for \"64f528c8e8d259fb647932b9bbeea236da6bdc6c7d1b79288f92cebd72aadcce\" returns successfully" Oct 2 19:47:04.510668 env[1461]: time="2023-10-02T19:47:04.510652385Z" level=info msg="StartContainer for \"6783d0a75eb756e88043a84a6f2a987ac8b94f1d1f4dba5a12316ed76ce2a96f\" returns successfully" Oct 2 19:47:04.511348 env[1461]: time="2023-10-02T19:47:04.511331745Z" level=info msg="StartContainer for \"2fdd363ad55cab5d2d170e329a05622d5397d2290208bc565657708472717bf7\" returns successfully" Oct 2 19:47:04.922202 kubelet[2182]: I1002 19:47:04.922158 2182 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.0-a-b66ea99ec2" Oct 2 19:47:05.014298 sshd[1986]: Failed password for invalid user yzc from 101.33.80.197 port 50016 ssh2 Oct 2 19:47:05.122000 audit[2432]: AVC avc: denied { watch } for pid=2432 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c275,c430 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:47:05.149767 kernel: kauditd_printk_skb: 624 callbacks suppressed Oct 2 19:47:05.149854 kernel: audit: type=1400 audit(1696276025.122:711): avc: denied { watch } for pid=2432 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c275,c430 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:47:05.238401 kubelet[2182]: I1002 19:47:05.238322 2182 kubelet_node_status.go:73] "Successfully registered node" node="ci-3510.3.0-a-b66ea99ec2" Oct 2 19:47:05.122000 audit[2432]: AVC avc: denied { watch } for pid=2432 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c275,c430 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:47:05.243262 kubelet[2182]: E1002 19:47:05.243223 2182 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ci-3510.3.0-a-b66ea99ec2\" not found" Oct 2 19:47:05.331853 kernel: audit: type=1400 audit(1696276025.122:712): avc: denied { watch } for pid=2432 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c275,c430 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:47:05.331943 kernel: audit: type=1300 audit(1696276025.122:712): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000364080 a2=fc6 a3=0 items=0 ppid=2271 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c275,c430 key=(null) Oct 2 19:47:05.122000 audit[2432]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000364080 a2=fc6 a3=0 items=0 ppid=2271 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c275,c430 key=(null) Oct 2 19:47:05.344058 kubelet[2182]: E1002 19:47:05.344010 2182 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ci-3510.3.0-a-b66ea99ec2\" not found" Oct 2 19:47:05.444468 kubelet[2182]: E1002 19:47:05.444456 2182 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ci-3510.3.0-a-b66ea99ec2\" not found" Oct 2 19:47:05.122000 audit[2432]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0001b3830 a2=fc6 a3=0 items=0 ppid=2271 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c275,c430 key=(null) Oct 2 19:47:05.544653 kubelet[2182]: E1002 19:47:05.544617 2182 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ci-3510.3.0-a-b66ea99ec2\" not found" Oct 2 19:47:05.571072 kernel: audit: type=1300 audit(1696276025.122:711): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0001b3830 a2=fc6 a3=0 items=0 ppid=2271 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c275,c430 key=(null) Oct 2 19:47:05.571109 kernel: audit: type=1327 audit(1696276025.122:712): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:47:05.122000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:47:05.645738 kubelet[2182]: E1002 19:47:05.645701 2182 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ci-3510.3.0-a-b66ea99ec2\" not found" Oct 2 19:47:05.663597 kernel: audit: type=1327 audit(1696276025.122:711): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:47:05.122000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:47:05.746372 kubelet[2182]: E1002 19:47:05.746315 2182 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ci-3510.3.0-a-b66ea99ec2\" not found" Oct 2 19:47:05.755850 kernel: audit: type=1400 audit(1696276025.224:713): avc: denied { watch } for pid=2430 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c581,c935 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:47:05.224000 audit[2430]: AVC avc: denied { watch } for pid=2430 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c581,c935 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:47:05.845935 kernel: audit: type=1300 audit(1696276025.224:713): arch=c000003e syscall=254 success=no exit=-13 a0=43 a1=c005614000 a2=fc6 a3=0 items=0 ppid=2280 pid=2430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c581,c935 key=(null) Oct 2 19:47:05.224000 audit[2430]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=43 a1=c005614000 a2=fc6 a3=0 items=0 ppid=2280 pid=2430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c581,c935 key=(null) Oct 2 19:47:05.847031 kubelet[2182]: E1002 19:47:05.846992 2182 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ci-3510.3.0-a-b66ea99ec2\" not found" Oct 2 19:47:05.944633 kernel: audit: type=1400 audit(1696276025.224:714): avc: denied { watch } for pid=2430 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c581,c935 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:47:05.224000 audit[2430]: AVC avc: denied { watch } for pid=2430 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c581,c935 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:47:05.947873 kubelet[2182]: E1002 19:47:05.947835 2182 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ci-3510.3.0-a-b66ea99ec2\" not found" Oct 2 19:47:06.035463 kernel: audit: type=1327 audit(1696276025.224:713): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134352E34302E38322E323133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:47:05.224000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134352E34302E38322E323133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:47:06.048627 kubelet[2182]: E1002 19:47:06.048587 2182 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ci-3510.3.0-a-b66ea99ec2\" not found" Oct 2 19:47:05.224000 audit[2430]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=44 a1=c000af20a0 a2=fc6 a3=0 items=0 ppid=2280 pid=2430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c581,c935 key=(null) Oct 2 19:47:05.224000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134352E34302E38322E323133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:47:05.224000 audit[2430]: AVC avc: denied { watch } for pid=2430 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=521268 scontext=system_u:system_r:svirt_lxc_net_t:s0:c581,c935 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:47:05.224000 audit[2430]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=43 a1=c005822090 a2=fc6 a3=0 items=0 ppid=2280 pid=2430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c581,c935 key=(null) Oct 2 19:47:05.224000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134352E34302E38322E323133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:47:05.226000 audit[2430]: AVC avc: denied { watch } for pid=2430 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=521274 scontext=system_u:system_r:svirt_lxc_net_t:s0:c581,c935 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:47:05.226000 audit[2430]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7f a1=c00572f0e0 a2=fc6 a3=0 items=0 ppid=2280 pid=2430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c581,c935 key=(null) Oct 2 19:47:05.226000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134352E34302E38322E323133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:47:05.226000 audit[2430]: AVC avc: denied { watch } for pid=2430 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c581,c935 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:47:05.226000 audit[2430]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7f a1=c001af9520 a2=fc6 a3=0 items=0 ppid=2280 pid=2430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c581,c935 key=(null) Oct 2 19:47:05.226000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134352E34302E38322E323133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:47:05.226000 audit[2430]: AVC avc: denied { watch } for pid=2430 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c581,c935 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:47:05.226000 audit[2430]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7f a1=c00ab882d0 a2=fc6 a3=0 items=0 ppid=2280 pid=2430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c581,c935 key=(null) Oct 2 19:47:05.226000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134352E34302E38322E323133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:47:06.149255 kubelet[2182]: E1002 19:47:06.149203 2182 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ci-3510.3.0-a-b66ea99ec2\" not found" Oct 2 19:47:06.250042 kubelet[2182]: E1002 19:47:06.249946 2182 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ci-3510.3.0-a-b66ea99ec2\" not found" Oct 2 19:47:06.350658 kubelet[2182]: E1002 19:47:06.350601 2182 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ci-3510.3.0-a-b66ea99ec2\" not found" Oct 2 19:47:06.451400 kubelet[2182]: E1002 19:47:06.451247 2182 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ci-3510.3.0-a-b66ea99ec2\" not found" Oct 2 19:47:06.551899 kubelet[2182]: E1002 19:47:06.551860 2182 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ci-3510.3.0-a-b66ea99ec2\" not found" Oct 2 19:47:06.652513 kubelet[2182]: E1002 19:47:06.652452 2182 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ci-3510.3.0-a-b66ea99ec2\" not found" Oct 2 19:47:06.753470 kubelet[2182]: E1002 19:47:06.753263 2182 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ci-3510.3.0-a-b66ea99ec2\" not found" Oct 2 19:47:06.882404 sshd[1986]: Received disconnect from 101.33.80.197 port 50016:11: Bye Bye [preauth] Oct 2 19:47:06.882404 sshd[1986]: Disconnected from invalid user yzc 101.33.80.197 port 50016 [preauth] Oct 2 19:47:06.884974 systemd[1]: sshd@10-145.40.82.213:22-101.33.80.197:50016.service: Deactivated successfully. Oct 2 19:47:06.884000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-145.40.82.213:22-101.33.80.197:50016 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:47:07.404889 kubelet[2182]: I1002 19:47:07.404777 2182 apiserver.go:52] "Watching apiserver" Oct 2 19:47:07.505123 kubelet[2182]: I1002 19:47:07.505019 2182 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Oct 2 19:47:07.533242 kubelet[2182]: I1002 19:47:07.533133 2182 reconciler.go:41] "Reconciler: start to sync state" Oct 2 19:47:08.188639 systemd[1]: Reloading. Oct 2 19:47:08.237988 /usr/lib/systemd/system-generators/torcx-generator[2553]: time="2023-10-02T19:47:08Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.0 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.0 /var/lib/torcx/store]" Oct 2 19:47:08.238005 /usr/lib/systemd/system-generators/torcx-generator[2553]: time="2023-10-02T19:47:08Z" level=info msg="torcx already run" Oct 2 19:47:08.291582 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 2 19:47:08.291591 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 2 19:47:08.304154 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 2 19:47:08.356000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.356000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.356000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.356000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.356000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.356000 audit: BPF prog-id=91 op=LOAD Oct 2 19:47:08.356000 audit: BPF prog-id=75 op=UNLOAD Oct 2 19:47:08.357000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.357000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.357000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.357000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.357000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.357000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.357000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.357000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.357000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.357000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.357000 audit: BPF prog-id=92 op=LOAD Oct 2 19:47:08.357000 audit: BPF prog-id=52 op=UNLOAD Oct 2 19:47:08.357000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.357000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.357000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.357000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.357000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.357000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.357000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.357000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.357000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.357000 audit: BPF prog-id=93 op=LOAD Oct 2 19:47:08.357000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.357000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.357000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.357000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.357000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.357000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.357000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.357000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.357000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.357000 audit: BPF prog-id=94 op=LOAD Oct 2 19:47:08.357000 audit: BPF prog-id=53 op=UNLOAD Oct 2 19:47:08.357000 audit: BPF prog-id=54 op=UNLOAD Oct 2 19:47:08.358000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.358000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.358000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.358000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.358000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.358000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.358000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.358000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.358000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.358000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.358000 audit: BPF prog-id=95 op=LOAD Oct 2 19:47:08.358000 audit: BPF prog-id=87 op=UNLOAD Oct 2 19:47:08.358000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.358000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.358000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.358000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.358000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.358000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.358000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.358000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.358000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.358000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.358000 audit: BPF prog-id=96 op=LOAD Oct 2 19:47:08.358000 audit: BPF prog-id=55 op=UNLOAD Oct 2 19:47:08.359000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.359000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.359000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.359000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.359000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.359000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.359000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.359000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.359000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.359000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.359000 audit: BPF prog-id=97 op=LOAD Oct 2 19:47:08.359000 audit: BPF prog-id=56 op=UNLOAD Oct 2 19:47:08.359000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.359000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.359000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.359000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.359000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.359000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.359000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.359000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.359000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.359000 audit: BPF prog-id=98 op=LOAD Oct 2 19:47:08.359000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.359000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.359000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.359000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.359000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.359000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.359000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.359000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.359000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.359000 audit: BPF prog-id=99 op=LOAD Oct 2 19:47:08.359000 audit: BPF prog-id=57 op=UNLOAD Oct 2 19:47:08.359000 audit: BPF prog-id=58 op=UNLOAD Oct 2 19:47:08.360000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.360000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.360000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.360000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.360000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.360000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.360000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.360000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.360000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.360000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.360000 audit: BPF prog-id=100 op=LOAD Oct 2 19:47:08.360000 audit: BPF prog-id=59 op=UNLOAD Oct 2 19:47:08.360000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.360000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.360000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.360000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.360000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.360000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.360000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.360000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.360000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.360000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.360000 audit: BPF prog-id=101 op=LOAD Oct 2 19:47:08.360000 audit: BPF prog-id=83 op=UNLOAD Oct 2 19:47:08.361000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.361000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.361000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.361000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.361000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.361000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.361000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.361000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.361000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.361000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.361000 audit: BPF prog-id=102 op=LOAD Oct 2 19:47:08.361000 audit: BPF prog-id=71 op=UNLOAD Oct 2 19:47:08.362000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.362000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.362000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.362000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.362000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.362000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.362000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.362000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.362000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.362000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.362000 audit: BPF prog-id=103 op=LOAD Oct 2 19:47:08.362000 audit: BPF prog-id=67 op=UNLOAD Oct 2 19:47:08.362000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.362000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.362000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.362000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.362000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.362000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.362000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.362000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.362000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.362000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.362000 audit: BPF prog-id=104 op=LOAD Oct 2 19:47:08.362000 audit: BPF prog-id=60 op=UNLOAD Oct 2 19:47:08.363000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.363000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.363000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.363000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.363000 audit: BPF prog-id=105 op=LOAD Oct 2 19:47:08.363000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.363000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.363000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.363000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.363000 audit: BPF prog-id=106 op=LOAD Oct 2 19:47:08.363000 audit: BPF prog-id=61 op=UNLOAD Oct 2 19:47:08.363000 audit: BPF prog-id=62 op=UNLOAD Oct 2 19:47:08.363000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.363000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.363000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.363000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.363000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.363000 audit: BPF prog-id=107 op=LOAD Oct 2 19:47:08.363000 audit: BPF prog-id=79 op=UNLOAD Oct 2 19:47:08.363000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.363000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.363000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.363000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.364000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.364000 audit: BPF prog-id=108 op=LOAD Oct 2 19:47:08.364000 audit: BPF prog-id=63 op=UNLOAD Oct 2 19:47:08.364000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.364000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.364000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.364000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.364000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.364000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.364000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.364000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.364000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.364000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.364000 audit: BPF prog-id=109 op=LOAD Oct 2 19:47:08.364000 audit: BPF prog-id=64 op=UNLOAD Oct 2 19:47:08.364000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.364000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.364000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.364000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.364000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.364000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.364000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.364000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.364000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.364000 audit: BPF prog-id=110 op=LOAD Oct 2 19:47:08.364000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.364000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.364000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.364000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.364000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.364000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.364000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.364000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.364000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.364000 audit: BPF prog-id=111 op=LOAD Oct 2 19:47:08.364000 audit: BPF prog-id=65 op=UNLOAD Oct 2 19:47:08.364000 audit: BPF prog-id=66 op=UNLOAD Oct 2 19:47:08.372435 kubelet[2182]: I1002 19:47:08.372421 2182 dynamic_cafile_content.go:171] "Shutting down controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Oct 2 19:47:08.372483 systemd[1]: Stopping kubelet.service... Oct 2 19:47:08.395627 systemd[1]: kubelet.service: Deactivated successfully. Oct 2 19:47:08.395729 systemd[1]: Stopped kubelet.service. Oct 2 19:47:08.395000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:47:08.396592 systemd[1]: Started kubelet.service. Oct 2 19:47:08.396000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:47:08.419701 kubelet[2613]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Oct 2 19:47:08.419701 kubelet[2613]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Oct 2 19:47:08.419971 kubelet[2613]: I1002 19:47:08.419719 2613 server.go:198] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Oct 2 19:47:08.420764 kubelet[2613]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Oct 2 19:47:08.420764 kubelet[2613]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Oct 2 19:47:08.422613 kubelet[2613]: I1002 19:47:08.422573 2613 server.go:412] "Kubelet version" kubeletVersion="v1.26.5" Oct 2 19:47:08.422613 kubelet[2613]: I1002 19:47:08.422585 2613 server.go:414] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Oct 2 19:47:08.422782 kubelet[2613]: I1002 19:47:08.422742 2613 server.go:836] "Client rotation is on, will bootstrap in background" Oct 2 19:47:08.423843 kubelet[2613]: I1002 19:47:08.423833 2613 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Oct 2 19:47:08.424261 kubelet[2613]: I1002 19:47:08.424219 2613 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Oct 2 19:47:08.443345 kubelet[2613]: I1002 19:47:08.443269 2613 server.go:659] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Oct 2 19:47:08.443412 kubelet[2613]: I1002 19:47:08.443406 2613 container_manager_linux.go:267] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Oct 2 19:47:08.443491 kubelet[2613]: I1002 19:47:08.443453 2613 container_manager_linux.go:272] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:} {Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:} {Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] ExperimentalTopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] ExperimentalPodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms ExperimentalTopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]} Oct 2 19:47:08.443491 kubelet[2613]: I1002 19:47:08.443466 2613 topology_manager.go:134] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Oct 2 19:47:08.443491 kubelet[2613]: I1002 19:47:08.443474 2613 container_manager_linux.go:308] "Creating device plugin manager" Oct 2 19:47:08.443618 kubelet[2613]: I1002 19:47:08.443496 2613 state_mem.go:36] "Initialized new in-memory state store" Oct 2 19:47:08.445106 kubelet[2613]: I1002 19:47:08.445076 2613 kubelet.go:398] "Attempting to sync node with API server" Oct 2 19:47:08.445106 kubelet[2613]: I1002 19:47:08.445089 2613 kubelet.go:286] "Adding static pod path" path="/etc/kubernetes/manifests" Oct 2 19:47:08.445106 kubelet[2613]: I1002 19:47:08.445103 2613 kubelet.go:297] "Adding apiserver pod source" Oct 2 19:47:08.445200 kubelet[2613]: I1002 19:47:08.445112 2613 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Oct 2 19:47:08.445467 kubelet[2613]: I1002 19:47:08.445455 2613 kuberuntime_manager.go:244] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Oct 2 19:47:08.445728 kubelet[2613]: I1002 19:47:08.445720 2613 server.go:1186] "Started kubelet" Oct 2 19:47:08.445770 kubelet[2613]: I1002 19:47:08.445760 2613 server.go:161] "Starting to listen" address="0.0.0.0" port=10250 Oct 2 19:47:08.446064 kubelet[2613]: E1002 19:47:08.446050 2613 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Oct 2 19:47:08.446120 kubelet[2613]: E1002 19:47:08.446067 2613 kubelet.go:1386] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Oct 2 19:47:08.446530 kubelet[2613]: I1002 19:47:08.446520 2613 server.go:451] "Adding debug handlers to kubelet server" Oct 2 19:47:08.446000 audit[2613]: AVC avc: denied { mac_admin } for pid=2613 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.446000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 19:47:08.446000 audit[2613]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000cc8930 a1=c000150780 a2=c000cc8900 a3=25 items=0 ppid=1 pid=2613 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:08.446000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 19:47:08.446000 audit[2613]: AVC avc: denied { mac_admin } for pid=2613 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.446000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 19:47:08.446000 audit[2613]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000134dc0 a1=c000150798 a2=c000cc89c0 a3=25 items=0 ppid=1 pid=2613 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:08.446000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 19:47:08.446919 kubelet[2613]: I1002 19:47:08.446581 2613 kubelet.go:1341] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Oct 2 19:47:08.446919 kubelet[2613]: I1002 19:47:08.446604 2613 kubelet.go:1345] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Oct 2 19:47:08.446919 kubelet[2613]: I1002 19:47:08.446622 2613 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Oct 2 19:47:08.446919 kubelet[2613]: I1002 19:47:08.446669 2613 volume_manager.go:293] "Starting Kubelet Volume Manager" Oct 2 19:47:08.446919 kubelet[2613]: I1002 19:47:08.446708 2613 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Oct 2 19:47:08.460709 kubelet[2613]: I1002 19:47:08.460664 2613 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Oct 2 19:47:08.468717 kubelet[2613]: I1002 19:47:08.468671 2613 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Oct 2 19:47:08.468717 kubelet[2613]: I1002 19:47:08.468685 2613 status_manager.go:176] "Starting to sync pod status with apiserver" Oct 2 19:47:08.468717 kubelet[2613]: I1002 19:47:08.468699 2613 kubelet.go:2113] "Starting kubelet main sync loop" Oct 2 19:47:08.468837 kubelet[2613]: E1002 19:47:08.468735 2613 kubelet.go:2137] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Oct 2 19:47:08.472596 kubelet[2613]: I1002 19:47:08.472560 2613 cpu_manager.go:214] "Starting CPU manager" policy="none" Oct 2 19:47:08.472596 kubelet[2613]: I1002 19:47:08.472569 2613 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Oct 2 19:47:08.472596 kubelet[2613]: I1002 19:47:08.472578 2613 state_mem.go:36] "Initialized new in-memory state store" Oct 2 19:47:08.472700 kubelet[2613]: I1002 19:47:08.472678 2613 state_mem.go:88] "Updated default CPUSet" cpuSet="" Oct 2 19:47:08.472700 kubelet[2613]: I1002 19:47:08.472687 2613 state_mem.go:96] "Updated CPUSet assignments" assignments=map[] Oct 2 19:47:08.472700 kubelet[2613]: I1002 19:47:08.472691 2613 policy_none.go:49] "None policy: Start" Oct 2 19:47:08.472994 kubelet[2613]: I1002 19:47:08.472955 2613 memory_manager.go:169] "Starting memorymanager" policy="None" Oct 2 19:47:08.472994 kubelet[2613]: I1002 19:47:08.472967 2613 state_mem.go:35] "Initializing new in-memory state store" Oct 2 19:47:08.473055 kubelet[2613]: I1002 19:47:08.473049 2613 state_mem.go:75] "Updated machine memory state" Oct 2 19:47:08.474998 kubelet[2613]: I1002 19:47:08.474960 2613 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Oct 2 19:47:08.474998 kubelet[2613]: I1002 19:47:08.474991 2613 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Oct 2 19:47:08.474000 audit[2613]: AVC avc: denied { mac_admin } for pid=2613 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:08.474000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 19:47:08.474000 audit[2613]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0015a5440 a1=c0012d78f0 a2=c0015a5410 a3=25 items=0 ppid=1 pid=2613 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:08.474000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 19:47:08.475204 kubelet[2613]: I1002 19:47:08.475111 2613 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Oct 2 19:47:08.554153 kubelet[2613]: I1002 19:47:08.554100 2613 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.0-a-b66ea99ec2" Oct 2 19:47:08.569804 kubelet[2613]: I1002 19:47:08.569744 2613 topology_manager.go:210] "Topology Admit Handler" Oct 2 19:47:08.570076 kubelet[2613]: I1002 19:47:08.569895 2613 topology_manager.go:210] "Topology Admit Handler" Oct 2 19:47:08.570076 kubelet[2613]: I1002 19:47:08.569983 2613 topology_manager.go:210] "Topology Admit Handler" Oct 2 19:47:08.648061 kubelet[2613]: I1002 19:47:08.648041 2613 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/0a3e0129099f3f25b830d7c475f44bd0-ca-certs\") pod \"kube-controller-manager-ci-3510.3.0-a-b66ea99ec2\" (UID: \"0a3e0129099f3f25b830d7c475f44bd0\") " pod="kube-system/kube-controller-manager-ci-3510.3.0-a-b66ea99ec2" Oct 2 19:47:08.648182 kubelet[2613]: I1002 19:47:08.648071 2613 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/0a3e0129099f3f25b830d7c475f44bd0-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.0-a-b66ea99ec2\" (UID: \"0a3e0129099f3f25b830d7c475f44bd0\") " pod="kube-system/kube-controller-manager-ci-3510.3.0-a-b66ea99ec2" Oct 2 19:47:08.648182 kubelet[2613]: I1002 19:47:08.648093 2613 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/0a3e0129099f3f25b830d7c475f44bd0-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.0-a-b66ea99ec2\" (UID: \"0a3e0129099f3f25b830d7c475f44bd0\") " pod="kube-system/kube-controller-manager-ci-3510.3.0-a-b66ea99ec2" Oct 2 19:47:08.648182 kubelet[2613]: I1002 19:47:08.648118 2613 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/0a3e0129099f3f25b830d7c475f44bd0-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.0-a-b66ea99ec2\" (UID: \"0a3e0129099f3f25b830d7c475f44bd0\") " pod="kube-system/kube-controller-manager-ci-3510.3.0-a-b66ea99ec2" Oct 2 19:47:08.648182 kubelet[2613]: I1002 19:47:08.648145 2613 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/1a4c2fac264b3ef47d95ed4d486696a1-kubeconfig\") pod \"kube-scheduler-ci-3510.3.0-a-b66ea99ec2\" (UID: \"1a4c2fac264b3ef47d95ed4d486696a1\") " pod="kube-system/kube-scheduler-ci-3510.3.0-a-b66ea99ec2" Oct 2 19:47:08.648330 kubelet[2613]: I1002 19:47:08.648184 2613 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/a52de6ca71f09230da0edc883ab11b7d-ca-certs\") pod \"kube-apiserver-ci-3510.3.0-a-b66ea99ec2\" (UID: \"a52de6ca71f09230da0edc883ab11b7d\") " pod="kube-system/kube-apiserver-ci-3510.3.0-a-b66ea99ec2" Oct 2 19:47:08.648330 kubelet[2613]: I1002 19:47:08.648217 2613 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/a52de6ca71f09230da0edc883ab11b7d-k8s-certs\") pod \"kube-apiserver-ci-3510.3.0-a-b66ea99ec2\" (UID: \"a52de6ca71f09230da0edc883ab11b7d\") " pod="kube-system/kube-apiserver-ci-3510.3.0-a-b66ea99ec2" Oct 2 19:47:08.648330 kubelet[2613]: I1002 19:47:08.648250 2613 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/a52de6ca71f09230da0edc883ab11b7d-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.0-a-b66ea99ec2\" (UID: \"a52de6ca71f09230da0edc883ab11b7d\") " pod="kube-system/kube-apiserver-ci-3510.3.0-a-b66ea99ec2" Oct 2 19:47:08.648330 kubelet[2613]: I1002 19:47:08.648274 2613 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/0a3e0129099f3f25b830d7c475f44bd0-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.0-a-b66ea99ec2\" (UID: \"0a3e0129099f3f25b830d7c475f44bd0\") " pod="kube-system/kube-controller-manager-ci-3510.3.0-a-b66ea99ec2" Oct 2 19:47:08.649791 kubelet[2613]: E1002 19:47:08.649746 2613 kubelet.go:1802] "Failed creating a mirror pod for" err="pods \"kube-apiserver-ci-3510.3.0-a-b66ea99ec2\" already exists" pod="kube-system/kube-apiserver-ci-3510.3.0-a-b66ea99ec2" Oct 2 19:47:08.847783 kubelet[2613]: I1002 19:47:08.847746 2613 kubelet_node_status.go:108] "Node was previously registered" node="ci-3510.3.0-a-b66ea99ec2" Oct 2 19:47:08.847872 kubelet[2613]: I1002 19:47:08.847811 2613 kubelet_node_status.go:73] "Successfully registered node" node="ci-3510.3.0-a-b66ea99ec2" Oct 2 19:47:09.446248 kubelet[2613]: I1002 19:47:09.446216 2613 apiserver.go:52] "Watching apiserver" Oct 2 19:47:09.547945 kubelet[2613]: I1002 19:47:09.547843 2613 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Oct 2 19:47:09.555145 kubelet[2613]: I1002 19:47:09.555084 2613 reconciler.go:41] "Reconciler: start to sync state" Oct 2 19:47:09.652000 audit[2432]: AVC avc: denied { watch } for pid=2432 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c275,c430 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:47:09.652000 audit[2432]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001011da0 a2=fc6 a3=0 items=0 ppid=2271 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c275,c430 key=(null) Oct 2 19:47:09.652000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:47:09.652000 audit[2432]: AVC avc: denied { watch } for pid=2432 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c275,c430 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:47:09.652000 audit[2432]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0014bc3c0 a2=fc6 a3=0 items=0 ppid=2271 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c275,c430 key=(null) Oct 2 19:47:09.652000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:47:09.653000 audit[2432]: AVC avc: denied { watch } for pid=2432 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c275,c430 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:47:09.653000 audit[2432]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0014bc500 a2=fc6 a3=0 items=0 ppid=2271 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c275,c430 key=(null) Oct 2 19:47:09.653000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:47:09.653000 audit[2432]: AVC avc: denied { watch } for pid=2432 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c275,c430 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:47:09.653000 audit[2432]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00166c160 a2=fc6 a3=0 items=0 ppid=2271 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c275,c430 key=(null) Oct 2 19:47:09.653000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:47:09.849019 kubelet[2613]: E1002 19:47:09.848974 2613 kubelet.go:1802] "Failed creating a mirror pod for" err="pods \"kube-scheduler-ci-3510.3.0-a-b66ea99ec2\" already exists" pod="kube-system/kube-scheduler-ci-3510.3.0-a-b66ea99ec2" Oct 2 19:47:10.049058 kubelet[2613]: E1002 19:47:10.049008 2613 kubelet.go:1802] "Failed creating a mirror pod for" err="pods \"kube-apiserver-ci-3510.3.0-a-b66ea99ec2\" already exists" pod="kube-system/kube-apiserver-ci-3510.3.0-a-b66ea99ec2" Oct 2 19:47:10.249406 kubelet[2613]: E1002 19:47:10.249331 2613 kubelet.go:1802] "Failed creating a mirror pod for" err="pods \"kube-controller-manager-ci-3510.3.0-a-b66ea99ec2\" already exists" pod="kube-system/kube-controller-manager-ci-3510.3.0-a-b66ea99ec2" Oct 2 19:47:10.481149 kubelet[2613]: I1002 19:47:10.481072 2613 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-scheduler-ci-3510.3.0-a-b66ea99ec2" podStartSLOduration=2.481001676 pod.CreationTimestamp="2023-10-02 19:47:08 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 19:47:10.480948397 +0000 UTC m=+2.082704460" watchObservedRunningTime="2023-10-02 19:47:10.481001676 +0000 UTC m=+2.082757739" Oct 2 19:47:10.762000 audit[2432]: AVC avc: denied { watch } for pid=2432 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sda9" ino=521299 scontext=system_u:system_r:svirt_lxc_net_t:s0:c275,c430 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Oct 2 19:47:10.790854 kernel: kauditd_printk_skb: 285 callbacks suppressed Oct 2 19:47:10.790916 kernel: audit: type=1400 audit(1696276030.762:973): avc: denied { watch } for pid=2432 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sda9" ino=521299 scontext=system_u:system_r:svirt_lxc_net_t:s0:c275,c430 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Oct 2 19:47:10.849219 kubelet[2613]: I1002 19:47:10.849182 2613 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-apiserver-ci-3510.3.0-a-b66ea99ec2" podStartSLOduration=3.8491390819999998 pod.CreationTimestamp="2023-10-02 19:47:07 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 19:47:10.848832464 +0000 UTC m=+2.450588489" watchObservedRunningTime="2023-10-02 19:47:10.849139082 +0000 UTC m=+2.450895106" Oct 2 19:47:10.762000 audit[2432]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0008eeac0 a2=fc6 a3=0 items=0 ppid=2271 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c275,c430 key=(null) Oct 2 19:47:11.005083 kernel: audit: type=1300 audit(1696276030.762:973): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0008eeac0 a2=fc6 a3=0 items=0 ppid=2271 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c275,c430 key=(null) Oct 2 19:47:11.005152 kernel: audit: type=1327 audit(1696276030.762:973): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:47:10.762000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:47:11.254861 kubelet[2613]: I1002 19:47:11.254847 2613 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-controller-manager-ci-3510.3.0-a-b66ea99ec2" podStartSLOduration=3.254820322 pod.CreationTimestamp="2023-10-02 19:47:08 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 19:47:11.254676033 +0000 UTC m=+2.856432057" watchObservedRunningTime="2023-10-02 19:47:11.254820322 +0000 UTC m=+2.856576344" Oct 2 19:47:12.253858 sudo[1633]: pam_unix(sudo:session): session closed for user root Oct 2 19:47:12.253000 audit[1633]: USER_END pid=1633 uid=500 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:47:12.254694 sshd[1628]: pam_unix(sshd:session): session closed for user core Oct 2 19:47:12.256196 systemd[1]: sshd@8-145.40.82.213:22-139.178.89.65:34418.service: Deactivated successfully. Oct 2 19:47:12.256654 systemd[1]: session-11.scope: Deactivated successfully. Oct 2 19:47:12.256742 systemd[1]: session-11.scope: Consumed 2.549s CPU time. Oct 2 19:47:12.257105 systemd-logind[1451]: Session 11 logged out. Waiting for processes to exit. Oct 2 19:47:12.257637 systemd-logind[1451]: Removed session 11. Oct 2 19:47:12.253000 audit[1633]: CRED_DISP pid=1633 uid=500 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:47:12.430510 kernel: audit: type=1106 audit(1696276032.253:974): pid=1633 uid=500 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:47:12.430545 kernel: audit: type=1104 audit(1696276032.253:975): pid=1633 uid=500 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 19:47:12.430560 kernel: audit: type=1106 audit(1696276032.255:976): pid=1628 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:47:12.255000 audit[1628]: USER_END pid=1628 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:47:12.526388 kernel: audit: type=1104 audit(1696276032.255:977): pid=1628 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:47:12.255000 audit[1628]: CRED_DISP pid=1628 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:47:12.616134 kernel: audit: type=1131 audit(1696276032.256:978): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-145.40.82.213:22-139.178.89.65:34418 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:47:12.256000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-145.40.82.213:22-139.178.89.65:34418 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:47:14.976451 update_engine[1453]: I1002 19:47:14.976341 1453 update_attempter.cc:505] Updating boot flags... Oct 2 19:47:22.627552 kubelet[2613]: I1002 19:47:22.627512 2613 kuberuntime_manager.go:1114] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Oct 2 19:47:22.627818 kubelet[2613]: I1002 19:47:22.627791 2613 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Oct 2 19:47:22.627850 env[1461]: time="2023-10-02T19:47:22.627693602Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Oct 2 19:47:23.431531 kubelet[2613]: I1002 19:47:23.431464 2613 topology_manager.go:210] "Topology Admit Handler" Oct 2 19:47:23.445732 systemd[1]: Created slice kubepods-besteffort-pod049fb656_69b6_4f44_9ffb_769ed482e802.slice. Oct 2 19:47:23.608458 kubelet[2613]: I1002 19:47:23.608360 2613 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/049fb656-69b6-4f44-9ffb-769ed482e802-xtables-lock\") pod \"kube-proxy-xxpqx\" (UID: \"049fb656-69b6-4f44-9ffb-769ed482e802\") " pod="kube-system/kube-proxy-xxpqx" Oct 2 19:47:23.608708 kubelet[2613]: I1002 19:47:23.608493 2613 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/049fb656-69b6-4f44-9ffb-769ed482e802-lib-modules\") pod \"kube-proxy-xxpqx\" (UID: \"049fb656-69b6-4f44-9ffb-769ed482e802\") " pod="kube-system/kube-proxy-xxpqx" Oct 2 19:47:23.608708 kubelet[2613]: I1002 19:47:23.608633 2613 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-7tjlh\" (UniqueName: \"kubernetes.io/projected/049fb656-69b6-4f44-9ffb-769ed482e802-kube-api-access-7tjlh\") pod \"kube-proxy-xxpqx\" (UID: \"049fb656-69b6-4f44-9ffb-769ed482e802\") " pod="kube-system/kube-proxy-xxpqx" Oct 2 19:47:23.608947 kubelet[2613]: I1002 19:47:23.608844 2613 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/049fb656-69b6-4f44-9ffb-769ed482e802-kube-proxy\") pod \"kube-proxy-xxpqx\" (UID: \"049fb656-69b6-4f44-9ffb-769ed482e802\") " pod="kube-system/kube-proxy-xxpqx" Oct 2 19:47:23.609587 kubelet[2613]: I1002 19:47:23.609521 2613 topology_manager.go:210] "Topology Admit Handler" Oct 2 19:47:23.619459 systemd[1]: Created slice kubepods-besteffort-pod75d1b295_65c1_42ec_8e65_a10408bf2e84.slice. Oct 2 19:47:23.710222 kubelet[2613]: I1002 19:47:23.709998 2613 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/75d1b295-65c1-42ec-8e65-a10408bf2e84-var-lib-calico\") pod \"tigera-operator-54b47459dd-n4k9f\" (UID: \"75d1b295-65c1-42ec-8e65-a10408bf2e84\") " pod="tigera-operator/tigera-operator-54b47459dd-n4k9f" Oct 2 19:47:23.710222 kubelet[2613]: I1002 19:47:23.710103 2613 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-sqhpg\" (UniqueName: \"kubernetes.io/projected/75d1b295-65c1-42ec-8e65-a10408bf2e84-kube-api-access-sqhpg\") pod \"tigera-operator-54b47459dd-n4k9f\" (UID: \"75d1b295-65c1-42ec-8e65-a10408bf2e84\") " pod="tigera-operator/tigera-operator-54b47459dd-n4k9f" Oct 2 19:47:23.764540 env[1461]: time="2023-10-02T19:47:23.764404896Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-xxpqx,Uid:049fb656-69b6-4f44-9ffb-769ed482e802,Namespace:kube-system,Attempt:0,}" Oct 2 19:47:23.788865 env[1461]: time="2023-10-02T19:47:23.788687929Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:47:23.788865 env[1461]: time="2023-10-02T19:47:23.788784386Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:47:23.788865 env[1461]: time="2023-10-02T19:47:23.788839715Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:47:23.789427 env[1461]: time="2023-10-02T19:47:23.789240700Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a4c1ed7b633f2b439c183414583424fc878efe34d9fe512a37d52ff658ca97a5 pid=2822 runtime=io.containerd.runc.v2 Oct 2 19:47:23.836245 systemd[1]: Started cri-containerd-a4c1ed7b633f2b439c183414583424fc878efe34d9fe512a37d52ff658ca97a5.scope. Oct 2 19:47:23.853000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:23.854000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:23.923801 env[1461]: time="2023-10-02T19:47:23.923782022Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-54b47459dd-n4k9f,Uid:75d1b295-65c1-42ec-8e65-a10408bf2e84,Namespace:tigera-operator,Attempt:0,}" Oct 2 19:47:23.983135 kernel: audit: type=1400 audit(1696276043.853:979): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:23.983182 kernel: audit: type=1400 audit(1696276043.854:980): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:23.983199 kernel: audit: type=1400 audit(1696276043.854:981): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:23.854000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:23.985725 env[1461]: time="2023-10-02T19:47:23.985663550Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:47:23.985725 env[1461]: time="2023-10-02T19:47:23.985690929Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:47:23.985725 env[1461]: time="2023-10-02T19:47:23.985706037Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:47:23.985818 env[1461]: time="2023-10-02T19:47:23.985779777Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/96993fd56536db61a317400da08a09f7687367195f694e45c119af7e46e1517b pid=2856 runtime=io.containerd.runc.v2 Oct 2 19:47:24.046744 kernel: audit: type=1400 audit(1696276043.854:982): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:23.854000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:24.065703 systemd[1]: Started cri-containerd-96993fd56536db61a317400da08a09f7687367195f694e45c119af7e46e1517b.scope. Oct 2 19:47:24.110707 kernel: audit: type=1400 audit(1696276043.854:983): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:23.854000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:24.174863 kernel: audit: type=1400 audit(1696276043.854:984): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:23.854000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:24.238986 kernel: audit: type=1400 audit(1696276043.854:985): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:23.854000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:24.303254 kernel: audit: type=1400 audit(1696276043.854:986): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:23.854000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:24.367382 kernel: audit: type=1400 audit(1696276043.854:987): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:24.367418 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Oct 2 19:47:23.854000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:24.045000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:24.045000 audit: BPF prog-id=112 op=LOAD Oct 2 19:47:24.045000 audit[2831]: AVC avc: denied { bpf } for pid=2831 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:24.045000 audit[2831]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2822 pid=2831 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:24.045000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134633165643762363333663262343339633138333431343538333432 Oct 2 19:47:24.045000 audit[2831]: AVC avc: denied { perfmon } for pid=2831 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:24.045000 audit[2831]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2822 pid=2831 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:24.045000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134633165643762363333663262343339633138333431343538333432 Oct 2 19:47:24.045000 audit[2831]: AVC avc: denied { bpf } for pid=2831 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:24.045000 audit[2831]: AVC avc: denied { bpf } for pid=2831 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:24.045000 audit[2831]: AVC avc: denied { bpf } for pid=2831 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:24.045000 audit[2831]: AVC avc: denied { perfmon } for pid=2831 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:24.045000 audit[2831]: AVC avc: denied { perfmon } for pid=2831 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:24.045000 audit[2831]: AVC avc: denied { perfmon } for pid=2831 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:24.045000 audit[2831]: AVC avc: denied { perfmon } for pid=2831 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:24.045000 audit[2831]: AVC avc: denied { perfmon } for pid=2831 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:24.045000 audit[2831]: AVC avc: denied { bpf } for pid=2831 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:24.112000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:24.112000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:24.112000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:24.112000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:24.112000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:24.112000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:24.112000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:24.112000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:24.112000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:24.045000 audit[2831]: AVC avc: denied { bpf } for pid=2831 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:24.045000 audit: BPF prog-id=113 op=LOAD Oct 2 19:47:24.045000 audit[2831]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000324360 items=0 ppid=2822 pid=2831 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:24.045000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134633165643762363333663262343339633138333431343538333432 Oct 2 19:47:24.174000 audit[2831]: AVC avc: denied { bpf } for pid=2831 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:24.174000 audit[2831]: AVC avc: denied { bpf } for pid=2831 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:24.174000 audit[2831]: AVC avc: denied { perfmon } for pid=2831 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:24.174000 audit[2831]: AVC avc: denied { perfmon } for pid=2831 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:24.174000 audit[2831]: AVC avc: denied { perfmon } for pid=2831 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:24.174000 audit[2831]: AVC avc: denied { perfmon } for pid=2831 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:24.174000 audit[2831]: AVC avc: denied { perfmon } for pid=2831 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:24.174000 audit[2831]: AVC avc: denied { bpf } for pid=2831 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:24.238000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:24.238000 audit: BPF prog-id=114 op=LOAD Oct 2 19:47:24.238000 audit[2866]: AVC avc: denied { bpf } for pid=2866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:24.238000 audit[2866]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2856 pid=2866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:24.238000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936393933666435363533366462363161333137343030646130386130 Oct 2 19:47:24.238000 audit[2866]: AVC avc: denied { perfmon } for pid=2866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:24.238000 audit[2866]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2856 pid=2866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:24.238000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936393933666435363533366462363161333137343030646130386130 Oct 2 19:47:24.238000 audit[2866]: AVC avc: denied { bpf } for pid=2866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:24.238000 audit[2866]: AVC avc: denied { bpf } for pid=2866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:24.238000 audit[2866]: AVC avc: denied { bpf } for pid=2866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:24.238000 audit[2866]: AVC avc: denied { perfmon } for pid=2866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:24.238000 audit[2866]: AVC avc: denied { perfmon } for pid=2866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:24.238000 audit[2866]: AVC avc: denied { perfmon } for pid=2866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:24.238000 audit[2866]: AVC avc: denied { perfmon } for pid=2866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:24.238000 audit[2866]: AVC avc: denied { perfmon } for pid=2866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:24.238000 audit[2866]: AVC avc: denied { bpf } for pid=2866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:24.174000 audit[2831]: AVC avc: denied { bpf } for pid=2831 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:24.174000 audit: BPF prog-id=115 op=LOAD Oct 2 19:47:24.174000 audit[2831]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003ba888 items=0 ppid=2822 pid=2831 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:24.174000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134633165643762363333663262343339633138333431343538333432 Oct 2 19:47:24.238000 audit[2866]: AVC avc: denied { bpf } for pid=2866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:24.430000 audit: BPF prog-id=115 op=UNLOAD Oct 2 19:47:24.430000 audit: BPF prog-id=113 op=UNLOAD Oct 2 19:47:24.430000 audit[2831]: AVC avc: denied { bpf } for pid=2831 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:24.430000 audit[2831]: AVC avc: denied { bpf } for pid=2831 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:24.430000 audit[2831]: AVC avc: denied { bpf } for pid=2831 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:24.430000 audit[2831]: AVC avc: denied { perfmon } for pid=2831 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:24.430000 audit[2831]: AVC avc: denied { perfmon } for pid=2831 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:24.430000 audit[2831]: AVC avc: denied { perfmon } for pid=2831 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:24.430000 audit[2831]: AVC avc: denied { perfmon } for pid=2831 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:24.430000 audit[2831]: AVC avc: denied { perfmon } for pid=2831 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:24.430000 audit[2831]: AVC avc: denied { bpf } for pid=2831 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:24.238000 audit[2866]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0000983f0 items=0 ppid=2856 pid=2866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:24.238000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936393933666435363533366462363161333137343030646130386130 Oct 2 19:47:24.456000 audit[2866]: AVC avc: denied { bpf } for pid=2866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:24.456000 audit[2866]: AVC avc: denied { bpf } for pid=2866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:24.456000 audit[2866]: AVC avc: denied { perfmon } for pid=2866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:24.456000 audit[2866]: AVC avc: denied { perfmon } for pid=2866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:24.456000 audit[2866]: AVC avc: denied { perfmon } for pid=2866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:24.456000 audit[2866]: AVC avc: denied { perfmon } for pid=2866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:24.456000 audit[2866]: AVC avc: denied { perfmon } for pid=2866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:24.456000 audit[2866]: AVC avc: denied { bpf } for pid=2866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:24.430000 audit[2831]: AVC avc: denied { bpf } for pid=2831 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:24.430000 audit: BPF prog-id=117 op=LOAD Oct 2 19:47:24.456000 audit[2866]: AVC avc: denied { bpf } for pid=2866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:24.456000 audit: BPF prog-id=118 op=LOAD Oct 2 19:47:24.430000 audit[2831]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003bac98 items=0 ppid=2822 pid=2831 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:24.456000 audit[2866]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000098438 items=0 ppid=2856 pid=2866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:24.456000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936393933666435363533366462363161333137343030646130386130 Oct 2 19:47:24.430000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134633165643762363333663262343339633138333431343538333432 Oct 2 19:47:24.456000 audit: BPF prog-id=118 op=UNLOAD Oct 2 19:47:24.456000 audit: BPF prog-id=116 op=UNLOAD Oct 2 19:47:24.456000 audit[2866]: AVC avc: denied { bpf } for pid=2866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:24.456000 audit[2866]: AVC avc: denied { bpf } for pid=2866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:24.456000 audit[2866]: AVC avc: denied { bpf } for pid=2866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:24.456000 audit[2866]: AVC avc: denied { perfmon } for pid=2866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:24.456000 audit[2866]: AVC avc: denied { perfmon } for pid=2866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:24.456000 audit[2866]: AVC avc: denied { perfmon } for pid=2866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:24.456000 audit[2866]: AVC avc: denied { perfmon } for pid=2866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:24.456000 audit[2866]: AVC avc: denied { perfmon } for pid=2866 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:24.456000 audit[2866]: AVC avc: denied { bpf } for pid=2866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:24.456000 audit[2866]: AVC avc: denied { bpf } for pid=2866 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:24.456000 audit: BPF prog-id=119 op=LOAD Oct 2 19:47:24.456000 audit[2866]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000098848 items=0 ppid=2856 pid=2866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:24.456000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936393933666435363533366462363161333137343030646130386130 Oct 2 19:47:24.475019 env[1461]: time="2023-10-02T19:47:24.474993997Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-xxpqx,Uid:049fb656-69b6-4f44-9ffb-769ed482e802,Namespace:kube-system,Attempt:0,} returns sandbox id \"a4c1ed7b633f2b439c183414583424fc878efe34d9fe512a37d52ff658ca97a5\"" Oct 2 19:47:24.476145 env[1461]: time="2023-10-02T19:47:24.476127439Z" level=info msg="CreateContainer within sandbox \"a4c1ed7b633f2b439c183414583424fc878efe34d9fe512a37d52ff658ca97a5\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Oct 2 19:47:24.481765 env[1461]: time="2023-10-02T19:47:24.481716634Z" level=info msg="CreateContainer within sandbox \"a4c1ed7b633f2b439c183414583424fc878efe34d9fe512a37d52ff658ca97a5\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"919522c505fb07e11e29c282f4b5a3639f8523108a7422ea83b015b4db6cacf9\"" Oct 2 19:47:24.481967 env[1461]: time="2023-10-02T19:47:24.481953902Z" level=info msg="StartContainer for \"919522c505fb07e11e29c282f4b5a3639f8523108a7422ea83b015b4db6cacf9\"" Oct 2 19:47:24.487787 env[1461]: time="2023-10-02T19:47:24.487732694Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-54b47459dd-n4k9f,Uid:75d1b295-65c1-42ec-8e65-a10408bf2e84,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"96993fd56536db61a317400da08a09f7687367195f694e45c119af7e46e1517b\"" Oct 2 19:47:24.488476 env[1461]: time="2023-10-02T19:47:24.488464991Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.29.0\"" Oct 2 19:47:24.508421 systemd[1]: Started cri-containerd-919522c505fb07e11e29c282f4b5a3639f8523108a7422ea83b015b4db6cacf9.scope. Oct 2 19:47:24.515000 audit[2904]: AVC avc: denied { perfmon } for pid=2904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:24.515000 audit[2904]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2822 pid=2904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:24.515000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931393532326335303566623037653131653239633238326634623561 Oct 2 19:47:24.515000 audit[2904]: AVC avc: denied { bpf } for pid=2904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:24.515000 audit[2904]: AVC avc: denied { bpf } for pid=2904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:24.515000 audit[2904]: AVC avc: denied { bpf } for pid=2904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:24.515000 audit[2904]: AVC avc: denied { perfmon } for pid=2904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:24.515000 audit[2904]: AVC avc: denied { perfmon } for pid=2904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:24.515000 audit[2904]: AVC avc: denied { perfmon } for pid=2904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:24.515000 audit[2904]: AVC avc: denied { perfmon } for pid=2904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:24.515000 audit[2904]: AVC avc: denied { perfmon } for pid=2904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:24.515000 audit[2904]: AVC avc: denied { bpf } for pid=2904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:24.515000 audit[2904]: AVC avc: denied { bpf } for pid=2904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:24.515000 audit: BPF prog-id=120 op=LOAD Oct 2 19:47:24.515000 audit[2904]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000298b40 items=0 ppid=2822 pid=2904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:24.515000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931393532326335303566623037653131653239633238326634623561 Oct 2 19:47:24.515000 audit[2904]: AVC avc: denied { bpf } for pid=2904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:24.515000 audit[2904]: AVC avc: denied { bpf } for pid=2904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:24.515000 audit[2904]: AVC avc: denied { perfmon } for pid=2904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:24.515000 audit[2904]: AVC avc: denied { perfmon } for pid=2904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:24.515000 audit[2904]: AVC avc: denied { perfmon } for pid=2904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:24.515000 audit[2904]: AVC avc: denied { perfmon } for pid=2904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:24.515000 audit[2904]: AVC avc: denied { perfmon } for pid=2904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:24.515000 audit[2904]: AVC avc: denied { bpf } for pid=2904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:24.515000 audit[2904]: AVC avc: denied { bpf } for pid=2904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:24.515000 audit: BPF prog-id=121 op=LOAD Oct 2 19:47:24.515000 audit[2904]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000298b88 items=0 ppid=2822 pid=2904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:24.515000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931393532326335303566623037653131653239633238326634623561 Oct 2 19:47:24.515000 audit: BPF prog-id=121 op=UNLOAD Oct 2 19:47:24.515000 audit: BPF prog-id=120 op=UNLOAD Oct 2 19:47:24.515000 audit[2904]: AVC avc: denied { bpf } for pid=2904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:24.515000 audit[2904]: AVC avc: denied { bpf } for pid=2904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:24.515000 audit[2904]: AVC avc: denied { bpf } for pid=2904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:24.515000 audit[2904]: AVC avc: denied { perfmon } for pid=2904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:24.515000 audit[2904]: AVC avc: denied { perfmon } for pid=2904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:24.515000 audit[2904]: AVC avc: denied { perfmon } for pid=2904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:24.515000 audit[2904]: AVC avc: denied { perfmon } for pid=2904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:24.515000 audit[2904]: AVC avc: denied { perfmon } for pid=2904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:24.515000 audit[2904]: AVC avc: denied { bpf } for pid=2904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:24.515000 audit[2904]: AVC avc: denied { bpf } for pid=2904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:24.515000 audit: BPF prog-id=122 op=LOAD Oct 2 19:47:24.515000 audit[2904]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000298c18 items=0 ppid=2822 pid=2904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:24.515000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931393532326335303566623037653131653239633238326634623561 Oct 2 19:47:24.523281 env[1461]: time="2023-10-02T19:47:24.523253588Z" level=info msg="StartContainer for \"919522c505fb07e11e29c282f4b5a3639f8523108a7422ea83b015b4db6cacf9\" returns successfully" Oct 2 19:47:24.547000 audit[2959]: NETFILTER_CFG table=mangle:59 family=2 entries=1 op=nft_register_chain pid=2959 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:47:24.547000 audit[2959]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdf7a27b70 a2=0 a3=7ffdf7a27b5c items=0 ppid=2915 pid=2959 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:24.547000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Oct 2 19:47:24.548000 audit[2960]: NETFILTER_CFG table=mangle:60 family=10 entries=1 op=nft_register_chain pid=2960 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:47:24.548000 audit[2960]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe31eefd90 a2=0 a3=7ffe31eefd7c items=0 ppid=2915 pid=2960 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:24.548000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Oct 2 19:47:24.548000 audit[2962]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2962 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:47:24.548000 audit[2962]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe3ef67240 a2=0 a3=7ffe3ef6722c items=0 ppid=2915 pid=2962 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:24.548000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Oct 2 19:47:24.548000 audit[2967]: NETFILTER_CFG table=nat:62 family=10 entries=1 op=nft_register_chain pid=2967 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:47:24.548000 audit[2967]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffec0673340 a2=0 a3=7ffec067332c items=0 ppid=2915 pid=2967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:24.548000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Oct 2 19:47:24.549000 audit[2968]: NETFILTER_CFG table=filter:63 family=2 entries=1 op=nft_register_chain pid=2968 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:47:24.549000 audit[2968]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff8e9b8f30 a2=0 a3=7fff8e9b8f1c items=0 ppid=2915 pid=2968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:24.549000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Oct 2 19:47:24.549000 audit[2969]: NETFILTER_CFG table=filter:64 family=10 entries=1 op=nft_register_chain pid=2969 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:47:24.549000 audit[2969]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd1b4e9d10 a2=0 a3=7ffd1b4e9cfc items=0 ppid=2915 pid=2969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:24.549000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Oct 2 19:47:24.653000 audit[2970]: NETFILTER_CFG table=filter:65 family=2 entries=1 op=nft_register_chain pid=2970 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:47:24.653000 audit[2970]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffcceb61e20 a2=0 a3=7ffcceb61e0c items=0 ppid=2915 pid=2970 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:24.653000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Oct 2 19:47:24.660000 audit[2973]: NETFILTER_CFG table=filter:66 family=2 entries=1 op=nft_register_rule pid=2973 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:47:24.660000 audit[2973]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffc7f459d70 a2=0 a3=7ffc7f459d5c items=0 ppid=2915 pid=2973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:24.660000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Oct 2 19:47:24.669000 audit[2976]: NETFILTER_CFG table=filter:67 family=2 entries=1 op=nft_register_rule pid=2976 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:47:24.669000 audit[2976]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffd7acbb730 a2=0 a3=7ffd7acbb71c items=0 ppid=2915 pid=2976 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:24.669000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Oct 2 19:47:24.672000 audit[2977]: NETFILTER_CFG table=filter:68 family=2 entries=1 op=nft_register_chain pid=2977 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:47:24.672000 audit[2977]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd80d88810 a2=0 a3=7ffd80d887fc items=0 ppid=2915 pid=2977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:24.672000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Oct 2 19:47:24.678000 audit[2979]: NETFILTER_CFG table=filter:69 family=2 entries=1 op=nft_register_rule pid=2979 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:47:24.678000 audit[2979]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffcc8c0a930 a2=0 a3=7ffcc8c0a91c items=0 ppid=2915 pid=2979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:24.678000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Oct 2 19:47:24.681000 audit[2980]: NETFILTER_CFG table=filter:70 family=2 entries=1 op=nft_register_chain pid=2980 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:47:24.681000 audit[2980]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff44694650 a2=0 a3=7fff4469463c items=0 ppid=2915 pid=2980 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:24.681000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Oct 2 19:47:24.687000 audit[2982]: NETFILTER_CFG table=filter:71 family=2 entries=1 op=nft_register_rule pid=2982 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:47:24.687000 audit[2982]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffd5658d180 a2=0 a3=7ffd5658d16c items=0 ppid=2915 pid=2982 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:24.687000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Oct 2 19:47:24.696000 audit[2985]: NETFILTER_CFG table=filter:72 family=2 entries=1 op=nft_register_rule pid=2985 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:47:24.696000 audit[2985]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fffdf6cb050 a2=0 a3=7fffdf6cb03c items=0 ppid=2915 pid=2985 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:24.696000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Oct 2 19:47:24.699000 audit[2986]: NETFILTER_CFG table=filter:73 family=2 entries=1 op=nft_register_chain pid=2986 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:47:24.699000 audit[2986]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd899f7680 a2=0 a3=7ffd899f766c items=0 ppid=2915 pid=2986 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:24.699000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Oct 2 19:47:24.705000 audit[2988]: NETFILTER_CFG table=filter:74 family=2 entries=1 op=nft_register_rule pid=2988 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:47:24.705000 audit[2988]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffcc2426360 a2=0 a3=7ffcc242634c items=0 ppid=2915 pid=2988 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:24.705000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Oct 2 19:47:24.708000 audit[2989]: NETFILTER_CFG table=filter:75 family=2 entries=1 op=nft_register_chain pid=2989 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:47:24.708000 audit[2989]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdad5fab40 a2=0 a3=7ffdad5fab2c items=0 ppid=2915 pid=2989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:24.708000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Oct 2 19:47:24.715000 audit[2991]: NETFILTER_CFG table=filter:76 family=2 entries=1 op=nft_register_rule pid=2991 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:47:24.715000 audit[2991]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffdf5610420 a2=0 a3=7ffdf561040c items=0 ppid=2915 pid=2991 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:24.715000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Oct 2 19:47:24.724000 audit[2994]: NETFILTER_CFG table=filter:77 family=2 entries=1 op=nft_register_rule pid=2994 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:47:24.724000 audit[2994]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd1d0883b0 a2=0 a3=7ffd1d08839c items=0 ppid=2915 pid=2994 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:24.724000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Oct 2 19:47:24.733000 audit[2997]: NETFILTER_CFG table=filter:78 family=2 entries=1 op=nft_register_rule pid=2997 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:47:24.733000 audit[2997]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe6a69b350 a2=0 a3=7ffe6a69b33c items=0 ppid=2915 pid=2997 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:24.733000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Oct 2 19:47:24.736000 audit[2998]: NETFILTER_CFG table=nat:79 family=2 entries=1 op=nft_register_chain pid=2998 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:47:24.736000 audit[2998]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffd2c5986b0 a2=0 a3=7ffd2c59869c items=0 ppid=2915 pid=2998 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:24.736000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Oct 2 19:47:24.742000 audit[3000]: NETFILTER_CFG table=nat:80 family=2 entries=1 op=nft_register_rule pid=3000 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:47:24.742000 audit[3000]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7fff9aa66890 a2=0 a3=7fff9aa6687c items=0 ppid=2915 pid=3000 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:24.742000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 2 19:47:24.751000 audit[3003]: NETFILTER_CFG table=nat:81 family=2 entries=1 op=nft_register_rule pid=3003 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 19:47:24.751000 audit[3003]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffdb33cf130 a2=0 a3=7ffdb33cf11c items=0 ppid=2915 pid=3003 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:24.751000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 2 19:47:24.777000 audit[3007]: NETFILTER_CFG table=filter:82 family=2 entries=6 op=nft_register_rule pid=3007 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:47:24.777000 audit[3007]: SYSCALL arch=c000003e syscall=46 success=yes exit=4028 a0=3 a1=7ffc8e182e20 a2=0 a3=7ffc8e182e0c items=0 ppid=2915 pid=3007 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:24.777000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:47:24.793000 audit[3007]: NETFILTER_CFG table=nat:83 family=2 entries=17 op=nft_register_chain pid=3007 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:47:24.793000 audit[3007]: SYSCALL arch=c000003e syscall=46 success=yes exit=5340 a0=3 a1=7ffc8e182e20 a2=0 a3=7ffc8e182e0c items=0 ppid=2915 pid=3007 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:24.793000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:47:24.796000 audit[3012]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=3012 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:47:24.796000 audit[3012]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fffd1d22280 a2=0 a3=7fffd1d2226c items=0 ppid=2915 pid=3012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:24.796000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Oct 2 19:47:24.802000 audit[3014]: NETFILTER_CFG table=filter:85 family=10 entries=2 op=nft_register_chain pid=3014 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:47:24.802000 audit[3014]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fff4e293a50 a2=0 a3=7fff4e293a3c items=0 ppid=2915 pid=3014 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:24.802000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Oct 2 19:47:24.818000 audit[3017]: NETFILTER_CFG table=filter:86 family=10 entries=2 op=nft_register_chain pid=3017 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:47:24.818000 audit[3017]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffe4b332d60 a2=0 a3=7ffe4b332d4c items=0 ppid=2915 pid=3017 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:24.818000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Oct 2 19:47:24.821000 audit[3018]: NETFILTER_CFG table=filter:87 family=10 entries=1 op=nft_register_chain pid=3018 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:47:24.821000 audit[3018]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff71f353b0 a2=0 a3=7fff71f3539c items=0 ppid=2915 pid=3018 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:24.821000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Oct 2 19:47:24.827000 audit[3020]: NETFILTER_CFG table=filter:88 family=10 entries=1 op=nft_register_rule pid=3020 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:47:24.827000 audit[3020]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffec77c4390 a2=0 a3=7ffec77c437c items=0 ppid=2915 pid=3020 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:24.827000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Oct 2 19:47:24.830000 audit[3021]: NETFILTER_CFG table=filter:89 family=10 entries=1 op=nft_register_chain pid=3021 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:47:24.830000 audit[3021]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcc2535480 a2=0 a3=7ffcc253546c items=0 ppid=2915 pid=3021 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:24.830000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Oct 2 19:47:24.836000 audit[3023]: NETFILTER_CFG table=filter:90 family=10 entries=1 op=nft_register_rule pid=3023 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:47:24.836000 audit[3023]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffc4769aff0 a2=0 a3=7ffc4769afdc items=0 ppid=2915 pid=3023 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:24.836000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Oct 2 19:47:24.845000 audit[3026]: NETFILTER_CFG table=filter:91 family=10 entries=2 op=nft_register_chain pid=3026 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:47:24.845000 audit[3026]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffffaaa0d30 a2=0 a3=7ffffaaa0d1c items=0 ppid=2915 pid=3026 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:24.845000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Oct 2 19:47:24.847000 audit[3027]: NETFILTER_CFG table=filter:92 family=10 entries=1 op=nft_register_chain pid=3027 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:47:24.847000 audit[3027]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd69dee650 a2=0 a3=7ffd69dee63c items=0 ppid=2915 pid=3027 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:24.847000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Oct 2 19:47:24.853000 audit[3029]: NETFILTER_CFG table=filter:93 family=10 entries=1 op=nft_register_rule pid=3029 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:47:24.853000 audit[3029]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffeaa2d45d0 a2=0 a3=7ffeaa2d45bc items=0 ppid=2915 pid=3029 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:24.853000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Oct 2 19:47:24.856000 audit[3030]: NETFILTER_CFG table=filter:94 family=10 entries=1 op=nft_register_chain pid=3030 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:47:24.856000 audit[3030]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff1e8bd8a0 a2=0 a3=7fff1e8bd88c items=0 ppid=2915 pid=3030 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:24.856000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Oct 2 19:47:24.863000 audit[3032]: NETFILTER_CFG table=filter:95 family=10 entries=1 op=nft_register_rule pid=3032 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:47:24.863000 audit[3032]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fffe532e640 a2=0 a3=7fffe532e62c items=0 ppid=2915 pid=3032 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:24.863000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Oct 2 19:47:24.871000 audit[3035]: NETFILTER_CFG table=filter:96 family=10 entries=1 op=nft_register_rule pid=3035 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:47:24.871000 audit[3035]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffdf4932910 a2=0 a3=7ffdf49328fc items=0 ppid=2915 pid=3035 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:24.871000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Oct 2 19:47:24.880000 audit[3038]: NETFILTER_CFG table=filter:97 family=10 entries=1 op=nft_register_rule pid=3038 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:47:24.880000 audit[3038]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff9ff0c260 a2=0 a3=7fff9ff0c24c items=0 ppid=2915 pid=3038 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:24.880000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Oct 2 19:47:24.883000 audit[3039]: NETFILTER_CFG table=nat:98 family=10 entries=1 op=nft_register_chain pid=3039 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:47:24.883000 audit[3039]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff7ed74100 a2=0 a3=7fff7ed740ec items=0 ppid=2915 pid=3039 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:24.883000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Oct 2 19:47:24.889000 audit[3041]: NETFILTER_CFG table=nat:99 family=10 entries=2 op=nft_register_chain pid=3041 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:47:24.889000 audit[3041]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffe63dd6320 a2=0 a3=7ffe63dd630c items=0 ppid=2915 pid=3041 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:24.889000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 2 19:47:24.897000 audit[3044]: NETFILTER_CFG table=nat:100 family=10 entries=2 op=nft_register_chain pid=3044 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 19:47:24.897000 audit[3044]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffde332a2f0 a2=0 a3=7ffde332a2dc items=0 ppid=2915 pid=3044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:24.897000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 2 19:47:24.910000 audit[3048]: NETFILTER_CFG table=filter:101 family=10 entries=3 op=nft_register_rule pid=3048 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Oct 2 19:47:24.910000 audit[3048]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7fff3fa41510 a2=0 a3=7fff3fa414fc items=0 ppid=2915 pid=3048 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:24.910000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:47:24.911000 audit[3048]: NETFILTER_CFG table=nat:102 family=10 entries=10 op=nft_register_chain pid=3048 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Oct 2 19:47:24.911000 audit[3048]: SYSCALL arch=c000003e syscall=46 success=yes exit=1968 a0=3 a1=7fff3fa41510 a2=0 a3=7fff3fa414fc items=0 ppid=2915 pid=3048 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:24.911000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:47:25.532544 kubelet[2613]: I1002 19:47:25.532444 2613 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-xxpqx" podStartSLOduration=2.532342272 pod.CreationTimestamp="2023-10-02 19:47:23 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 19:47:25.531898412 +0000 UTC m=+17.133654507" watchObservedRunningTime="2023-10-02 19:47:25.532342272 +0000 UTC m=+17.134098382" Oct 2 19:47:25.629402 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount598479295.mount: Deactivated successfully. Oct 2 19:47:26.675012 env[1461]: time="2023-10-02T19:47:26.674898680Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.29.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:47:26.740500 env[1461]: time="2023-10-02T19:47:26.740359378Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:343ea4f89a32c8f197173c5d9f1ad64eb033df452c5b89a65877d8d3cfa692b1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:47:26.787024 env[1461]: time="2023-10-02T19:47:26.786895138Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.29.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:47:26.833451 env[1461]: time="2023-10-02T19:47:26.833263499Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:89eef35e1bbe8c88792ce69c3f3f38fb9838e58602c570524350b5f3ab127582,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:47:26.836319 env[1461]: time="2023-10-02T19:47:26.836165547Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.29.0\" returns image reference \"sha256:343ea4f89a32c8f197173c5d9f1ad64eb033df452c5b89a65877d8d3cfa692b1\"" Oct 2 19:47:26.841230 env[1461]: time="2023-10-02T19:47:26.841124626Z" level=info msg="CreateContainer within sandbox \"96993fd56536db61a317400da08a09f7687367195f694e45c119af7e46e1517b\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Oct 2 19:47:26.948218 env[1461]: time="2023-10-02T19:47:26.948134255Z" level=info msg="CreateContainer within sandbox \"96993fd56536db61a317400da08a09f7687367195f694e45c119af7e46e1517b\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"d687222ff18671262dc097820c7dba5fc3533f27b6f5662461b57282645d3e99\"" Oct 2 19:47:26.948518 env[1461]: time="2023-10-02T19:47:26.948469628Z" level=info msg="StartContainer for \"d687222ff18671262dc097820c7dba5fc3533f27b6f5662461b57282645d3e99\"" Oct 2 19:47:26.971482 systemd[1]: Started cri-containerd-d687222ff18671262dc097820c7dba5fc3533f27b6f5662461b57282645d3e99.scope. Oct 2 19:47:26.976000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:26.976000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:26.976000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:26.976000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:26.976000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:26.976000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:26.976000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:26.976000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:26.976000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:26.976000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:26.976000 audit: BPF prog-id=123 op=LOAD Oct 2 19:47:26.976000 audit[3056]: AVC avc: denied { bpf } for pid=3056 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:26.976000 audit[3056]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=2856 pid=3056 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:26.976000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436383732323266663138363731323632646330393738323063376462 Oct 2 19:47:26.976000 audit[3056]: AVC avc: denied { perfmon } for pid=3056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:26.976000 audit[3056]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=2856 pid=3056 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:26.976000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436383732323266663138363731323632646330393738323063376462 Oct 2 19:47:26.976000 audit[3056]: AVC avc: denied { bpf } for pid=3056 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:26.976000 audit[3056]: AVC avc: denied { bpf } for pid=3056 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:26.976000 audit[3056]: AVC avc: denied { bpf } for pid=3056 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:26.976000 audit[3056]: AVC avc: denied { perfmon } for pid=3056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:26.976000 audit[3056]: AVC avc: denied { perfmon } for pid=3056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:26.976000 audit[3056]: AVC avc: denied { perfmon } for pid=3056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:26.976000 audit[3056]: AVC avc: denied { perfmon } for pid=3056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:26.976000 audit[3056]: AVC avc: denied { perfmon } for pid=3056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:26.976000 audit[3056]: AVC avc: denied { bpf } for pid=3056 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:26.976000 audit[3056]: AVC avc: denied { bpf } for pid=3056 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:26.976000 audit: BPF prog-id=124 op=LOAD Oct 2 19:47:26.976000 audit[3056]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c0001f9560 items=0 ppid=2856 pid=3056 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:26.976000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436383732323266663138363731323632646330393738323063376462 Oct 2 19:47:26.976000 audit[3056]: AVC avc: denied { bpf } for pid=3056 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:26.976000 audit[3056]: AVC avc: denied { bpf } for pid=3056 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:26.976000 audit[3056]: AVC avc: denied { perfmon } for pid=3056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:26.976000 audit[3056]: AVC avc: denied { perfmon } for pid=3056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:26.976000 audit[3056]: AVC avc: denied { perfmon } for pid=3056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:26.976000 audit[3056]: AVC avc: denied { perfmon } for pid=3056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:26.976000 audit[3056]: AVC avc: denied { perfmon } for pid=3056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:26.976000 audit[3056]: AVC avc: denied { bpf } for pid=3056 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:26.976000 audit[3056]: AVC avc: denied { bpf } for pid=3056 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:26.976000 audit: BPF prog-id=125 op=LOAD Oct 2 19:47:26.976000 audit[3056]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c0001f95a8 items=0 ppid=2856 pid=3056 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:26.976000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436383732323266663138363731323632646330393738323063376462 Oct 2 19:47:26.976000 audit: BPF prog-id=125 op=UNLOAD Oct 2 19:47:26.977000 audit: BPF prog-id=124 op=UNLOAD Oct 2 19:47:26.977000 audit[3056]: AVC avc: denied { bpf } for pid=3056 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:26.977000 audit[3056]: AVC avc: denied { bpf } for pid=3056 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:26.977000 audit[3056]: AVC avc: denied { bpf } for pid=3056 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:26.977000 audit[3056]: AVC avc: denied { perfmon } for pid=3056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:26.977000 audit[3056]: AVC avc: denied { perfmon } for pid=3056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:26.977000 audit[3056]: AVC avc: denied { perfmon } for pid=3056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:26.977000 audit[3056]: AVC avc: denied { perfmon } for pid=3056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:26.977000 audit[3056]: AVC avc: denied { perfmon } for pid=3056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:26.977000 audit[3056]: AVC avc: denied { bpf } for pid=3056 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:26.977000 audit[3056]: AVC avc: denied { bpf } for pid=3056 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:26.977000 audit: BPF prog-id=126 op=LOAD Oct 2 19:47:26.977000 audit[3056]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c0001f99b8 items=0 ppid=2856 pid=3056 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:26.977000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436383732323266663138363731323632646330393738323063376462 Oct 2 19:47:26.998026 env[1461]: time="2023-10-02T19:47:26.997993523Z" level=info msg="StartContainer for \"d687222ff18671262dc097820c7dba5fc3533f27b6f5662461b57282645d3e99\" returns successfully" Oct 2 19:47:27.539195 kubelet[2613]: I1002 19:47:27.539093 2613 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="tigera-operator/tigera-operator-54b47459dd-n4k9f" podStartSLOduration=-9.223372032315767e+09 pod.CreationTimestamp="2023-10-02 19:47:23 +0000 UTC" firstStartedPulling="2023-10-02 19:47:24.488253893 +0000 UTC m=+16.090009917" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 19:47:27.538522732 +0000 UTC m=+19.140278854" watchObservedRunningTime="2023-10-02 19:47:27.539008685 +0000 UTC m=+19.140764763" Oct 2 19:47:29.059000 audit[3126]: NETFILTER_CFG table=filter:103 family=2 entries=13 op=nft_register_rule pid=3126 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:47:29.100907 kernel: kauditd_printk_skb: 338 callbacks suppressed Oct 2 19:47:29.101030 kernel: audit: type=1325 audit(1696276049.059:1083): table=filter:103 family=2 entries=13 op=nft_register_rule pid=3126 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:47:29.059000 audit[3126]: SYSCALL arch=c000003e syscall=46 success=yes exit=4732 a0=3 a1=7fffb4e22d80 a2=0 a3=7fffb4e22d6c items=0 ppid=2915 pid=3126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:29.187502 kubelet[2613]: I1002 19:47:29.187481 2613 topology_manager.go:210] "Topology Admit Handler" Oct 2 19:47:29.190863 systemd[1]: Created slice kubepods-besteffort-pod15d7e2dc_c85c_4cd2_b036_911dfb9051d4.slice. Oct 2 19:47:29.199164 kubelet[2613]: I1002 19:47:29.199146 2613 topology_manager.go:210] "Topology Admit Handler" Oct 2 19:47:29.202598 systemd[1]: Created slice kubepods-besteffort-podfb5c08c0_8f34_4462_8a6a_45ba9ceb2991.slice. Oct 2 19:47:29.257582 kernel: audit: type=1300 audit(1696276049.059:1083): arch=c000003e syscall=46 success=yes exit=4732 a0=3 a1=7fffb4e22d80 a2=0 a3=7fffb4e22d6c items=0 ppid=2915 pid=3126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:29.257670 kernel: audit: type=1327 audit(1696276049.059:1083): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:47:29.059000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:47:29.061000 audit[3126]: NETFILTER_CFG table=nat:104 family=2 entries=20 op=nft_register_rule pid=3126 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:47:29.346277 kubelet[2613]: I1002 19:47:29.346229 2613 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/fb5c08c0-8f34-4462-8a6a-45ba9ceb2991-policysync\") pod \"calico-node-ppdj9\" (UID: \"fb5c08c0-8f34-4462-8a6a-45ba9ceb2991\") " pod="calico-system/calico-node-ppdj9" Oct 2 19:47:29.346277 kubelet[2613]: I1002 19:47:29.346255 2613 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/fb5c08c0-8f34-4462-8a6a-45ba9ceb2991-var-lib-calico\") pod \"calico-node-ppdj9\" (UID: \"fb5c08c0-8f34-4462-8a6a-45ba9ceb2991\") " pod="calico-system/calico-node-ppdj9" Oct 2 19:47:29.346277 kubelet[2613]: I1002 19:47:29.346267 2613 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/fb5c08c0-8f34-4462-8a6a-45ba9ceb2991-cni-net-dir\") pod \"calico-node-ppdj9\" (UID: \"fb5c08c0-8f34-4462-8a6a-45ba9ceb2991\") " pod="calico-system/calico-node-ppdj9" Oct 2 19:47:29.346277 kubelet[2613]: I1002 19:47:29.346280 2613 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/fb5c08c0-8f34-4462-8a6a-45ba9ceb2991-flexvol-driver-host\") pod \"calico-node-ppdj9\" (UID: \"fb5c08c0-8f34-4462-8a6a-45ba9ceb2991\") " pod="calico-system/calico-node-ppdj9" Oct 2 19:47:29.346467 kubelet[2613]: I1002 19:47:29.346293 2613 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/fb5c08c0-8f34-4462-8a6a-45ba9ceb2991-tigera-ca-bundle\") pod \"calico-node-ppdj9\" (UID: \"fb5c08c0-8f34-4462-8a6a-45ba9ceb2991\") " pod="calico-system/calico-node-ppdj9" Oct 2 19:47:29.346467 kubelet[2613]: I1002 19:47:29.346320 2613 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/15d7e2dc-c85c-4cd2-b036-911dfb9051d4-tigera-ca-bundle\") pod \"calico-typha-58fc58c8d9-w5p4c\" (UID: \"15d7e2dc-c85c-4cd2-b036-911dfb9051d4\") " pod="calico-system/calico-typha-58fc58c8d9-w5p4c" Oct 2 19:47:29.346467 kubelet[2613]: I1002 19:47:29.346344 2613 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/fb5c08c0-8f34-4462-8a6a-45ba9ceb2991-var-run-calico\") pod \"calico-node-ppdj9\" (UID: \"fb5c08c0-8f34-4462-8a6a-45ba9ceb2991\") " pod="calico-system/calico-node-ppdj9" Oct 2 19:47:29.346467 kubelet[2613]: I1002 19:47:29.346401 2613 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/15d7e2dc-c85c-4cd2-b036-911dfb9051d4-typha-certs\") pod \"calico-typha-58fc58c8d9-w5p4c\" (UID: \"15d7e2dc-c85c-4cd2-b036-911dfb9051d4\") " pod="calico-system/calico-typha-58fc58c8d9-w5p4c" Oct 2 19:47:29.346467 kubelet[2613]: I1002 19:47:29.346437 2613 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/fb5c08c0-8f34-4462-8a6a-45ba9ceb2991-cni-log-dir\") pod \"calico-node-ppdj9\" (UID: \"fb5c08c0-8f34-4462-8a6a-45ba9ceb2991\") " pod="calico-system/calico-node-ppdj9" Oct 2 19:47:29.346610 kubelet[2613]: I1002 19:47:29.346468 2613 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/fb5c08c0-8f34-4462-8a6a-45ba9ceb2991-xtables-lock\") pod \"calico-node-ppdj9\" (UID: \"fb5c08c0-8f34-4462-8a6a-45ba9ceb2991\") " pod="calico-system/calico-node-ppdj9" Oct 2 19:47:29.346610 kubelet[2613]: I1002 19:47:29.346504 2613 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-svs8v\" (UniqueName: \"kubernetes.io/projected/fb5c08c0-8f34-4462-8a6a-45ba9ceb2991-kube-api-access-svs8v\") pod \"calico-node-ppdj9\" (UID: \"fb5c08c0-8f34-4462-8a6a-45ba9ceb2991\") " pod="calico-system/calico-node-ppdj9" Oct 2 19:47:29.346610 kubelet[2613]: I1002 19:47:29.346528 2613 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-5bhck\" (UniqueName: \"kubernetes.io/projected/15d7e2dc-c85c-4cd2-b036-911dfb9051d4-kube-api-access-5bhck\") pod \"calico-typha-58fc58c8d9-w5p4c\" (UID: \"15d7e2dc-c85c-4cd2-b036-911dfb9051d4\") " pod="calico-system/calico-typha-58fc58c8d9-w5p4c" Oct 2 19:47:29.346610 kubelet[2613]: I1002 19:47:29.346550 2613 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/fb5c08c0-8f34-4462-8a6a-45ba9ceb2991-lib-modules\") pod \"calico-node-ppdj9\" (UID: \"fb5c08c0-8f34-4462-8a6a-45ba9ceb2991\") " pod="calico-system/calico-node-ppdj9" Oct 2 19:47:29.346610 kubelet[2613]: I1002 19:47:29.346587 2613 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/fb5c08c0-8f34-4462-8a6a-45ba9ceb2991-node-certs\") pod \"calico-node-ppdj9\" (UID: \"fb5c08c0-8f34-4462-8a6a-45ba9ceb2991\") " pod="calico-system/calico-node-ppdj9" Oct 2 19:47:29.346721 kubelet[2613]: I1002 19:47:29.346614 2613 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/fb5c08c0-8f34-4462-8a6a-45ba9ceb2991-cni-bin-dir\") pod \"calico-node-ppdj9\" (UID: \"fb5c08c0-8f34-4462-8a6a-45ba9ceb2991\") " pod="calico-system/calico-node-ppdj9" Oct 2 19:47:29.061000 audit[3126]: SYSCALL arch=c000003e syscall=46 success=yes exit=5340 a0=3 a1=7fffb4e22d80 a2=0 a3=7fffb4e22d6c items=0 ppid=2915 pid=3126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:29.447894 kubelet[2613]: E1002 19:47:29.447879 2613 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:47:29.447894 kubelet[2613]: W1002 19:47:29.447889 2613 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:47:29.448008 kubelet[2613]: E1002 19:47:29.447903 2613 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:47:29.448031 kubelet[2613]: E1002 19:47:29.448010 2613 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:47:29.448031 kubelet[2613]: W1002 19:47:29.448015 2613 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:47:29.448031 kubelet[2613]: E1002 19:47:29.448022 2613 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:47:29.449092 kubelet[2613]: E1002 19:47:29.449083 2613 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:47:29.449092 kubelet[2613]: W1002 19:47:29.449090 2613 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:47:29.449151 kubelet[2613]: E1002 19:47:29.449100 2613 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:47:29.449190 kubelet[2613]: E1002 19:47:29.449185 2613 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:47:29.449190 kubelet[2613]: W1002 19:47:29.449190 2613 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:47:29.449232 kubelet[2613]: E1002 19:47:29.449196 2613 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:47:29.452826 kubelet[2613]: E1002 19:47:29.452814 2613 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:47:29.452826 kubelet[2613]: W1002 19:47:29.452822 2613 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:47:29.452908 kubelet[2613]: E1002 19:47:29.452837 2613 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:47:29.453376 kubelet[2613]: E1002 19:47:29.453343 2613 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 19:47:29.453376 kubelet[2613]: W1002 19:47:29.453350 2613 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 19:47:29.453376 kubelet[2613]: E1002 19:47:29.453358 2613 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 19:47:29.475209 kernel: audit: type=1325 audit(1696276049.061:1084): table=nat:104 family=2 entries=20 op=nft_register_rule pid=3126 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:47:29.475287 kernel: audit: type=1300 audit(1696276049.061:1084): arch=c000003e syscall=46 success=yes exit=5340 a0=3 a1=7fffb4e22d80 a2=0 a3=7fffb4e22d6c items=0 ppid=2915 pid=3126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:29.475316 kernel: audit: type=1327 audit(1696276049.061:1084): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:47:29.061000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:47:29.493067 env[1461]: time="2023-10-02T19:47:29.493017471Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-58fc58c8d9-w5p4c,Uid:15d7e2dc-c85c-4cd2-b036-911dfb9051d4,Namespace:calico-system,Attempt:0,}" Oct 2 19:47:29.500157 env[1461]: time="2023-10-02T19:47:29.500093683Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:47:29.500157 env[1461]: time="2023-10-02T19:47:29.500117609Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:47:29.500157 env[1461]: time="2023-10-02T19:47:29.500124891Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:47:29.500271 env[1461]: time="2023-10-02T19:47:29.500186200Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/48a90197b44579037ffd7d6de8a000af94fc99a32e874e2dbb2b2c347c9dbccb pid=3170 runtime=io.containerd.runc.v2 Oct 2 19:47:29.504584 env[1461]: time="2023-10-02T19:47:29.504532897Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-ppdj9,Uid:fb5c08c0-8f34-4462-8a6a-45ba9ceb2991,Namespace:calico-system,Attempt:0,}" Oct 2 19:47:29.518769 env[1461]: time="2023-10-02T19:47:29.518700994Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:47:29.518769 env[1461]: time="2023-10-02T19:47:29.518722926Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:47:29.518769 env[1461]: time="2023-10-02T19:47:29.518729928Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:47:29.518901 env[1461]: time="2023-10-02T19:47:29.518787673Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f0d85139863ef2659ce71429c9934c08082c50b9a640e634c7a60ccd82b2def4 pid=3194 runtime=io.containerd.runc.v2 Oct 2 19:47:29.537364 systemd[1]: Started cri-containerd-f0d85139863ef2659ce71429c9934c08082c50b9a640e634c7a60ccd82b2def4.scope. Oct 2 19:47:29.541000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:29.541000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:29.607348 kernel: audit: type=1400 audit(1696276049.541:1085): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:29.607393 kernel: audit: type=1400 audit(1696276049.541:1086): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:29.541000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:29.671306 kernel: audit: type=1400 audit(1696276049.541:1087): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:29.671768 systemd[1]: Started cri-containerd-48a90197b44579037ffd7d6de8a000af94fc99a32e874e2dbb2b2c347c9dbccb.scope. Oct 2 19:47:29.541000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:29.734306 kernel: audit: type=1400 audit(1696276049.541:1088): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:29.541000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:29.541000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:29.541000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:29.541000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:29.541000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:29.334000 audit[3152]: NETFILTER_CFG table=filter:105 family=2 entries=14 op=nft_register_rule pid=3152 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:47:29.334000 audit[3152]: SYSCALL arch=c000003e syscall=46 success=yes exit=4732 a0=3 a1=7fffe7f32c90 a2=0 a3=7fffe7f32c7c items=0 ppid=2915 pid=3152 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:29.334000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:47:29.670000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:29.670000 audit: BPF prog-id=127 op=LOAD Oct 2 19:47:29.670000 audit[3204]: AVC avc: denied { bpf } for pid=3204 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:29.670000 audit[3204]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3194 pid=3204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:29.670000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6630643835313339383633656632363539636537313432396339393334 Oct 2 19:47:29.670000 audit[3204]: AVC avc: denied { perfmon } for pid=3204 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:29.670000 audit[3204]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3194 pid=3204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:29.670000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6630643835313339383633656632363539636537313432396339393334 Oct 2 19:47:29.670000 audit[3204]: AVC avc: denied { bpf } for pid=3204 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:29.670000 audit[3204]: AVC avc: denied { bpf } for pid=3204 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:29.670000 audit[3204]: AVC avc: denied { bpf } for pid=3204 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:29.670000 audit[3204]: AVC avc: denied { perfmon } for pid=3204 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:29.670000 audit[3204]: AVC avc: denied { perfmon } for pid=3204 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:29.670000 audit[3204]: AVC avc: denied { perfmon } for pid=3204 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:29.670000 audit[3204]: AVC avc: denied { perfmon } for pid=3204 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:29.670000 audit[3204]: AVC avc: denied { perfmon } for pid=3204 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:29.670000 audit[3204]: AVC avc: denied { bpf } for pid=3204 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:29.674000 audit[3152]: NETFILTER_CFG table=nat:106 family=2 entries=20 op=nft_register_rule pid=3152 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:47:29.674000 audit[3152]: SYSCALL arch=c000003e syscall=46 success=yes exit=5340 a0=3 a1=7fffe7f32c90 a2=0 a3=7fffe7f32c7c items=0 ppid=2915 pid=3152 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:29.674000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:47:29.675000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:29.675000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:29.675000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:29.675000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:29.675000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:29.675000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:29.675000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:29.675000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:29.675000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:29.670000 audit[3204]: AVC avc: denied { bpf } for pid=3204 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:29.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:29.670000 audit: BPF prog-id=128 op=LOAD Oct 2 19:47:29.797000 audit: BPF prog-id=129 op=LOAD Oct 2 19:47:29.670000 audit[3204]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003c26f0 items=0 ppid=3194 pid=3204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:29.670000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6630643835313339383633656632363539636537313432396339393334 Oct 2 19:47:29.797000 audit[3204]: AVC avc: denied { bpf } for pid=3204 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:29.797000 audit[3204]: AVC avc: denied { bpf } for pid=3204 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:29.797000 audit[3204]: AVC avc: denied { perfmon } for pid=3204 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:29.797000 audit[3204]: AVC avc: denied { perfmon } for pid=3204 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:29.797000 audit[3204]: AVC avc: denied { perfmon } for pid=3204 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:29.797000 audit[3204]: AVC avc: denied { perfmon } for pid=3204 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:29.797000 audit[3204]: AVC avc: denied { perfmon } for pid=3204 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:29.797000 audit[3204]: AVC avc: denied { bpf } for pid=3204 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:29.797000 audit[3204]: AVC avc: denied { bpf } for pid=3204 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:29.797000 audit: BPF prog-id=130 op=LOAD Oct 2 19:47:29.797000 audit[3204]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003c2738 items=0 ppid=3194 pid=3204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:29.797000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6630643835313339383633656632363539636537313432396339393334 Oct 2 19:47:29.797000 audit: BPF prog-id=130 op=UNLOAD Oct 2 19:47:29.797000 audit: BPF prog-id=128 op=UNLOAD Oct 2 19:47:29.797000 audit[3204]: AVC avc: denied { bpf } for pid=3204 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:29.797000 audit[3204]: AVC avc: denied { bpf } for pid=3204 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:29.797000 audit[3204]: AVC avc: denied { bpf } for pid=3204 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:29.797000 audit[3204]: AVC avc: denied { perfmon } for pid=3204 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:29.797000 audit[3204]: AVC avc: denied { perfmon } for pid=3204 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:29.797000 audit[3204]: AVC avc: denied { perfmon } for pid=3204 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:29.797000 audit[3204]: AVC avc: denied { perfmon } for pid=3204 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:29.797000 audit[3204]: AVC avc: denied { perfmon } for pid=3204 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:29.797000 audit[3204]: AVC avc: denied { bpf } for pid=3204 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:29.797000 audit[3204]: AVC avc: denied { bpf } for pid=3204 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:29.797000 audit: BPF prog-id=131 op=LOAD Oct 2 19:47:29.797000 audit[3204]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003c2b48 items=0 ppid=3194 pid=3204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:29.797000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6630643835313339383633656632363539636537313432396339393334 Oct 2 19:47:29.797000 audit[3180]: AVC avc: denied { bpf } for pid=3180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:29.797000 audit[3180]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3170 pid=3180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:29.797000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438613930313937623434353739303337666664376436646538613030 Oct 2 19:47:29.797000 audit[3180]: AVC avc: denied { perfmon } for pid=3180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:29.797000 audit[3180]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3170 pid=3180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:29.797000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438613930313937623434353739303337666664376436646538613030 Oct 2 19:47:29.797000 audit[3180]: AVC avc: denied { bpf } for pid=3180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:29.797000 audit[3180]: AVC avc: denied { bpf } for pid=3180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:29.797000 audit[3180]: AVC avc: denied { bpf } for pid=3180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:29.797000 audit[3180]: AVC avc: denied { perfmon } for pid=3180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:29.797000 audit[3180]: AVC avc: denied { perfmon } for pid=3180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:29.797000 audit[3180]: AVC avc: denied { perfmon } for pid=3180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:29.797000 audit[3180]: AVC avc: denied { perfmon } for pid=3180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:29.797000 audit[3180]: AVC avc: denied { perfmon } for pid=3180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:29.797000 audit[3180]: AVC avc: denied { bpf } for pid=3180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:29.797000 audit[3180]: AVC avc: denied { bpf } for pid=3180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:29.797000 audit: BPF prog-id=132 op=LOAD Oct 2 19:47:29.797000 audit[3180]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003f2c60 items=0 ppid=3170 pid=3180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:29.797000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438613930313937623434353739303337666664376436646538613030 Oct 2 19:47:29.797000 audit[3180]: AVC avc: denied { bpf } for pid=3180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:29.797000 audit[3180]: AVC avc: denied { bpf } for pid=3180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:29.797000 audit[3180]: AVC avc: denied { perfmon } for pid=3180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:29.797000 audit[3180]: AVC avc: denied { perfmon } for pid=3180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:29.797000 audit[3180]: AVC avc: denied { perfmon } for pid=3180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:29.797000 audit[3180]: AVC avc: denied { perfmon } for pid=3180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:29.797000 audit[3180]: AVC avc: denied { perfmon } for pid=3180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:29.797000 audit[3180]: AVC avc: denied { bpf } for pid=3180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:29.797000 audit[3180]: AVC avc: denied { bpf } for pid=3180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:29.797000 audit: BPF prog-id=133 op=LOAD Oct 2 19:47:29.797000 audit[3180]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003f2ca8 items=0 ppid=3170 pid=3180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:29.797000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438613930313937623434353739303337666664376436646538613030 Oct 2 19:47:29.797000 audit: BPF prog-id=133 op=UNLOAD Oct 2 19:47:29.797000 audit: BPF prog-id=132 op=UNLOAD Oct 2 19:47:29.797000 audit[3180]: AVC avc: denied { bpf } for pid=3180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:29.797000 audit[3180]: AVC avc: denied { bpf } for pid=3180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:29.797000 audit[3180]: AVC avc: denied { bpf } for pid=3180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:29.797000 audit[3180]: AVC avc: denied { perfmon } for pid=3180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:29.797000 audit[3180]: AVC avc: denied { perfmon } for pid=3180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:29.797000 audit[3180]: AVC avc: denied { perfmon } for pid=3180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:29.797000 audit[3180]: AVC avc: denied { perfmon } for pid=3180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:29.797000 audit[3180]: AVC avc: denied { perfmon } for pid=3180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:29.797000 audit[3180]: AVC avc: denied { bpf } for pid=3180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:29.797000 audit[3180]: AVC avc: denied { bpf } for pid=3180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:29.797000 audit: BPF prog-id=134 op=LOAD Oct 2 19:47:29.797000 audit[3180]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003f30b8 items=0 ppid=3170 pid=3180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:29.797000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438613930313937623434353739303337666664376436646538613030 Oct 2 19:47:29.815108 env[1461]: time="2023-10-02T19:47:29.815079366Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-ppdj9,Uid:fb5c08c0-8f34-4462-8a6a-45ba9ceb2991,Namespace:calico-system,Attempt:0,} returns sandbox id \"f0d85139863ef2659ce71429c9934c08082c50b9a640e634c7a60ccd82b2def4\"" Oct 2 19:47:29.815321 env[1461]: time="2023-10-02T19:47:29.815305041Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-58fc58c8d9-w5p4c,Uid:15d7e2dc-c85c-4cd2-b036-911dfb9051d4,Namespace:calico-system,Attempt:0,} returns sandbox id \"48a90197b44579037ffd7d6de8a000af94fc99a32e874e2dbb2b2c347c9dbccb\"" Oct 2 19:47:29.815750 env[1461]: time="2023-10-02T19:47:29.815738683Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.25.0\"" Oct 2 19:47:33.412241 env[1461]: time="2023-10-02T19:47:33.412212097Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:47:33.412985 env[1461]: time="2023-10-02T19:47:33.412972475Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ed8b7bbb113fecfcce8e15c7d7232b3fe31ed6f37b04df455f6a3f2bc8695d72,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:47:33.414339 env[1461]: time="2023-10-02T19:47:33.414326417Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:47:33.415325 env[1461]: time="2023-10-02T19:47:33.415314150Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:182a323c25a3503be8c504892a12a55d99a42c3a582cb8e93a1ecc7c193a44c5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:47:33.415821 env[1461]: time="2023-10-02T19:47:33.415807295Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.25.0\" returns image reference \"sha256:ed8b7bbb113fecfcce8e15c7d7232b3fe31ed6f37b04df455f6a3f2bc8695d72\"" Oct 2 19:47:33.416164 env[1461]: time="2023-10-02T19:47:33.416154048Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.25.0\"" Oct 2 19:47:33.416826 env[1461]: time="2023-10-02T19:47:33.416810977Z" level=info msg="CreateContainer within sandbox \"f0d85139863ef2659ce71429c9934c08082c50b9a640e634c7a60ccd82b2def4\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Oct 2 19:47:33.421930 env[1461]: time="2023-10-02T19:47:33.421906503Z" level=info msg="CreateContainer within sandbox \"f0d85139863ef2659ce71429c9934c08082c50b9a640e634c7a60ccd82b2def4\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"a9a6be32476e797a97d169c84f98b1a7afa20bd1f4313c55b5d312e95507d4bc\"" Oct 2 19:47:33.422159 env[1461]: time="2023-10-02T19:47:33.422147330Z" level=info msg="StartContainer for \"a9a6be32476e797a97d169c84f98b1a7afa20bd1f4313c55b5d312e95507d4bc\"" Oct 2 19:47:33.443789 systemd[1]: Started cri-containerd-a9a6be32476e797a97d169c84f98b1a7afa20bd1f4313c55b5d312e95507d4bc.scope. Oct 2 19:47:33.449000 audit[3251]: AVC avc: denied { perfmon } for pid=3251 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:33.449000 audit[3251]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3194 pid=3251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:33.449000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139613662653332343736653739376139376431363963383466393862 Oct 2 19:47:33.449000 audit[3251]: AVC avc: denied { bpf } for pid=3251 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:33.449000 audit[3251]: AVC avc: denied { bpf } for pid=3251 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:33.449000 audit[3251]: AVC avc: denied { bpf } for pid=3251 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:33.449000 audit[3251]: AVC avc: denied { perfmon } for pid=3251 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:33.449000 audit[3251]: AVC avc: denied { perfmon } for pid=3251 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:33.449000 audit[3251]: AVC avc: denied { perfmon } for pid=3251 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:33.449000 audit[3251]: AVC avc: denied { perfmon } for pid=3251 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:33.449000 audit[3251]: AVC avc: denied { perfmon } for pid=3251 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:33.449000 audit[3251]: AVC avc: denied { bpf } for pid=3251 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:33.449000 audit[3251]: AVC avc: denied { bpf } for pid=3251 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:33.449000 audit: BPF prog-id=135 op=LOAD Oct 2 19:47:33.449000 audit[3251]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0000efc70 items=0 ppid=3194 pid=3251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:33.449000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139613662653332343736653739376139376431363963383466393862 Oct 2 19:47:33.450000 audit[3251]: AVC avc: denied { bpf } for pid=3251 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:33.450000 audit[3251]: AVC avc: denied { bpf } for pid=3251 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:33.450000 audit[3251]: AVC avc: denied { perfmon } for pid=3251 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:33.450000 audit[3251]: AVC avc: denied { perfmon } for pid=3251 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:33.450000 audit[3251]: AVC avc: denied { perfmon } for pid=3251 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:33.450000 audit[3251]: AVC avc: denied { perfmon } for pid=3251 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:33.450000 audit[3251]: AVC avc: denied { perfmon } for pid=3251 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:33.450000 audit[3251]: AVC avc: denied { bpf } for pid=3251 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:33.450000 audit[3251]: AVC avc: denied { bpf } for pid=3251 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:33.450000 audit: BPF prog-id=136 op=LOAD Oct 2 19:47:33.450000 audit[3251]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0000efcb8 items=0 ppid=3194 pid=3251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:33.450000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139613662653332343736653739376139376431363963383466393862 Oct 2 19:47:33.450000 audit: BPF prog-id=136 op=UNLOAD Oct 2 19:47:33.450000 audit: BPF prog-id=135 op=UNLOAD Oct 2 19:47:33.450000 audit[3251]: AVC avc: denied { bpf } for pid=3251 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:33.450000 audit[3251]: AVC avc: denied { bpf } for pid=3251 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:33.450000 audit[3251]: AVC avc: denied { bpf } for pid=3251 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:33.450000 audit[3251]: AVC avc: denied { perfmon } for pid=3251 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:33.450000 audit[3251]: AVC avc: denied { perfmon } for pid=3251 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:33.450000 audit[3251]: AVC avc: denied { perfmon } for pid=3251 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:33.450000 audit[3251]: AVC avc: denied { perfmon } for pid=3251 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:33.450000 audit[3251]: AVC avc: denied { perfmon } for pid=3251 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:33.450000 audit[3251]: AVC avc: denied { bpf } for pid=3251 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:33.450000 audit[3251]: AVC avc: denied { bpf } for pid=3251 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:33.450000 audit: BPF prog-id=137 op=LOAD Oct 2 19:47:33.450000 audit[3251]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0000efd48 items=0 ppid=3194 pid=3251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:33.450000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139613662653332343736653739376139376431363963383466393862 Oct 2 19:47:33.468615 env[1461]: time="2023-10-02T19:47:33.468557082Z" level=info msg="StartContainer for \"a9a6be32476e797a97d169c84f98b1a7afa20bd1f4313c55b5d312e95507d4bc\" returns successfully" Oct 2 19:47:33.473769 systemd[1]: cri-containerd-a9a6be32476e797a97d169c84f98b1a7afa20bd1f4313c55b5d312e95507d4bc.scope: Deactivated successfully. Oct 2 19:47:33.481000 audit: BPF prog-id=137 op=UNLOAD Oct 2 19:47:33.508275 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-a9a6be32476e797a97d169c84f98b1a7afa20bd1f4313c55b5d312e95507d4bc-rootfs.mount: Deactivated successfully. Oct 2 19:47:33.719865 systemd[1]: Started sshd@11-145.40.82.213:22-103.110.84.163:38440.service. Oct 2 19:47:33.719000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-145.40.82.213:22-103.110.84.163:38440 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:47:33.728439 env[1461]: time="2023-10-02T19:47:33.728295387Z" level=info msg="shim disconnected" id=a9a6be32476e797a97d169c84f98b1a7afa20bd1f4313c55b5d312e95507d4bc Oct 2 19:47:33.728796 env[1461]: time="2023-10-02T19:47:33.728436294Z" level=warning msg="cleaning up after shim disconnected" id=a9a6be32476e797a97d169c84f98b1a7afa20bd1f4313c55b5d312e95507d4bc namespace=k8s.io Oct 2 19:47:33.728796 env[1461]: time="2023-10-02T19:47:33.728468370Z" level=info msg="cleaning up dead shim" Oct 2 19:47:33.757733 env[1461]: time="2023-10-02T19:47:33.757651786Z" level=warning msg="cleanup warnings time=\"2023-10-02T19:47:33Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3295 runtime=io.containerd.runc.v2\n" Oct 2 19:47:34.786495 sshd[3294]: Invalid user uftp from 103.110.84.163 port 38440 Oct 2 19:47:34.792736 sshd[3294]: pam_faillock(sshd:auth): User unknown Oct 2 19:47:34.793726 sshd[3294]: pam_unix(sshd:auth): check pass; user unknown Oct 2 19:47:34.793815 sshd[3294]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.110.84.163 Oct 2 19:47:34.794783 sshd[3294]: pam_faillock(sshd:auth): User unknown Oct 2 19:47:34.794000 audit[3294]: USER_AUTH pid=3294 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="uftp" exe="/usr/sbin/sshd" hostname=103.110.84.163 addr=103.110.84.163 terminal=ssh res=failed' Oct 2 19:47:34.838154 kernel: kauditd_printk_skb: 161 callbacks suppressed Oct 2 19:47:34.838245 kernel: audit: type=1100 audit(1696276054.794:1131): pid=3294 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="uftp" exe="/usr/sbin/sshd" hostname=103.110.84.163 addr=103.110.84.163 terminal=ssh res=failed' Oct 2 19:47:34.946181 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2039064718.mount: Deactivated successfully. Oct 2 19:47:36.887861 env[1461]: time="2023-10-02T19:47:36.887836612Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:47:36.888536 env[1461]: time="2023-10-02T19:47:36.888523228Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7b60c7012b1c9f468779a685b9b50ddfd754f2d92ea6769a681942aafb2d113f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:47:36.889673 env[1461]: time="2023-10-02T19:47:36.889663500Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:47:36.890663 env[1461]: time="2023-10-02T19:47:36.890650134Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:7fb0e011ffae9f88333b7a7488dae37f1d534b46d2b11a0fe2b5d129df58789c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:47:36.891634 env[1461]: time="2023-10-02T19:47:36.891592084Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.25.0\" returns image reference \"sha256:7b60c7012b1c9f468779a685b9b50ddfd754f2d92ea6769a681942aafb2d113f\"" Oct 2 19:47:36.891953 env[1461]: time="2023-10-02T19:47:36.891940868Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.25.0\"" Oct 2 19:47:36.892774 env[1461]: time="2023-10-02T19:47:36.892711886Z" level=info msg="CreateContainer within sandbox \"48a90197b44579037ffd7d6de8a000af94fc99a32e874e2dbb2b2c347c9dbccb\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Oct 2 19:47:36.897074 env[1461]: time="2023-10-02T19:47:36.897030215Z" level=info msg="CreateContainer within sandbox \"48a90197b44579037ffd7d6de8a000af94fc99a32e874e2dbb2b2c347c9dbccb\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"7501f4f22b86ab905a04819ab706eeb4e3314fa05431c8cd7fb07e4789c41758\"" Oct 2 19:47:36.897255 env[1461]: time="2023-10-02T19:47:36.897241748Z" level=info msg="StartContainer for \"7501f4f22b86ab905a04819ab706eeb4e3314fa05431c8cd7fb07e4789c41758\"" Oct 2 19:47:36.917814 systemd[1]: Started cri-containerd-7501f4f22b86ab905a04819ab706eeb4e3314fa05431c8cd7fb07e4789c41758.scope. Oct 2 19:47:36.922000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:36.922000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:37.052564 kernel: audit: type=1400 audit(1696276056.922:1132): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:37.052602 kernel: audit: type=1400 audit(1696276056.922:1133): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:37.052622 kernel: audit: type=1400 audit(1696276056.922:1134): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:36.922000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:37.116055 kernel: audit: type=1400 audit(1696276056.922:1135): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:36.922000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:37.179885 kernel: audit: type=1400 audit(1696276056.922:1136): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:36.922000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:37.195373 sshd[3294]: Failed password for invalid user uftp from 103.110.84.163 port 38440 ssh2 Oct 2 19:47:36.922000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:37.307748 kernel: audit: type=1400 audit(1696276056.922:1137): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:37.307784 kernel: audit: type=1400 audit(1696276056.922:1138): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:36.922000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:37.371655 kernel: audit: type=1400 audit(1696276056.922:1139): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:36.922000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:36.922000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:37.499124 kernel: audit: type=1400 audit(1696276056.922:1140): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:37.051000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:37.051000 audit: BPF prog-id=138 op=LOAD Oct 2 19:47:37.051000 audit[3315]: AVC avc: denied { bpf } for pid=3315 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:37.051000 audit[3315]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3170 pid=3315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:37.051000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735303166346632326238366162393035613034383139616237303665 Oct 2 19:47:37.051000 audit[3315]: AVC avc: denied { perfmon } for pid=3315 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:37.051000 audit[3315]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3170 pid=3315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:37.051000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735303166346632326238366162393035613034383139616237303665 Oct 2 19:47:37.051000 audit[3315]: AVC avc: denied { bpf } for pid=3315 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:37.051000 audit[3315]: AVC avc: denied { bpf } for pid=3315 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:37.051000 audit[3315]: AVC avc: denied { bpf } for pid=3315 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:37.051000 audit[3315]: AVC avc: denied { perfmon } for pid=3315 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:37.051000 audit[3315]: AVC avc: denied { perfmon } for pid=3315 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:37.051000 audit[3315]: AVC avc: denied { perfmon } for pid=3315 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:37.051000 audit[3315]: AVC avc: denied { perfmon } for pid=3315 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:37.051000 audit[3315]: AVC avc: denied { perfmon } for pid=3315 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:37.051000 audit[3315]: AVC avc: denied { bpf } for pid=3315 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:37.051000 audit[3315]: AVC avc: denied { bpf } for pid=3315 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:37.051000 audit: BPF prog-id=139 op=LOAD Oct 2 19:47:37.051000 audit[3315]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001eb0f0 items=0 ppid=3170 pid=3315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:37.051000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735303166346632326238366162393035613034383139616237303665 Oct 2 19:47:37.242000 audit[3315]: AVC avc: denied { bpf } for pid=3315 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:37.242000 audit[3315]: AVC avc: denied { bpf } for pid=3315 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:37.242000 audit[3315]: AVC avc: denied { perfmon } for pid=3315 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:37.242000 audit[3315]: AVC avc: denied { perfmon } for pid=3315 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:37.242000 audit[3315]: AVC avc: denied { perfmon } for pid=3315 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:37.242000 audit[3315]: AVC avc: denied { perfmon } for pid=3315 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:37.242000 audit[3315]: AVC avc: denied { perfmon } for pid=3315 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:37.242000 audit[3315]: AVC avc: denied { bpf } for pid=3315 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:37.242000 audit[3315]: AVC avc: denied { bpf } for pid=3315 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:37.242000 audit: BPF prog-id=140 op=LOAD Oct 2 19:47:37.242000 audit[3315]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001eb138 items=0 ppid=3170 pid=3315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:37.242000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735303166346632326238366162393035613034383139616237303665 Oct 2 19:47:37.370000 audit: BPF prog-id=140 op=UNLOAD Oct 2 19:47:37.370000 audit: BPF prog-id=139 op=UNLOAD Oct 2 19:47:37.370000 audit[3315]: AVC avc: denied { bpf } for pid=3315 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:37.370000 audit[3315]: AVC avc: denied { bpf } for pid=3315 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:37.370000 audit[3315]: AVC avc: denied { bpf } for pid=3315 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:37.370000 audit[3315]: AVC avc: denied { perfmon } for pid=3315 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:37.370000 audit[3315]: AVC avc: denied { perfmon } for pid=3315 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:37.370000 audit[3315]: AVC avc: denied { perfmon } for pid=3315 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:37.370000 audit[3315]: AVC avc: denied { perfmon } for pid=3315 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:37.370000 audit[3315]: AVC avc: denied { perfmon } for pid=3315 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:37.370000 audit[3315]: AVC avc: denied { bpf } for pid=3315 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:37.370000 audit[3315]: AVC avc: denied { bpf } for pid=3315 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:37.370000 audit: BPF prog-id=141 op=LOAD Oct 2 19:47:37.370000 audit[3315]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001eb548 items=0 ppid=3170 pid=3315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:37.370000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735303166346632326238366162393035613034383139616237303665 Oct 2 19:47:37.516891 env[1461]: time="2023-10-02T19:47:37.516838715Z" level=info msg="StartContainer for \"7501f4f22b86ab905a04819ab706eeb4e3314fa05431c8cd7fb07e4789c41758\" returns successfully" Oct 2 19:47:37.557902 kubelet[2613]: I1002 19:47:37.557839 2613 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-typha-58fc58c8d9-w5p4c" podStartSLOduration=-9.223372028297016e+09 pod.CreationTimestamp="2023-10-02 19:47:29 +0000 UTC" firstStartedPulling="2023-10-02 19:47:29.815657518 +0000 UTC m=+21.417413542" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 19:47:37.556969839 +0000 UTC m=+29.158725939" watchObservedRunningTime="2023-10-02 19:47:37.557759048 +0000 UTC m=+29.159515114" Oct 2 19:47:38.413419 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2061958087.mount: Deactivated successfully. Oct 2 19:47:38.676000 audit[3382]: NETFILTER_CFG table=filter:107 family=2 entries=13 op=nft_register_rule pid=3382 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:47:38.676000 audit[3382]: SYSCALL arch=c000003e syscall=46 success=yes exit=4028 a0=3 a1=7fff4e024fc0 a2=0 a3=7fff4e024fac items=0 ppid=2915 pid=3382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:38.676000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:47:38.678000 audit[3382]: NETFILTER_CFG table=nat:108 family=2 entries=27 op=nft_register_chain pid=3382 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:47:38.678000 audit[3382]: SYSCALL arch=c000003e syscall=46 success=yes exit=8836 a0=3 a1=7fff4e024fc0 a2=0 a3=7fff4e024fac items=0 ppid=2915 pid=3382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:38.678000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:47:38.948343 sshd[3294]: Received disconnect from 103.110.84.163 port 38440:11: Bye Bye [preauth] Oct 2 19:47:38.948343 sshd[3294]: Disconnected from invalid user uftp 103.110.84.163 port 38440 [preauth] Oct 2 19:47:38.950805 systemd[1]: sshd@11-145.40.82.213:22-103.110.84.163:38440.service: Deactivated successfully. Oct 2 19:47:38.950000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-145.40.82.213:22-103.110.84.163:38440 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:47:42.085414 env[1461]: time="2023-10-02T19:47:42.085389791Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:47:42.085957 env[1461]: time="2023-10-02T19:47:42.085935203Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d70a5947d57e5ab3340d126a38e6ae51bd9e8e0b342daa2012e78d8868bed5b7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:47:42.087236 env[1461]: time="2023-10-02T19:47:42.087223505Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:47:42.088732 env[1461]: time="2023-10-02T19:47:42.088686921Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:34bf454be8cd5b9a35ab29c2479ff68a26497c2c87eb606e4bfe57c7fbeeff35,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:47:42.089570 env[1461]: time="2023-10-02T19:47:42.089525447Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.25.0\" returns image reference \"sha256:d70a5947d57e5ab3340d126a38e6ae51bd9e8e0b342daa2012e78d8868bed5b7\"" Oct 2 19:47:42.090636 env[1461]: time="2023-10-02T19:47:42.090577786Z" level=info msg="CreateContainer within sandbox \"f0d85139863ef2659ce71429c9934c08082c50b9a640e634c7a60ccd82b2def4\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Oct 2 19:47:42.095754 env[1461]: time="2023-10-02T19:47:42.095736321Z" level=info msg="CreateContainer within sandbox \"f0d85139863ef2659ce71429c9934c08082c50b9a640e634c7a60ccd82b2def4\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"89fda55ba176ac8847ef18e15fafd870c6235b1cfb9fe9addbb9520db900a02a\"" Oct 2 19:47:42.095997 env[1461]: time="2023-10-02T19:47:42.095984119Z" level=info msg="StartContainer for \"89fda55ba176ac8847ef18e15fafd870c6235b1cfb9fe9addbb9520db900a02a\"" Oct 2 19:47:42.123721 systemd[1]: Started cri-containerd-89fda55ba176ac8847ef18e15fafd870c6235b1cfb9fe9addbb9520db900a02a.scope. Oct 2 19:47:42.129000 audit[3392]: AVC avc: denied { perfmon } for pid=3392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:42.158487 kernel: kauditd_printk_skb: 55 callbacks suppressed Oct 2 19:47:42.158565 kernel: audit: type=1400 audit(1696276062.129:1153): avc: denied { perfmon } for pid=3392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:42.129000 audit[3392]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3194 pid=3392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:42.319669 kernel: audit: type=1300 audit(1696276062.129:1153): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3194 pid=3392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:42.319703 kernel: audit: type=1327 audit(1696276062.129:1153): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839666461353562613137366163383834376566313865313566616664 Oct 2 19:47:42.129000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839666461353562613137366163383834376566313865313566616664 Oct 2 19:47:42.413548 kernel: audit: type=1400 audit(1696276062.129:1154): avc: denied { bpf } for pid=3392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:42.129000 audit[3392]: AVC avc: denied { bpf } for pid=3392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:42.477478 kernel: audit: type=1400 audit(1696276062.129:1154): avc: denied { bpf } for pid=3392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:42.129000 audit[3392]: AVC avc: denied { bpf } for pid=3392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:42.541340 kernel: audit: type=1400 audit(1696276062.129:1154): avc: denied { bpf } for pid=3392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:42.129000 audit[3392]: AVC avc: denied { bpf } for pid=3392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:42.605293 kernel: audit: type=1400 audit(1696276062.129:1154): avc: denied { perfmon } for pid=3392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:42.129000 audit[3392]: AVC avc: denied { perfmon } for pid=3392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:42.624503 env[1461]: time="2023-10-02T19:47:42.624469595Z" level=info msg="StartContainer for \"89fda55ba176ac8847ef18e15fafd870c6235b1cfb9fe9addbb9520db900a02a\" returns successfully" Oct 2 19:47:42.669600 kernel: audit: type=1400 audit(1696276062.129:1154): avc: denied { perfmon } for pid=3392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:42.129000 audit[3392]: AVC avc: denied { perfmon } for pid=3392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:42.733994 kernel: audit: type=1400 audit(1696276062.129:1154): avc: denied { perfmon } for pid=3392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:42.129000 audit[3392]: AVC avc: denied { perfmon } for pid=3392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:42.798303 kernel: audit: type=1400 audit(1696276062.129:1154): avc: denied { perfmon } for pid=3392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:42.129000 audit[3392]: AVC avc: denied { perfmon } for pid=3392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:42.129000 audit[3392]: AVC avc: denied { perfmon } for pid=3392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:42.129000 audit[3392]: AVC avc: denied { bpf } for pid=3392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:42.129000 audit[3392]: AVC avc: denied { bpf } for pid=3392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:42.129000 audit: BPF prog-id=142 op=LOAD Oct 2 19:47:42.129000 audit[3392]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0002dfbe0 items=0 ppid=3194 pid=3392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:42.129000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839666461353562613137366163383834376566313865313566616664 Oct 2 19:47:42.221000 audit[3392]: AVC avc: denied { bpf } for pid=3392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:42.221000 audit[3392]: AVC avc: denied { bpf } for pid=3392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:42.221000 audit[3392]: AVC avc: denied { perfmon } for pid=3392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:42.221000 audit[3392]: AVC avc: denied { perfmon } for pid=3392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:42.221000 audit[3392]: AVC avc: denied { perfmon } for pid=3392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:42.221000 audit[3392]: AVC avc: denied { perfmon } for pid=3392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:42.221000 audit[3392]: AVC avc: denied { perfmon } for pid=3392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:42.221000 audit[3392]: AVC avc: denied { bpf } for pid=3392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:42.221000 audit[3392]: AVC avc: denied { bpf } for pid=3392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:42.221000 audit: BPF prog-id=143 op=LOAD Oct 2 19:47:42.221000 audit[3392]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0002dfc28 items=0 ppid=3194 pid=3392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:42.221000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839666461353562613137366163383834376566313865313566616664 Oct 2 19:47:42.412000 audit: BPF prog-id=143 op=UNLOAD Oct 2 19:47:42.412000 audit: BPF prog-id=142 op=UNLOAD Oct 2 19:47:42.412000 audit[3392]: AVC avc: denied { bpf } for pid=3392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:42.412000 audit[3392]: AVC avc: denied { bpf } for pid=3392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:42.412000 audit[3392]: AVC avc: denied { bpf } for pid=3392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:42.412000 audit[3392]: AVC avc: denied { perfmon } for pid=3392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:42.412000 audit[3392]: AVC avc: denied { perfmon } for pid=3392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:42.412000 audit[3392]: AVC avc: denied { perfmon } for pid=3392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:42.412000 audit[3392]: AVC avc: denied { perfmon } for pid=3392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:42.412000 audit[3392]: AVC avc: denied { perfmon } for pid=3392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:42.412000 audit[3392]: AVC avc: denied { bpf } for pid=3392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:42.412000 audit[3392]: AVC avc: denied { bpf } for pid=3392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:42.412000 audit: BPF prog-id=144 op=LOAD Oct 2 19:47:42.412000 audit[3392]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0002dfcb8 items=0 ppid=3194 pid=3392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:42.412000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839666461353562613137366163383834376566313865313566616664 Oct 2 19:47:43.246350 systemd[1]: cri-containerd-89fda55ba176ac8847ef18e15fafd870c6235b1cfb9fe9addbb9520db900a02a.scope: Deactivated successfully. Oct 2 19:47:43.257946 kubelet[2613]: I1002 19:47:43.257906 2613 kubelet_node_status.go:493] "Fast updating node status as it just became ready" Oct 2 19:47:43.262000 audit: BPF prog-id=144 op=UNLOAD Oct 2 19:47:43.268870 kubelet[2613]: I1002 19:47:43.268850 2613 topology_manager.go:210] "Topology Admit Handler" Oct 2 19:47:43.271349 kubelet[2613]: I1002 19:47:43.270457 2613 topology_manager.go:210] "Topology Admit Handler" Oct 2 19:47:43.271349 kubelet[2613]: I1002 19:47:43.270581 2613 topology_manager.go:210] "Topology Admit Handler" Oct 2 19:47:43.272860 systemd[1]: Created slice kubepods-burstable-pod365d9e2c_338a_4964_844b_392b2e4962e8.slice. Oct 2 19:47:43.274216 kubelet[2613]: I1002 19:47:43.274198 2613 topology_manager.go:210] "Topology Admit Handler" Oct 2 19:47:43.276281 systemd[1]: Created slice kubepods-burstable-pod4fcca1ab_8a1f_4075_a69b_cda7fd2d32ee.slice. Oct 2 19:47:43.279041 systemd[1]: Created slice kubepods-besteffort-pod2a804127_9341_491a_b87d_9b61243b002d.slice. Oct 2 19:47:43.281828 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-89fda55ba176ac8847ef18e15fafd870c6235b1cfb9fe9addbb9520db900a02a-rootfs.mount: Deactivated successfully. Oct 2 19:47:43.283549 systemd[1]: Created slice kubepods-besteffort-podebb11106_5253_488c_9095_50c2b68f321c.slice. Oct 2 19:47:43.339758 kubelet[2613]: I1002 19:47:43.339700 2613 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/ebb11106-5253-488c-9095-50c2b68f321c-registration-dir\") pod \"csi-node-driver-l8hvh\" (UID: \"ebb11106-5253-488c-9095-50c2b68f321c\") " pod="calico-system/csi-node-driver-l8hvh" Oct 2 19:47:43.340112 kubelet[2613]: I1002 19:47:43.339800 2613 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/4fcca1ab-8a1f-4075-a69b-cda7fd2d32ee-config-volume\") pod \"coredns-787d4945fb-brbpj\" (UID: \"4fcca1ab-8a1f-4075-a69b-cda7fd2d32ee\") " pod="kube-system/coredns-787d4945fb-brbpj" Oct 2 19:47:43.340112 kubelet[2613]: I1002 19:47:43.339997 2613 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/ebb11106-5253-488c-9095-50c2b68f321c-socket-dir\") pod \"csi-node-driver-l8hvh\" (UID: \"ebb11106-5253-488c-9095-50c2b68f321c\") " pod="calico-system/csi-node-driver-l8hvh" Oct 2 19:47:43.340359 kubelet[2613]: I1002 19:47:43.340138 2613 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-6t5tj\" (UniqueName: \"kubernetes.io/projected/2a804127-9341-491a-b87d-9b61243b002d-kube-api-access-6t5tj\") pod \"calico-kube-controllers-69c848ddc6-qqrrz\" (UID: \"2a804127-9341-491a-b87d-9b61243b002d\") " pod="calico-system/calico-kube-controllers-69c848ddc6-qqrrz" Oct 2 19:47:43.340494 kubelet[2613]: I1002 19:47:43.340362 2613 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/ebb11106-5253-488c-9095-50c2b68f321c-varrun\") pod \"csi-node-driver-l8hvh\" (UID: \"ebb11106-5253-488c-9095-50c2b68f321c\") " pod="calico-system/csi-node-driver-l8hvh" Oct 2 19:47:43.340604 kubelet[2613]: I1002 19:47:43.340547 2613 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/365d9e2c-338a-4964-844b-392b2e4962e8-config-volume\") pod \"coredns-787d4945fb-p6twp\" (UID: \"365d9e2c-338a-4964-844b-392b2e4962e8\") " pod="kube-system/coredns-787d4945fb-p6twp" Oct 2 19:47:43.340705 kubelet[2613]: I1002 19:47:43.340638 2613 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"etccalico\" (UniqueName: \"kubernetes.io/host-path/ebb11106-5253-488c-9095-50c2b68f321c-etccalico\") pod \"csi-node-driver-l8hvh\" (UID: \"ebb11106-5253-488c-9095-50c2b68f321c\") " pod="calico-system/csi-node-driver-l8hvh" Oct 2 19:47:43.340813 kubelet[2613]: I1002 19:47:43.340718 2613 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/ebb11106-5253-488c-9095-50c2b68f321c-kubelet-dir\") pod \"csi-node-driver-l8hvh\" (UID: \"ebb11106-5253-488c-9095-50c2b68f321c\") " pod="calico-system/csi-node-driver-l8hvh" Oct 2 19:47:43.340925 kubelet[2613]: I1002 19:47:43.340815 2613 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-d9v5h\" (UniqueName: \"kubernetes.io/projected/ebb11106-5253-488c-9095-50c2b68f321c-kube-api-access-d9v5h\") pod \"csi-node-driver-l8hvh\" (UID: \"ebb11106-5253-488c-9095-50c2b68f321c\") " pod="calico-system/csi-node-driver-l8hvh" Oct 2 19:47:43.340925 kubelet[2613]: I1002 19:47:43.340878 2613 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-gw8dw\" (UniqueName: \"kubernetes.io/projected/365d9e2c-338a-4964-844b-392b2e4962e8-kube-api-access-gw8dw\") pod \"coredns-787d4945fb-p6twp\" (UID: \"365d9e2c-338a-4964-844b-392b2e4962e8\") " pod="kube-system/coredns-787d4945fb-p6twp" Oct 2 19:47:43.341119 kubelet[2613]: I1002 19:47:43.340966 2613 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-nqpg6\" (UniqueName: \"kubernetes.io/projected/4fcca1ab-8a1f-4075-a69b-cda7fd2d32ee-kube-api-access-nqpg6\") pod \"coredns-787d4945fb-brbpj\" (UID: \"4fcca1ab-8a1f-4075-a69b-cda7fd2d32ee\") " pod="kube-system/coredns-787d4945fb-brbpj" Oct 2 19:47:43.575696 env[1461]: time="2023-10-02T19:47:43.575568641Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-p6twp,Uid:365d9e2c-338a-4964-844b-392b2e4962e8,Namespace:kube-system,Attempt:0,}" Oct 2 19:47:43.578796 env[1461]: time="2023-10-02T19:47:43.578675889Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-brbpj,Uid:4fcca1ab-8a1f-4075-a69b-cda7fd2d32ee,Namespace:kube-system,Attempt:0,}" Oct 2 19:47:43.881575 env[1461]: time="2023-10-02T19:47:43.881473080Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-69c848ddc6-qqrrz,Uid:2a804127-9341-491a-b87d-9b61243b002d,Namespace:calico-system,Attempt:0,}" Oct 2 19:47:43.883618 env[1461]: time="2023-10-02T19:47:43.883556654Z" level=info msg="shim disconnected" id=89fda55ba176ac8847ef18e15fafd870c6235b1cfb9fe9addbb9520db900a02a Oct 2 19:47:43.883618 env[1461]: time="2023-10-02T19:47:43.883587278Z" level=warning msg="cleaning up after shim disconnected" id=89fda55ba176ac8847ef18e15fafd870c6235b1cfb9fe9addbb9520db900a02a namespace=k8s.io Oct 2 19:47:43.883618 env[1461]: time="2023-10-02T19:47:43.883594676Z" level=info msg="cleaning up dead shim" Oct 2 19:47:43.885883 env[1461]: time="2023-10-02T19:47:43.885841052Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-l8hvh,Uid:ebb11106-5253-488c-9095-50c2b68f321c,Namespace:calico-system,Attempt:0,}" Oct 2 19:47:43.926878 env[1461]: time="2023-10-02T19:47:43.926752353Z" level=warning msg="cleanup warnings time=\"2023-10-02T19:47:43Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3467 runtime=io.containerd.runc.v2\n" Oct 2 19:47:43.957634 env[1461]: time="2023-10-02T19:47:43.957554464Z" level=error msg="Failed to destroy network for sandbox \"2e2b96de98c691eab85ee19efbb41e4a4ad79a1423450e5ecb9533377027fe73\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:47:43.957835 env[1461]: time="2023-10-02T19:47:43.957789989Z" level=error msg="encountered an error cleaning up failed sandbox \"2e2b96de98c691eab85ee19efbb41e4a4ad79a1423450e5ecb9533377027fe73\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:47:43.957872 env[1461]: time="2023-10-02T19:47:43.957826539Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-p6twp,Uid:365d9e2c-338a-4964-844b-392b2e4962e8,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"2e2b96de98c691eab85ee19efbb41e4a4ad79a1423450e5ecb9533377027fe73\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:47:43.958080 kubelet[2613]: E1002 19:47:43.958058 2613 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2e2b96de98c691eab85ee19efbb41e4a4ad79a1423450e5ecb9533377027fe73\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:47:43.958289 kubelet[2613]: E1002 19:47:43.958149 2613 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2e2b96de98c691eab85ee19efbb41e4a4ad79a1423450e5ecb9533377027fe73\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-787d4945fb-p6twp" Oct 2 19:47:43.958289 kubelet[2613]: E1002 19:47:43.958177 2613 kuberuntime_manager.go:782] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2e2b96de98c691eab85ee19efbb41e4a4ad79a1423450e5ecb9533377027fe73\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-787d4945fb-p6twp" Oct 2 19:47:43.958289 kubelet[2613]: E1002 19:47:43.958235 2613 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-787d4945fb-p6twp_kube-system(365d9e2c-338a-4964-844b-392b2e4962e8)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-787d4945fb-p6twp_kube-system(365d9e2c-338a-4964-844b-392b2e4962e8)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"2e2b96de98c691eab85ee19efbb41e4a4ad79a1423450e5ecb9533377027fe73\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-787d4945fb-p6twp" podUID=365d9e2c-338a-4964-844b-392b2e4962e8 Oct 2 19:47:43.958744 env[1461]: time="2023-10-02T19:47:43.958716303Z" level=error msg="Failed to destroy network for sandbox \"23c9ad6741a3f90dd9df1224eb0be613f01cbaa595626a8135295aed6514d075\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:47:43.958929 env[1461]: time="2023-10-02T19:47:43.958909692Z" level=error msg="encountered an error cleaning up failed sandbox \"23c9ad6741a3f90dd9df1224eb0be613f01cbaa595626a8135295aed6514d075\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:47:43.958986 env[1461]: time="2023-10-02T19:47:43.958947096Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-brbpj,Uid:4fcca1ab-8a1f-4075-a69b-cda7fd2d32ee,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"23c9ad6741a3f90dd9df1224eb0be613f01cbaa595626a8135295aed6514d075\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:47:43.959078 kubelet[2613]: E1002 19:47:43.959069 2613 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"23c9ad6741a3f90dd9df1224eb0be613f01cbaa595626a8135295aed6514d075\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:47:43.959114 kubelet[2613]: E1002 19:47:43.959105 2613 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"23c9ad6741a3f90dd9df1224eb0be613f01cbaa595626a8135295aed6514d075\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-787d4945fb-brbpj" Oct 2 19:47:43.959143 kubelet[2613]: E1002 19:47:43.959129 2613 kuberuntime_manager.go:782] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"23c9ad6741a3f90dd9df1224eb0be613f01cbaa595626a8135295aed6514d075\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-787d4945fb-brbpj" Oct 2 19:47:43.959181 kubelet[2613]: E1002 19:47:43.959175 2613 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-787d4945fb-brbpj_kube-system(4fcca1ab-8a1f-4075-a69b-cda7fd2d32ee)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-787d4945fb-brbpj_kube-system(4fcca1ab-8a1f-4075-a69b-cda7fd2d32ee)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"23c9ad6741a3f90dd9df1224eb0be613f01cbaa595626a8135295aed6514d075\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-787d4945fb-brbpj" podUID=4fcca1ab-8a1f-4075-a69b-cda7fd2d32ee Oct 2 19:47:43.960836 env[1461]: time="2023-10-02T19:47:43.960808690Z" level=error msg="Failed to destroy network for sandbox \"17978490ffd842e930d9cb79632bd4dafc2ceae4ff1967f9eee156df238b4c31\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:47:43.961007 env[1461]: time="2023-10-02T19:47:43.960990018Z" level=error msg="encountered an error cleaning up failed sandbox \"17978490ffd842e930d9cb79632bd4dafc2ceae4ff1967f9eee156df238b4c31\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:47:43.961044 env[1461]: time="2023-10-02T19:47:43.961018064Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-69c848ddc6-qqrrz,Uid:2a804127-9341-491a-b87d-9b61243b002d,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"17978490ffd842e930d9cb79632bd4dafc2ceae4ff1967f9eee156df238b4c31\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:47:43.961137 kubelet[2613]: E1002 19:47:43.961127 2613 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"17978490ffd842e930d9cb79632bd4dafc2ceae4ff1967f9eee156df238b4c31\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:47:43.961171 kubelet[2613]: E1002 19:47:43.961154 2613 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"17978490ffd842e930d9cb79632bd4dafc2ceae4ff1967f9eee156df238b4c31\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-69c848ddc6-qqrrz" Oct 2 19:47:43.961171 kubelet[2613]: E1002 19:47:43.961169 2613 kuberuntime_manager.go:782] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"17978490ffd842e930d9cb79632bd4dafc2ceae4ff1967f9eee156df238b4c31\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-69c848ddc6-qqrrz" Oct 2 19:47:43.961232 kubelet[2613]: E1002 19:47:43.961198 2613 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-69c848ddc6-qqrrz_calico-system(2a804127-9341-491a-b87d-9b61243b002d)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-69c848ddc6-qqrrz_calico-system(2a804127-9341-491a-b87d-9b61243b002d)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"17978490ffd842e930d9cb79632bd4dafc2ceae4ff1967f9eee156df238b4c31\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-69c848ddc6-qqrrz" podUID=2a804127-9341-491a-b87d-9b61243b002d Oct 2 19:47:43.961281 env[1461]: time="2023-10-02T19:47:43.961251842Z" level=error msg="Failed to destroy network for sandbox \"17af3cbd1e5b27bb5fdb71e30df45dad7ac77e0941aaccf368f37f8a2c9ef875\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:47:43.961500 env[1461]: time="2023-10-02T19:47:43.961476098Z" level=error msg="encountered an error cleaning up failed sandbox \"17af3cbd1e5b27bb5fdb71e30df45dad7ac77e0941aaccf368f37f8a2c9ef875\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:47:43.961538 env[1461]: time="2023-10-02T19:47:43.961513089Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-l8hvh,Uid:ebb11106-5253-488c-9095-50c2b68f321c,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"17af3cbd1e5b27bb5fdb71e30df45dad7ac77e0941aaccf368f37f8a2c9ef875\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:47:43.961648 kubelet[2613]: E1002 19:47:43.961639 2613 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"17af3cbd1e5b27bb5fdb71e30df45dad7ac77e0941aaccf368f37f8a2c9ef875\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:47:43.961684 kubelet[2613]: E1002 19:47:43.961663 2613 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"17af3cbd1e5b27bb5fdb71e30df45dad7ac77e0941aaccf368f37f8a2c9ef875\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-l8hvh" Oct 2 19:47:43.961684 kubelet[2613]: E1002 19:47:43.961678 2613 kuberuntime_manager.go:782] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"17af3cbd1e5b27bb5fdb71e30df45dad7ac77e0941aaccf368f37f8a2c9ef875\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-l8hvh" Oct 2 19:47:43.961736 kubelet[2613]: E1002 19:47:43.961704 2613 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-l8hvh_calico-system(ebb11106-5253-488c-9095-50c2b68f321c)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-l8hvh_calico-system(ebb11106-5253-488c-9095-50c2b68f321c)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"17af3cbd1e5b27bb5fdb71e30df45dad7ac77e0941aaccf368f37f8a2c9ef875\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-l8hvh" podUID=ebb11106-5253-488c-9095-50c2b68f321c Oct 2 19:47:44.282654 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-2e2b96de98c691eab85ee19efbb41e4a4ad79a1423450e5ecb9533377027fe73-shm.mount: Deactivated successfully. Oct 2 19:47:44.576435 kubelet[2613]: I1002 19:47:44.576252 2613 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="17af3cbd1e5b27bb5fdb71e30df45dad7ac77e0941aaccf368f37f8a2c9ef875" Oct 2 19:47:44.577218 env[1461]: time="2023-10-02T19:47:44.576225010Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.25.0\"" Oct 2 19:47:44.577820 env[1461]: time="2023-10-02T19:47:44.577630826Z" level=info msg="StopPodSandbox for \"17af3cbd1e5b27bb5fdb71e30df45dad7ac77e0941aaccf368f37f8a2c9ef875\"" Oct 2 19:47:44.578528 kubelet[2613]: I1002 19:47:44.578448 2613 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="17978490ffd842e930d9cb79632bd4dafc2ceae4ff1967f9eee156df238b4c31" Oct 2 19:47:44.579807 env[1461]: time="2023-10-02T19:47:44.579695753Z" level=info msg="StopPodSandbox for \"17978490ffd842e930d9cb79632bd4dafc2ceae4ff1967f9eee156df238b4c31\"" Oct 2 19:47:44.580732 kubelet[2613]: I1002 19:47:44.580681 2613 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="2e2b96de98c691eab85ee19efbb41e4a4ad79a1423450e5ecb9533377027fe73" Oct 2 19:47:44.581906 env[1461]: time="2023-10-02T19:47:44.581841078Z" level=info msg="StopPodSandbox for \"2e2b96de98c691eab85ee19efbb41e4a4ad79a1423450e5ecb9533377027fe73\"" Oct 2 19:47:44.583077 kubelet[2613]: I1002 19:47:44.583000 2613 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="23c9ad6741a3f90dd9df1224eb0be613f01cbaa595626a8135295aed6514d075" Oct 2 19:47:44.584151 env[1461]: time="2023-10-02T19:47:44.584067101Z" level=info msg="StopPodSandbox for \"23c9ad6741a3f90dd9df1224eb0be613f01cbaa595626a8135295aed6514d075\"" Oct 2 19:47:44.630448 env[1461]: time="2023-10-02T19:47:44.630370552Z" level=error msg="StopPodSandbox for \"2e2b96de98c691eab85ee19efbb41e4a4ad79a1423450e5ecb9533377027fe73\" failed" error="failed to destroy network for sandbox \"2e2b96de98c691eab85ee19efbb41e4a4ad79a1423450e5ecb9533377027fe73\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:47:44.630589 env[1461]: time="2023-10-02T19:47:44.630544260Z" level=error msg="StopPodSandbox for \"23c9ad6741a3f90dd9df1224eb0be613f01cbaa595626a8135295aed6514d075\" failed" error="failed to destroy network for sandbox \"23c9ad6741a3f90dd9df1224eb0be613f01cbaa595626a8135295aed6514d075\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:47:44.630640 kubelet[2613]: E1002 19:47:44.630608 2613 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"2e2b96de98c691eab85ee19efbb41e4a4ad79a1423450e5ecb9533377027fe73\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="2e2b96de98c691eab85ee19efbb41e4a4ad79a1423450e5ecb9533377027fe73" Oct 2 19:47:44.630696 kubelet[2613]: E1002 19:47:44.630669 2613 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"23c9ad6741a3f90dd9df1224eb0be613f01cbaa595626a8135295aed6514d075\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="23c9ad6741a3f90dd9df1224eb0be613f01cbaa595626a8135295aed6514d075" Oct 2 19:47:44.630696 kubelet[2613]: E1002 19:47:44.630673 2613 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:2e2b96de98c691eab85ee19efbb41e4a4ad79a1423450e5ecb9533377027fe73} Oct 2 19:47:44.630696 kubelet[2613]: E1002 19:47:44.630694 2613 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:23c9ad6741a3f90dd9df1224eb0be613f01cbaa595626a8135295aed6514d075} Oct 2 19:47:44.630823 kubelet[2613]: E1002 19:47:44.630732 2613 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"4fcca1ab-8a1f-4075-a69b-cda7fd2d32ee\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"23c9ad6741a3f90dd9df1224eb0be613f01cbaa595626a8135295aed6514d075\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 2 19:47:44.630823 kubelet[2613]: E1002 19:47:44.630738 2613 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"365d9e2c-338a-4964-844b-392b2e4962e8\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"2e2b96de98c691eab85ee19efbb41e4a4ad79a1423450e5ecb9533377027fe73\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 2 19:47:44.630823 kubelet[2613]: E1002 19:47:44.630766 2613 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"4fcca1ab-8a1f-4075-a69b-cda7fd2d32ee\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"23c9ad6741a3f90dd9df1224eb0be613f01cbaa595626a8135295aed6514d075\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-787d4945fb-brbpj" podUID=4fcca1ab-8a1f-4075-a69b-cda7fd2d32ee Oct 2 19:47:44.631027 kubelet[2613]: E1002 19:47:44.630782 2613 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"365d9e2c-338a-4964-844b-392b2e4962e8\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"2e2b96de98c691eab85ee19efbb41e4a4ad79a1423450e5ecb9533377027fe73\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-787d4945fb-p6twp" podUID=365d9e2c-338a-4964-844b-392b2e4962e8 Oct 2 19:47:44.631113 env[1461]: time="2023-10-02T19:47:44.630979189Z" level=error msg="StopPodSandbox for \"17af3cbd1e5b27bb5fdb71e30df45dad7ac77e0941aaccf368f37f8a2c9ef875\" failed" error="failed to destroy network for sandbox \"17af3cbd1e5b27bb5fdb71e30df45dad7ac77e0941aaccf368f37f8a2c9ef875\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:47:44.631169 kubelet[2613]: E1002 19:47:44.631159 2613 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"17af3cbd1e5b27bb5fdb71e30df45dad7ac77e0941aaccf368f37f8a2c9ef875\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="17af3cbd1e5b27bb5fdb71e30df45dad7ac77e0941aaccf368f37f8a2c9ef875" Oct 2 19:47:44.631212 kubelet[2613]: E1002 19:47:44.631182 2613 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:17af3cbd1e5b27bb5fdb71e30df45dad7ac77e0941aaccf368f37f8a2c9ef875} Oct 2 19:47:44.631252 kubelet[2613]: E1002 19:47:44.631233 2613 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"ebb11106-5253-488c-9095-50c2b68f321c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"17af3cbd1e5b27bb5fdb71e30df45dad7ac77e0941aaccf368f37f8a2c9ef875\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 2 19:47:44.631320 kubelet[2613]: E1002 19:47:44.631273 2613 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"ebb11106-5253-488c-9095-50c2b68f321c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"17af3cbd1e5b27bb5fdb71e30df45dad7ac77e0941aaccf368f37f8a2c9ef875\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-l8hvh" podUID=ebb11106-5253-488c-9095-50c2b68f321c Oct 2 19:47:44.631529 env[1461]: time="2023-10-02T19:47:44.631469309Z" level=error msg="StopPodSandbox for \"17978490ffd842e930d9cb79632bd4dafc2ceae4ff1967f9eee156df238b4c31\" failed" error="failed to destroy network for sandbox \"17978490ffd842e930d9cb79632bd4dafc2ceae4ff1967f9eee156df238b4c31\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 19:47:44.631631 kubelet[2613]: E1002 19:47:44.631617 2613 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"17978490ffd842e930d9cb79632bd4dafc2ceae4ff1967f9eee156df238b4c31\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="17978490ffd842e930d9cb79632bd4dafc2ceae4ff1967f9eee156df238b4c31" Oct 2 19:47:44.631692 kubelet[2613]: E1002 19:47:44.631640 2613 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:17978490ffd842e930d9cb79632bd4dafc2ceae4ff1967f9eee156df238b4c31} Oct 2 19:47:44.631692 kubelet[2613]: E1002 19:47:44.631691 2613 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"2a804127-9341-491a-b87d-9b61243b002d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"17978490ffd842e930d9cb79632bd4dafc2ceae4ff1967f9eee156df238b4c31\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 2 19:47:44.631797 kubelet[2613]: E1002 19:47:44.631733 2613 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"2a804127-9341-491a-b87d-9b61243b002d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"17978490ffd842e930d9cb79632bd4dafc2ceae4ff1967f9eee156df238b4c31\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-69c848ddc6-qqrrz" podUID=2a804127-9341-491a-b87d-9b61243b002d Oct 2 19:47:49.311622 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2066620866.mount: Deactivated successfully. Oct 2 19:47:49.334622 env[1461]: time="2023-10-02T19:47:49.334568140Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:47:49.335408 env[1461]: time="2023-10-02T19:47:49.335386238Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:08616d26b8e74867402274687491e5978ba4a6ded94e9f5ecc3e364024e5683e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:47:49.336796 env[1461]: time="2023-10-02T19:47:49.336754131Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:47:49.337206 env[1461]: time="2023-10-02T19:47:49.337192742Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:e898f4b7b55c908c88dad008ae939024e71ed93c5effbb10cca891b658b2f001,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:47:49.337557 env[1461]: time="2023-10-02T19:47:49.337543486Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.25.0\" returns image reference \"sha256:08616d26b8e74867402274687491e5978ba4a6ded94e9f5ecc3e364024e5683e\"" Oct 2 19:47:49.338699 env[1461]: time="2023-10-02T19:47:49.338666753Z" level=info msg="CreateContainer within sandbox \"f0d85139863ef2659ce71429c9934c08082c50b9a640e634c7a60ccd82b2def4\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Oct 2 19:47:49.344045 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2927532598.mount: Deactivated successfully. Oct 2 19:47:49.344132 env[1461]: time="2023-10-02T19:47:49.344088654Z" level=info msg="CreateContainer within sandbox \"f0d85139863ef2659ce71429c9934c08082c50b9a640e634c7a60ccd82b2def4\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"e5fccf0b23ac5d8cb60611b4f83082b798a2c9de35c21e8e83bd2f7b598710a5\"" Oct 2 19:47:49.344368 env[1461]: time="2023-10-02T19:47:49.344313475Z" level=info msg="StartContainer for \"e5fccf0b23ac5d8cb60611b4f83082b798a2c9de35c21e8e83bd2f7b598710a5\"" Oct 2 19:47:49.366161 systemd[1]: Started cri-containerd-e5fccf0b23ac5d8cb60611b4f83082b798a2c9de35c21e8e83bd2f7b598710a5.scope. Oct 2 19:47:49.372000 audit[3809]: AVC avc: denied { perfmon } for pid=3809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:49.400612 kernel: kauditd_printk_skb: 34 callbacks suppressed Oct 2 19:47:49.400653 kernel: audit: type=1400 audit(1696276069.372:1160): avc: denied { perfmon } for pid=3809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:49.372000 audit[3809]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=3194 pid=3809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:49.465352 kernel: audit: type=1300 audit(1696276069.372:1160): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=3194 pid=3809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:49.372000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535666363663062323361633564386362363036313162346638333038 Oct 2 19:47:49.659573 kernel: audit: type=1327 audit(1696276069.372:1160): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535666363663062323361633564386362363036313162346638333038 Oct 2 19:47:49.659642 kernel: audit: type=1400 audit(1696276069.372:1161): avc: denied { bpf } for pid=3809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:49.372000 audit[3809]: AVC avc: denied { bpf } for pid=3809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:49.723569 kernel: audit: type=1400 audit(1696276069.372:1161): avc: denied { bpf } for pid=3809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:49.372000 audit[3809]: AVC avc: denied { bpf } for pid=3809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:49.787518 kernel: audit: type=1400 audit(1696276069.372:1161): avc: denied { bpf } for pid=3809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:49.372000 audit[3809]: AVC avc: denied { bpf } for pid=3809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:49.372000 audit[3809]: AVC avc: denied { perfmon } for pid=3809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:49.915715 kernel: audit: type=1400 audit(1696276069.372:1161): avc: denied { perfmon } for pid=3809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:49.915750 kernel: audit: type=1400 audit(1696276069.372:1161): avc: denied { perfmon } for pid=3809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:49.372000 audit[3809]: AVC avc: denied { perfmon } for pid=3809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:49.933530 env[1461]: time="2023-10-02T19:47:49.933506201Z" level=info msg="StartContainer for \"e5fccf0b23ac5d8cb60611b4f83082b798a2c9de35c21e8e83bd2f7b598710a5\" returns successfully" Oct 2 19:47:49.980045 kernel: audit: type=1400 audit(1696276069.372:1161): avc: denied { perfmon } for pid=3809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:49.372000 audit[3809]: AVC avc: denied { perfmon } for pid=3809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:49.372000 audit[3809]: AVC avc: denied { perfmon } for pid=3809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:50.108777 kernel: audit: type=1400 audit(1696276069.372:1161): avc: denied { perfmon } for pid=3809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:49.372000 audit[3809]: AVC avc: denied { perfmon } for pid=3809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:49.372000 audit[3809]: AVC avc: denied { bpf } for pid=3809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:49.372000 audit[3809]: AVC avc: denied { bpf } for pid=3809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:49.372000 audit: BPF prog-id=145 op=LOAD Oct 2 19:47:49.372000 audit[3809]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001479d8 a2=78 a3=c0002f7c70 items=0 ppid=3194 pid=3809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:49.372000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535666363663062323361633564386362363036313162346638333038 Oct 2 19:47:49.562000 audit[3809]: AVC avc: denied { bpf } for pid=3809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:49.562000 audit[3809]: AVC avc: denied { bpf } for pid=3809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:49.562000 audit[3809]: AVC avc: denied { perfmon } for pid=3809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:49.562000 audit[3809]: AVC avc: denied { perfmon } for pid=3809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:49.562000 audit[3809]: AVC avc: denied { perfmon } for pid=3809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:49.562000 audit[3809]: AVC avc: denied { perfmon } for pid=3809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:49.562000 audit[3809]: AVC avc: denied { perfmon } for pid=3809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:49.562000 audit[3809]: AVC avc: denied { bpf } for pid=3809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:49.562000 audit[3809]: AVC avc: denied { bpf } for pid=3809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:49.562000 audit: BPF prog-id=146 op=LOAD Oct 2 19:47:49.562000 audit[3809]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000147770 a2=78 a3=c0002f7cb8 items=0 ppid=3194 pid=3809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:49.562000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535666363663062323361633564386362363036313162346638333038 Oct 2 19:47:49.722000 audit: BPF prog-id=146 op=UNLOAD Oct 2 19:47:49.722000 audit: BPF prog-id=145 op=UNLOAD Oct 2 19:47:49.722000 audit[3809]: AVC avc: denied { bpf } for pid=3809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:49.722000 audit[3809]: AVC avc: denied { bpf } for pid=3809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:49.722000 audit[3809]: AVC avc: denied { bpf } for pid=3809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:49.722000 audit[3809]: AVC avc: denied { perfmon } for pid=3809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:49.722000 audit[3809]: AVC avc: denied { perfmon } for pid=3809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:49.722000 audit[3809]: AVC avc: denied { perfmon } for pid=3809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:49.722000 audit[3809]: AVC avc: denied { perfmon } for pid=3809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:49.722000 audit[3809]: AVC avc: denied { perfmon } for pid=3809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:49.722000 audit[3809]: AVC avc: denied { bpf } for pid=3809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:49.722000 audit[3809]: AVC avc: denied { bpf } for pid=3809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:49.722000 audit: BPF prog-id=147 op=LOAD Oct 2 19:47:49.722000 audit[3809]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000147c30 a2=78 a3=c0002f7d48 items=0 ppid=3194 pid=3809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:49.722000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535666363663062323361633564386362363036313162346638333038 Oct 2 19:47:50.194126 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Oct 2 19:47:50.194163 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Oct 2 19:47:50.631686 kubelet[2613]: I1002 19:47:50.631623 2613 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-ppdj9" podStartSLOduration=-9.223372015223234e+09 pod.CreationTimestamp="2023-10-02 19:47:29 +0000 UTC" firstStartedPulling="2023-10-02 19:47:29.815609153 +0000 UTC m=+21.417365173" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 19:47:50.63054447 +0000 UTC m=+42.232300579" watchObservedRunningTime="2023-10-02 19:47:50.631541902 +0000 UTC m=+42.233297968" Oct 2 19:47:51.381000 audit[3968]: AVC avc: denied { write } for pid=3968 comm="tee" name="fd" dev="proc" ino=33308 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 19:47:51.381000 audit[3968]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffdf8baf969 a2=241 a3=1b6 items=1 ppid=3930 pid=3968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:51.381000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Oct 2 19:47:51.381000 audit: PATH item=0 name="/dev/fd/63" inode=33305 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:47:51.381000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 19:47:51.381000 audit[3960]: AVC avc: denied { write } for pid=3960 comm="tee" name="fd" dev="proc" ino=42126 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 19:47:51.381000 audit[3960]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe7a54397b a2=241 a3=1b6 items=1 ppid=3931 pid=3960 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:51.381000 audit: CWD cwd="/etc/service/enabled/cni/log" Oct 2 19:47:51.381000 audit: PATH item=0 name="/dev/fd/63" inode=32393 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:47:51.381000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 19:47:51.382000 audit[3969]: AVC avc: denied { write } for pid=3969 comm="tee" name="fd" dev="proc" ino=22496 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 19:47:51.382000 audit[3969]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcda05397a a2=241 a3=1b6 items=1 ppid=3929 pid=3969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:51.382000 audit: CWD cwd="/etc/service/enabled/bird/log" Oct 2 19:47:51.382000 audit: PATH item=0 name="/dev/fd/63" inode=36189 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:47:51.382000 audit[3973]: AVC avc: denied { write } for pid=3973 comm="tee" name="fd" dev="proc" ino=13146 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 19:47:51.382000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 19:47:51.382000 audit[3973]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffbecc9979 a2=241 a3=1b6 items=1 ppid=3937 pid=3973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:51.382000 audit: CWD cwd="/etc/service/enabled/confd/log" Oct 2 19:47:51.382000 audit: PATH item=0 name="/dev/fd/63" inode=13143 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:47:51.382000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 19:47:51.382000 audit[3970]: AVC avc: denied { write } for pid=3970 comm="tee" name="fd" dev="proc" ino=39152 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 19:47:51.382000 audit[3970]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff5a91996a a2=241 a3=1b6 items=1 ppid=3928 pid=3970 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:51.382000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Oct 2 19:47:51.382000 audit: PATH item=0 name="/dev/fd/63" inode=22493 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:47:51.382000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 19:47:51.382000 audit[3971]: AVC avc: denied { write } for pid=3971 comm="tee" name="fd" dev="proc" ino=43140 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 19:47:51.382000 audit[3971]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc90162979 a2=241 a3=1b6 items=1 ppid=3933 pid=3971 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:51.382000 audit: CWD cwd="/etc/service/enabled/bird6/log" Oct 2 19:47:51.382000 audit: PATH item=0 name="/dev/fd/63" inode=34310 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:47:51.382000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 19:47:51.382000 audit[3974]: AVC avc: denied { write } for pid=3974 comm="tee" name="fd" dev="proc" ino=42130 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 19:47:51.382000 audit[3974]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe17290979 a2=241 a3=1b6 items=1 ppid=3932 pid=3974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:51.382000 audit: CWD cwd="/etc/service/enabled/felix/log" Oct 2 19:47:51.382000 audit: PATH item=0 name="/dev/fd/63" inode=39149 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 19:47:51.382000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 19:47:51.473000 audit[4112]: AVC avc: denied { bpf } for pid=4112 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:51.473000 audit[4112]: AVC avc: denied { bpf } for pid=4112 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:51.473000 audit[4112]: AVC avc: denied { perfmon } for pid=4112 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:51.473000 audit[4112]: AVC avc: denied { perfmon } for pid=4112 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:51.473000 audit[4112]: AVC avc: denied { perfmon } for pid=4112 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:51.473000 audit[4112]: AVC avc: denied { perfmon } for pid=4112 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:51.473000 audit[4112]: AVC avc: denied { perfmon } for pid=4112 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:51.473000 audit[4112]: AVC avc: denied { bpf } for pid=4112 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:51.473000 audit[4112]: AVC avc: denied { bpf } for pid=4112 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:51.473000 audit: BPF prog-id=148 op=LOAD Oct 2 19:47:51.473000 audit[4112]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd46982ad0 a2=70 a3=7f682a51b000 items=0 ppid=3939 pid=4112 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:51.473000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:47:51.473000 audit: BPF prog-id=148 op=UNLOAD Oct 2 19:47:51.473000 audit[4112]: AVC avc: denied { bpf } for pid=4112 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:51.473000 audit[4112]: AVC avc: denied { bpf } for pid=4112 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:51.473000 audit[4112]: AVC avc: denied { perfmon } for pid=4112 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:51.473000 audit[4112]: AVC avc: denied { perfmon } for pid=4112 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:51.473000 audit[4112]: AVC avc: denied { perfmon } for pid=4112 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:51.473000 audit[4112]: AVC avc: denied { perfmon } for pid=4112 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:51.473000 audit[4112]: AVC avc: denied { perfmon } for pid=4112 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:51.473000 audit[4112]: AVC avc: denied { bpf } for pid=4112 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:51.473000 audit[4112]: AVC avc: denied { bpf } for pid=4112 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:51.473000 audit: BPF prog-id=149 op=LOAD Oct 2 19:47:51.473000 audit[4112]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd46982ad0 a2=70 a3=6e items=0 ppid=3939 pid=4112 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:51.473000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:47:51.473000 audit: BPF prog-id=149 op=UNLOAD Oct 2 19:47:51.473000 audit[4112]: AVC avc: denied { perfmon } for pid=4112 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:51.473000 audit[4112]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffd46982a80 a2=70 a3=7ffd46982ad0 items=0 ppid=3939 pid=4112 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:51.473000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:47:51.473000 audit[4112]: AVC avc: denied { bpf } for pid=4112 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:51.473000 audit[4112]: AVC avc: denied { bpf } for pid=4112 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:51.473000 audit[4112]: AVC avc: denied { perfmon } for pid=4112 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:51.473000 audit[4112]: AVC avc: denied { perfmon } for pid=4112 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:51.473000 audit[4112]: AVC avc: denied { perfmon } for pid=4112 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:51.473000 audit[4112]: AVC avc: denied { perfmon } for pid=4112 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:51.473000 audit[4112]: AVC avc: denied { perfmon } for pid=4112 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:51.473000 audit[4112]: AVC avc: denied { bpf } for pid=4112 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:51.473000 audit[4112]: AVC avc: denied { bpf } for pid=4112 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:51.473000 audit: BPF prog-id=150 op=LOAD Oct 2 19:47:51.473000 audit[4112]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7ffd46982a60 a2=70 a3=7ffd46982ad0 items=0 ppid=3939 pid=4112 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:51.473000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:47:51.474000 audit: BPF prog-id=150 op=UNLOAD Oct 2 19:47:51.474000 audit[4112]: AVC avc: denied { bpf } for pid=4112 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:51.474000 audit[4112]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd46982b40 a2=70 a3=0 items=0 ppid=3939 pid=4112 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:51.474000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:47:51.474000 audit[4112]: AVC avc: denied { bpf } for pid=4112 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:51.474000 audit[4112]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd46982b30 a2=70 a3=0 items=0 ppid=3939 pid=4112 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:51.474000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:47:51.474000 audit[4112]: AVC avc: denied { bpf } for pid=4112 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:51.474000 audit[4112]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=0 a1=7ffd46982b70 a2=70 a3=0 items=0 ppid=3939 pid=4112 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:51.474000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:47:51.474000 audit[4112]: AVC avc: denied { bpf } for pid=4112 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:51.474000 audit[4112]: AVC avc: denied { bpf } for pid=4112 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:51.474000 audit[4112]: AVC avc: denied { bpf } for pid=4112 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:51.474000 audit[4112]: AVC avc: denied { perfmon } for pid=4112 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:51.474000 audit[4112]: AVC avc: denied { perfmon } for pid=4112 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:51.474000 audit[4112]: AVC avc: denied { perfmon } for pid=4112 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:51.474000 audit[4112]: AVC avc: denied { perfmon } for pid=4112 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:51.474000 audit[4112]: AVC avc: denied { perfmon } for pid=4112 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:51.474000 audit[4112]: AVC avc: denied { bpf } for pid=4112 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:51.474000 audit[4112]: AVC avc: denied { bpf } for pid=4112 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:51.474000 audit: BPF prog-id=151 op=LOAD Oct 2 19:47:51.474000 audit[4112]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7ffd46982a90 a2=70 a3=ffffffff items=0 ppid=3939 pid=4112 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:51.474000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 19:47:51.475000 audit[4116]: AVC avc: denied { bpf } for pid=4116 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:51.475000 audit[4116]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe043bae10 a2=70 a3=fff80800 items=0 ppid=3939 pid=4116 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:51.475000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 2 19:47:51.475000 audit[4116]: AVC avc: denied { bpf } for pid=4116 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:51.475000 audit[4116]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe043bace0 a2=70 a3=3 items=0 ppid=3939 pid=4116 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:51.475000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 2 19:47:51.485000 audit: BPF prog-id=151 op=UNLOAD Oct 2 19:47:51.597000 audit[4172]: NETFILTER_CFG table=mangle:109 family=2 entries=19 op=nft_register_chain pid=4172 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:47:51.597000 audit[4172]: SYSCALL arch=c000003e syscall=46 success=yes exit=6800 a0=3 a1=7fffa9c07250 a2=0 a3=7fffa9c0723c items=0 ppid=3939 pid=4172 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:51.597000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:47:51.605000 audit[4173]: NETFILTER_CFG table=raw:110 family=2 entries=19 op=nft_register_chain pid=4173 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:47:51.605000 audit[4173]: SYSCALL arch=c000003e syscall=46 success=yes exit=6132 a0=3 a1=7ffcddf70860 a2=0 a3=562d852d1000 items=0 ppid=3939 pid=4173 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:51.605000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:47:51.613000 audit[4174]: NETFILTER_CFG table=nat:111 family=2 entries=16 op=nft_register_chain pid=4174 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:47:51.613000 audit[4174]: SYSCALL arch=c000003e syscall=46 success=yes exit=5188 a0=3 a1=7ffed0127820 a2=0 a3=556d5e759000 items=0 ppid=3939 pid=4174 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:51.613000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:47:51.617000 audit[4177]: NETFILTER_CFG table=filter:112 family=2 entries=39 op=nft_register_chain pid=4177 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:47:51.617000 audit[4177]: SYSCALL arch=c000003e syscall=46 success=yes exit=18472 a0=3 a1=7ffcc0815be0 a2=0 a3=55b560611000 items=0 ppid=3939 pid=4177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:51.617000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:47:52.474797 systemd-networkd[1274]: vxlan.calico: Link UP Oct 2 19:47:52.474805 systemd-networkd[1274]: vxlan.calico: Gained carrier Oct 2 19:47:53.705661 systemd-networkd[1274]: vxlan.calico: Gained IPv6LL Oct 2 19:47:55.470275 env[1461]: time="2023-10-02T19:47:55.470144149Z" level=info msg="StopPodSandbox for \"23c9ad6741a3f90dd9df1224eb0be613f01cbaa595626a8135295aed6514d075\"" Oct 2 19:47:55.520912 env[1461]: 2023-10-02 19:47:55.499 [INFO][4250] k8s.go 576: Cleaning up netns ContainerID="23c9ad6741a3f90dd9df1224eb0be613f01cbaa595626a8135295aed6514d075" Oct 2 19:47:55.520912 env[1461]: 2023-10-02 19:47:55.500 [INFO][4250] dataplane_linux.go 524: Deleting workload's device in netns. ContainerID="23c9ad6741a3f90dd9df1224eb0be613f01cbaa595626a8135295aed6514d075" iface="eth0" netns="/var/run/netns/cni-0e7dfb54-989e-5542-d2fc-4db9707ac216" Oct 2 19:47:55.520912 env[1461]: 2023-10-02 19:47:55.500 [INFO][4250] dataplane_linux.go 535: Entered netns, deleting veth. ContainerID="23c9ad6741a3f90dd9df1224eb0be613f01cbaa595626a8135295aed6514d075" iface="eth0" netns="/var/run/netns/cni-0e7dfb54-989e-5542-d2fc-4db9707ac216" Oct 2 19:47:55.520912 env[1461]: 2023-10-02 19:47:55.500 [INFO][4250] dataplane_linux.go 562: Workload's veth was already gone. Nothing to do. ContainerID="23c9ad6741a3f90dd9df1224eb0be613f01cbaa595626a8135295aed6514d075" iface="eth0" netns="/var/run/netns/cni-0e7dfb54-989e-5542-d2fc-4db9707ac216" Oct 2 19:47:55.520912 env[1461]: 2023-10-02 19:47:55.500 [INFO][4250] k8s.go 583: Releasing IP address(es) ContainerID="23c9ad6741a3f90dd9df1224eb0be613f01cbaa595626a8135295aed6514d075" Oct 2 19:47:55.520912 env[1461]: 2023-10-02 19:47:55.500 [INFO][4250] utils.go 196: Calico CNI releasing IP address ContainerID="23c9ad6741a3f90dd9df1224eb0be613f01cbaa595626a8135295aed6514d075" Oct 2 19:47:55.520912 env[1461]: 2023-10-02 19:47:55.513 [INFO][4265] ipam_plugin.go 416: Releasing address using handleID ContainerID="23c9ad6741a3f90dd9df1224eb0be613f01cbaa595626a8135295aed6514d075" HandleID="k8s-pod-network.23c9ad6741a3f90dd9df1224eb0be613f01cbaa595626a8135295aed6514d075" Workload="ci--3510.3.0--a--b66ea99ec2-k8s-coredns--787d4945fb--brbpj-eth0" Oct 2 19:47:55.520912 env[1461]: time="2023-10-02T19:47:55Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:47:55.520912 env[1461]: time="2023-10-02T19:47:55Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:47:55.520912 env[1461]: 2023-10-02 19:47:55.518 [WARNING][4265] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="23c9ad6741a3f90dd9df1224eb0be613f01cbaa595626a8135295aed6514d075" HandleID="k8s-pod-network.23c9ad6741a3f90dd9df1224eb0be613f01cbaa595626a8135295aed6514d075" Workload="ci--3510.3.0--a--b66ea99ec2-k8s-coredns--787d4945fb--brbpj-eth0" Oct 2 19:47:55.520912 env[1461]: 2023-10-02 19:47:55.518 [INFO][4265] ipam_plugin.go 444: Releasing address using workloadID ContainerID="23c9ad6741a3f90dd9df1224eb0be613f01cbaa595626a8135295aed6514d075" HandleID="k8s-pod-network.23c9ad6741a3f90dd9df1224eb0be613f01cbaa595626a8135295aed6514d075" Workload="ci--3510.3.0--a--b66ea99ec2-k8s-coredns--787d4945fb--brbpj-eth0" Oct 2 19:47:55.520912 env[1461]: time="2023-10-02T19:47:55Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:47:55.520912 env[1461]: 2023-10-02 19:47:55.520 [INFO][4250] k8s.go 589: Teardown processing complete. ContainerID="23c9ad6741a3f90dd9df1224eb0be613f01cbaa595626a8135295aed6514d075" Oct 2 19:47:55.521308 env[1461]: time="2023-10-02T19:47:55.520982291Z" level=info msg="TearDown network for sandbox \"23c9ad6741a3f90dd9df1224eb0be613f01cbaa595626a8135295aed6514d075\" successfully" Oct 2 19:47:55.521308 env[1461]: time="2023-10-02T19:47:55.521013696Z" level=info msg="StopPodSandbox for \"23c9ad6741a3f90dd9df1224eb0be613f01cbaa595626a8135295aed6514d075\" returns successfully" Oct 2 19:47:55.521539 env[1461]: time="2023-10-02T19:47:55.521520011Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-brbpj,Uid:4fcca1ab-8a1f-4075-a69b-cda7fd2d32ee,Namespace:kube-system,Attempt:1,}" Oct 2 19:47:55.522241 systemd[1]: run-netns-cni\x2d0e7dfb54\x2d989e\x2d5542\x2dd2fc\x2d4db9707ac216.mount: Deactivated successfully. Oct 2 19:47:55.653380 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Oct 2 19:47:55.653456 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali66f25634d78: link becomes ready Oct 2 19:47:55.667927 systemd-networkd[1274]: cali66f25634d78: Link UP Oct 2 19:47:55.667932 systemd-networkd[1274]: cali66f25634d78: Gained carrier Oct 2 19:47:55.674185 env[1461]: 2023-10-02 19:47:55.543 [INFO][4278] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.0--a--b66ea99ec2-k8s-coredns--787d4945fb--brbpj-eth0 coredns-787d4945fb- kube-system 4fcca1ab-8a1f-4075-a69b-cda7fd2d32ee 657 0 2023-10-02 19:47:23 +0000 UTC map[k8s-app:kube-dns pod-template-hash:787d4945fb projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510.3.0-a-b66ea99ec2 coredns-787d4945fb-brbpj eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali66f25634d78 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="b463b65f10c962f244035f83f242bf06c8e16db6f3e518256debf0d2e3f3125c" Namespace="kube-system" Pod="coredns-787d4945fb-brbpj" WorkloadEndpoint="ci--3510.3.0--a--b66ea99ec2-k8s-coredns--787d4945fb--brbpj-" Oct 2 19:47:55.674185 env[1461]: 2023-10-02 19:47:55.543 [INFO][4278] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="b463b65f10c962f244035f83f242bf06c8e16db6f3e518256debf0d2e3f3125c" Namespace="kube-system" Pod="coredns-787d4945fb-brbpj" WorkloadEndpoint="ci--3510.3.0--a--b66ea99ec2-k8s-coredns--787d4945fb--brbpj-eth0" Oct 2 19:47:55.674185 env[1461]: 2023-10-02 19:47:55.559 [INFO][4297] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="b463b65f10c962f244035f83f242bf06c8e16db6f3e518256debf0d2e3f3125c" HandleID="k8s-pod-network.b463b65f10c962f244035f83f242bf06c8e16db6f3e518256debf0d2e3f3125c" Workload="ci--3510.3.0--a--b66ea99ec2-k8s-coredns--787d4945fb--brbpj-eth0" Oct 2 19:47:55.674185 env[1461]: 2023-10-02 19:47:55.566 [INFO][4297] ipam_plugin.go 269: Auto assigning IP ContainerID="b463b65f10c962f244035f83f242bf06c8e16db6f3e518256debf0d2e3f3125c" HandleID="k8s-pod-network.b463b65f10c962f244035f83f242bf06c8e16db6f3e518256debf0d2e3f3125c" Workload="ci--3510.3.0--a--b66ea99ec2-k8s-coredns--787d4945fb--brbpj-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000431c30), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510.3.0-a-b66ea99ec2", "pod":"coredns-787d4945fb-brbpj", "timestamp":"2023-10-02 19:47:55.559472589 +0000 UTC"}, Hostname:"ci-3510.3.0-a-b66ea99ec2", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 2 19:47:55.674185 env[1461]: time="2023-10-02T19:47:55Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:47:55.674185 env[1461]: time="2023-10-02T19:47:55Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:47:55.674185 env[1461]: 2023-10-02 19:47:55.567 [INFO][4297] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.0-a-b66ea99ec2' Oct 2 19:47:55.674185 env[1461]: 2023-10-02 19:47:55.568 [INFO][4297] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.b463b65f10c962f244035f83f242bf06c8e16db6f3e518256debf0d2e3f3125c" host="ci-3510.3.0-a-b66ea99ec2" Oct 2 19:47:55.674185 env[1461]: 2023-10-02 19:47:55.571 [INFO][4297] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.0-a-b66ea99ec2" Oct 2 19:47:55.674185 env[1461]: 2023-10-02 19:47:55.574 [INFO][4297] ipam.go 489: Trying affinity for 192.168.76.128/26 host="ci-3510.3.0-a-b66ea99ec2" Oct 2 19:47:55.674185 env[1461]: 2023-10-02 19:47:55.576 [INFO][4297] ipam.go 155: Attempting to load block cidr=192.168.76.128/26 host="ci-3510.3.0-a-b66ea99ec2" Oct 2 19:47:55.674185 env[1461]: 2023-10-02 19:47:55.578 [INFO][4297] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.76.128/26 host="ci-3510.3.0-a-b66ea99ec2" Oct 2 19:47:55.674185 env[1461]: 2023-10-02 19:47:55.578 [INFO][4297] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.76.128/26 handle="k8s-pod-network.b463b65f10c962f244035f83f242bf06c8e16db6f3e518256debf0d2e3f3125c" host="ci-3510.3.0-a-b66ea99ec2" Oct 2 19:47:55.674185 env[1461]: 2023-10-02 19:47:55.579 [INFO][4297] ipam.go 1682: Creating new handle: k8s-pod-network.b463b65f10c962f244035f83f242bf06c8e16db6f3e518256debf0d2e3f3125c Oct 2 19:47:55.674185 env[1461]: 2023-10-02 19:47:55.583 [INFO][4297] ipam.go 1203: Writing block in order to claim IPs block=192.168.76.128/26 handle="k8s-pod-network.b463b65f10c962f244035f83f242bf06c8e16db6f3e518256debf0d2e3f3125c" host="ci-3510.3.0-a-b66ea99ec2" Oct 2 19:47:55.674185 env[1461]: 2023-10-02 19:47:55.587 [INFO][4297] ipam.go 1216: Successfully claimed IPs: [192.168.76.129/26] block=192.168.76.128/26 handle="k8s-pod-network.b463b65f10c962f244035f83f242bf06c8e16db6f3e518256debf0d2e3f3125c" host="ci-3510.3.0-a-b66ea99ec2" Oct 2 19:47:55.674185 env[1461]: 2023-10-02 19:47:55.587 [INFO][4297] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.76.129/26] handle="k8s-pod-network.b463b65f10c962f244035f83f242bf06c8e16db6f3e518256debf0d2e3f3125c" host="ci-3510.3.0-a-b66ea99ec2" Oct 2 19:47:55.674185 env[1461]: time="2023-10-02T19:47:55Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:47:55.674185 env[1461]: 2023-10-02 19:47:55.587 [INFO][4297] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.76.129/26] IPv6=[] ContainerID="b463b65f10c962f244035f83f242bf06c8e16db6f3e518256debf0d2e3f3125c" HandleID="k8s-pod-network.b463b65f10c962f244035f83f242bf06c8e16db6f3e518256debf0d2e3f3125c" Workload="ci--3510.3.0--a--b66ea99ec2-k8s-coredns--787d4945fb--brbpj-eth0" Oct 2 19:47:55.674818 env[1461]: 2023-10-02 19:47:55.590 [INFO][4278] k8s.go 383: Populated endpoint ContainerID="b463b65f10c962f244035f83f242bf06c8e16db6f3e518256debf0d2e3f3125c" Namespace="kube-system" Pod="coredns-787d4945fb-brbpj" WorkloadEndpoint="ci--3510.3.0--a--b66ea99ec2-k8s-coredns--787d4945fb--brbpj-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--b66ea99ec2-k8s-coredns--787d4945fb--brbpj-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"4fcca1ab-8a1f-4075-a69b-cda7fd2d32ee", ResourceVersion:"657", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 47, 23, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-b66ea99ec2", ContainerID:"", Pod:"coredns-787d4945fb-brbpj", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.76.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali66f25634d78", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:47:55.674818 env[1461]: 2023-10-02 19:47:55.590 [INFO][4278] k8s.go 384: Calico CNI using IPs: [192.168.76.129/32] ContainerID="b463b65f10c962f244035f83f242bf06c8e16db6f3e518256debf0d2e3f3125c" Namespace="kube-system" Pod="coredns-787d4945fb-brbpj" WorkloadEndpoint="ci--3510.3.0--a--b66ea99ec2-k8s-coredns--787d4945fb--brbpj-eth0" Oct 2 19:47:55.674818 env[1461]: 2023-10-02 19:47:55.590 [INFO][4278] dataplane_linux.go 68: Setting the host side veth name to cali66f25634d78 ContainerID="b463b65f10c962f244035f83f242bf06c8e16db6f3e518256debf0d2e3f3125c" Namespace="kube-system" Pod="coredns-787d4945fb-brbpj" WorkloadEndpoint="ci--3510.3.0--a--b66ea99ec2-k8s-coredns--787d4945fb--brbpj-eth0" Oct 2 19:47:55.674818 env[1461]: 2023-10-02 19:47:55.653 [INFO][4278] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="b463b65f10c962f244035f83f242bf06c8e16db6f3e518256debf0d2e3f3125c" Namespace="kube-system" Pod="coredns-787d4945fb-brbpj" WorkloadEndpoint="ci--3510.3.0--a--b66ea99ec2-k8s-coredns--787d4945fb--brbpj-eth0" Oct 2 19:47:55.674818 env[1461]: 2023-10-02 19:47:55.667 [INFO][4278] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="b463b65f10c962f244035f83f242bf06c8e16db6f3e518256debf0d2e3f3125c" Namespace="kube-system" Pod="coredns-787d4945fb-brbpj" WorkloadEndpoint="ci--3510.3.0--a--b66ea99ec2-k8s-coredns--787d4945fb--brbpj-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--b66ea99ec2-k8s-coredns--787d4945fb--brbpj-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"4fcca1ab-8a1f-4075-a69b-cda7fd2d32ee", ResourceVersion:"657", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 47, 23, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-b66ea99ec2", ContainerID:"b463b65f10c962f244035f83f242bf06c8e16db6f3e518256debf0d2e3f3125c", Pod:"coredns-787d4945fb-brbpj", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.76.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali66f25634d78", MAC:"a6:cc:22:49:81:89", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:47:55.674818 env[1461]: 2023-10-02 19:47:55.673 [INFO][4278] k8s.go 489: Wrote updated endpoint to datastore ContainerID="b463b65f10c962f244035f83f242bf06c8e16db6f3e518256debf0d2e3f3125c" Namespace="kube-system" Pod="coredns-787d4945fb-brbpj" WorkloadEndpoint="ci--3510.3.0--a--b66ea99ec2-k8s-coredns--787d4945fb--brbpj-eth0" Oct 2 19:47:55.679529 env[1461]: time="2023-10-02T19:47:55.679464974Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:47:55.679529 env[1461]: time="2023-10-02T19:47:55.679489314Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:47:55.679529 env[1461]: time="2023-10-02T19:47:55.679502638Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:47:55.679810 env[1461]: time="2023-10-02T19:47:55.679587766Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b463b65f10c962f244035f83f242bf06c8e16db6f3e518256debf0d2e3f3125c pid=4345 runtime=io.containerd.runc.v2 Oct 2 19:47:55.679000 audit[4352]: NETFILTER_CFG table=filter:113 family=2 entries=36 op=nft_register_chain pid=4352 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:47:55.707524 kernel: kauditd_printk_skb: 151 callbacks suppressed Oct 2 19:47:55.707566 kernel: audit: type=1325 audit(1696276075.679:1191): table=filter:113 family=2 entries=36 op=nft_register_chain pid=4352 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:47:55.679000 audit[4352]: SYSCALL arch=c000003e syscall=46 success=yes exit=19908 a0=3 a1=7ffda302e950 a2=0 a3=7ffda302e93c items=0 ppid=3939 pid=4352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:55.767315 kernel: audit: type=1300 audit(1696276075.679:1191): arch=c000003e syscall=46 success=yes exit=19908 a0=3 a1=7ffda302e950 a2=0 a3=7ffda302e93c items=0 ppid=3939 pid=4352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:55.770099 systemd[1]: Started cri-containerd-b463b65f10c962f244035f83f242bf06c8e16db6f3e518256debf0d2e3f3125c.scope. Oct 2 19:47:55.679000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:47:55.863372 kernel: audit: type=1327 audit(1696276075.679:1191): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:47:55.866000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:55.986614 kernel: audit: type=1400 audit(1696276075.866:1192): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:55.986652 kernel: audit: type=1400 audit(1696276075.866:1193): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:55.866000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:56.049315 kernel: audit: type=1400 audit(1696276075.866:1194): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:55.866000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:56.111922 kernel: audit: type=1400 audit(1696276075.866:1195): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:55.866000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:56.174967 kernel: audit: type=1400 audit(1696276075.866:1196): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:55.866000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:56.237960 kernel: audit: type=1400 audit(1696276075.866:1197): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:55.866000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:56.300929 kernel: audit: type=1400 audit(1696276075.866:1198): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:55.866000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:55.866000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:55.866000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:55.986000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:55.986000 audit: BPF prog-id=152 op=LOAD Oct 2 19:47:55.986000 audit[4354]: AVC avc: denied { bpf } for pid=4354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:55.986000 audit[4354]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4345 pid=4354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:55.986000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234363362363566313063393632663234343033356638336632343262 Oct 2 19:47:55.986000 audit[4354]: AVC avc: denied { perfmon } for pid=4354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:55.986000 audit[4354]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=4345 pid=4354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:55.986000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234363362363566313063393632663234343033356638336632343262 Oct 2 19:47:55.986000 audit[4354]: AVC avc: denied { bpf } for pid=4354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:55.986000 audit[4354]: AVC avc: denied { bpf } for pid=4354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:55.986000 audit[4354]: AVC avc: denied { bpf } for pid=4354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:55.986000 audit[4354]: AVC avc: denied { perfmon } for pid=4354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:55.986000 audit[4354]: AVC avc: denied { perfmon } for pid=4354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:55.986000 audit[4354]: AVC avc: denied { perfmon } for pid=4354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:55.986000 audit[4354]: AVC avc: denied { perfmon } for pid=4354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:55.986000 audit[4354]: AVC avc: denied { perfmon } for pid=4354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:55.986000 audit[4354]: AVC avc: denied { bpf } for pid=4354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:55.986000 audit[4354]: AVC avc: denied { bpf } for pid=4354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:55.986000 audit: BPF prog-id=153 op=LOAD Oct 2 19:47:55.986000 audit[4354]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003880d0 items=0 ppid=4345 pid=4354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:55.986000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234363362363566313063393632663234343033356638336632343262 Oct 2 19:47:56.111000 audit[4354]: AVC avc: denied { bpf } for pid=4354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:56.111000 audit[4354]: AVC avc: denied { bpf } for pid=4354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:56.111000 audit[4354]: AVC avc: denied { perfmon } for pid=4354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:56.111000 audit[4354]: AVC avc: denied { perfmon } for pid=4354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:56.111000 audit[4354]: AVC avc: denied { perfmon } for pid=4354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:56.111000 audit[4354]: AVC avc: denied { perfmon } for pid=4354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:56.111000 audit[4354]: AVC avc: denied { perfmon } for pid=4354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:56.111000 audit[4354]: AVC avc: denied { bpf } for pid=4354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:56.111000 audit[4354]: AVC avc: denied { bpf } for pid=4354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:56.111000 audit: BPF prog-id=154 op=LOAD Oct 2 19:47:56.111000 audit[4354]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000388118 items=0 ppid=4345 pid=4354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:56.111000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234363362363566313063393632663234343033356638336632343262 Oct 2 19:47:56.237000 audit: BPF prog-id=154 op=UNLOAD Oct 2 19:47:56.237000 audit: BPF prog-id=153 op=UNLOAD Oct 2 19:47:56.237000 audit[4354]: AVC avc: denied { bpf } for pid=4354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:56.237000 audit[4354]: AVC avc: denied { bpf } for pid=4354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:56.237000 audit[4354]: AVC avc: denied { bpf } for pid=4354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:56.237000 audit[4354]: AVC avc: denied { perfmon } for pid=4354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:56.237000 audit[4354]: AVC avc: denied { perfmon } for pid=4354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:56.237000 audit[4354]: AVC avc: denied { perfmon } for pid=4354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:56.237000 audit[4354]: AVC avc: denied { perfmon } for pid=4354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:56.237000 audit[4354]: AVC avc: denied { perfmon } for pid=4354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:56.237000 audit[4354]: AVC avc: denied { bpf } for pid=4354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:56.237000 audit[4354]: AVC avc: denied { bpf } for pid=4354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:56.237000 audit: BPF prog-id=155 op=LOAD Oct 2 19:47:56.237000 audit[4354]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000388528 items=0 ppid=4345 pid=4354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:56.237000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234363362363566313063393632663234343033356638336632343262 Oct 2 19:47:56.397892 env[1461]: time="2023-10-02T19:47:56.397864570Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-brbpj,Uid:4fcca1ab-8a1f-4075-a69b-cda7fd2d32ee,Namespace:kube-system,Attempt:1,} returns sandbox id \"b463b65f10c962f244035f83f242bf06c8e16db6f3e518256debf0d2e3f3125c\"" Oct 2 19:47:56.399078 env[1461]: time="2023-10-02T19:47:56.399062018Z" level=info msg="CreateContainer within sandbox \"b463b65f10c962f244035f83f242bf06c8e16db6f3e518256debf0d2e3f3125c\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Oct 2 19:47:56.403228 env[1461]: time="2023-10-02T19:47:56.403183151Z" level=info msg="CreateContainer within sandbox \"b463b65f10c962f244035f83f242bf06c8e16db6f3e518256debf0d2e3f3125c\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"50b1b423227ac9623177a6a55077cb1fba7fb3745918bf27426250efc876b343\"" Oct 2 19:47:56.403426 env[1461]: time="2023-10-02T19:47:56.403386470Z" level=info msg="StartContainer for \"50b1b423227ac9623177a6a55077cb1fba7fb3745918bf27426250efc876b343\"" Oct 2 19:47:56.422955 systemd[1]: Started cri-containerd-50b1b423227ac9623177a6a55077cb1fba7fb3745918bf27426250efc876b343.scope. Oct 2 19:47:56.430000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:56.430000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:56.430000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:56.430000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:56.430000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:56.430000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:56.430000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:56.430000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:56.430000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:56.430000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:56.430000 audit: BPF prog-id=156 op=LOAD Oct 2 19:47:56.431000 audit[4385]: AVC avc: denied { bpf } for pid=4385 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:56.431000 audit[4385]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4345 pid=4385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:56.431000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530623162343233323237616339363233313737613661353530373763 Oct 2 19:47:56.431000 audit[4385]: AVC avc: denied { perfmon } for pid=4385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:56.431000 audit[4385]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4345 pid=4385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:56.431000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530623162343233323237616339363233313737613661353530373763 Oct 2 19:47:56.431000 audit[4385]: AVC avc: denied { bpf } for pid=4385 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:56.431000 audit[4385]: AVC avc: denied { bpf } for pid=4385 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:56.431000 audit[4385]: AVC avc: denied { bpf } for pid=4385 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:56.431000 audit[4385]: AVC avc: denied { perfmon } for pid=4385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:56.431000 audit[4385]: AVC avc: denied { perfmon } for pid=4385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:56.431000 audit[4385]: AVC avc: denied { perfmon } for pid=4385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:56.431000 audit[4385]: AVC avc: denied { perfmon } for pid=4385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:56.431000 audit[4385]: AVC avc: denied { perfmon } for pid=4385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:56.431000 audit[4385]: AVC avc: denied { bpf } for pid=4385 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:56.431000 audit[4385]: AVC avc: denied { bpf } for pid=4385 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:56.431000 audit: BPF prog-id=157 op=LOAD Oct 2 19:47:56.431000 audit[4385]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003b4120 items=0 ppid=4345 pid=4385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:56.431000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530623162343233323237616339363233313737613661353530373763 Oct 2 19:47:56.431000 audit[4385]: AVC avc: denied { bpf } for pid=4385 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:56.431000 audit[4385]: AVC avc: denied { bpf } for pid=4385 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:56.431000 audit[4385]: AVC avc: denied { perfmon } for pid=4385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:56.431000 audit[4385]: AVC avc: denied { perfmon } for pid=4385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:56.431000 audit[4385]: AVC avc: denied { perfmon } for pid=4385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:56.431000 audit[4385]: AVC avc: denied { perfmon } for pid=4385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:56.431000 audit[4385]: AVC avc: denied { perfmon } for pid=4385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:56.431000 audit[4385]: AVC avc: denied { bpf } for pid=4385 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:56.431000 audit[4385]: AVC avc: denied { bpf } for pid=4385 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:56.431000 audit: BPF prog-id=158 op=LOAD Oct 2 19:47:56.431000 audit[4385]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003b4168 items=0 ppid=4345 pid=4385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:56.431000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530623162343233323237616339363233313737613661353530373763 Oct 2 19:47:56.431000 audit: BPF prog-id=158 op=UNLOAD Oct 2 19:47:56.431000 audit: BPF prog-id=157 op=UNLOAD Oct 2 19:47:56.431000 audit[4385]: AVC avc: denied { bpf } for pid=4385 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:56.431000 audit[4385]: AVC avc: denied { bpf } for pid=4385 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:56.431000 audit[4385]: AVC avc: denied { bpf } for pid=4385 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:56.431000 audit[4385]: AVC avc: denied { perfmon } for pid=4385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:56.431000 audit[4385]: AVC avc: denied { perfmon } for pid=4385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:56.431000 audit[4385]: AVC avc: denied { perfmon } for pid=4385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:56.431000 audit[4385]: AVC avc: denied { perfmon } for pid=4385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:56.431000 audit[4385]: AVC avc: denied { perfmon } for pid=4385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:56.431000 audit[4385]: AVC avc: denied { bpf } for pid=4385 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:56.431000 audit[4385]: AVC avc: denied { bpf } for pid=4385 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:56.431000 audit: BPF prog-id=159 op=LOAD Oct 2 19:47:56.431000 audit[4385]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003b4578 items=0 ppid=4345 pid=4385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:56.431000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530623162343233323237616339363233313737613661353530373763 Oct 2 19:47:56.453609 env[1461]: time="2023-10-02T19:47:56.453567842Z" level=info msg="StartContainer for \"50b1b423227ac9623177a6a55077cb1fba7fb3745918bf27426250efc876b343\" returns successfully" Oct 2 19:47:56.469682 env[1461]: time="2023-10-02T19:47:56.469659130Z" level=info msg="StopPodSandbox for \"17978490ffd842e930d9cb79632bd4dafc2ceae4ff1967f9eee156df238b4c31\"" Oct 2 19:47:56.469789 env[1461]: time="2023-10-02T19:47:56.469659009Z" level=info msg="StopPodSandbox for \"17af3cbd1e5b27bb5fdb71e30df45dad7ac77e0941aaccf368f37f8a2c9ef875\"" Oct 2 19:47:56.508341 env[1461]: 2023-10-02 19:47:56.491 [INFO][4460] k8s.go 576: Cleaning up netns ContainerID="17978490ffd842e930d9cb79632bd4dafc2ceae4ff1967f9eee156df238b4c31" Oct 2 19:47:56.508341 env[1461]: 2023-10-02 19:47:56.491 [INFO][4460] dataplane_linux.go 524: Deleting workload's device in netns. ContainerID="17978490ffd842e930d9cb79632bd4dafc2ceae4ff1967f9eee156df238b4c31" iface="eth0" netns="/var/run/netns/cni-79e2ba58-a090-dd20-b374-aff3222ad539" Oct 2 19:47:56.508341 env[1461]: 2023-10-02 19:47:56.492 [INFO][4460] dataplane_linux.go 535: Entered netns, deleting veth. ContainerID="17978490ffd842e930d9cb79632bd4dafc2ceae4ff1967f9eee156df238b4c31" iface="eth0" netns="/var/run/netns/cni-79e2ba58-a090-dd20-b374-aff3222ad539" Oct 2 19:47:56.508341 env[1461]: 2023-10-02 19:47:56.492 [INFO][4460] dataplane_linux.go 562: Workload's veth was already gone. Nothing to do. ContainerID="17978490ffd842e930d9cb79632bd4dafc2ceae4ff1967f9eee156df238b4c31" iface="eth0" netns="/var/run/netns/cni-79e2ba58-a090-dd20-b374-aff3222ad539" Oct 2 19:47:56.508341 env[1461]: 2023-10-02 19:47:56.492 [INFO][4460] k8s.go 583: Releasing IP address(es) ContainerID="17978490ffd842e930d9cb79632bd4dafc2ceae4ff1967f9eee156df238b4c31" Oct 2 19:47:56.508341 env[1461]: 2023-10-02 19:47:56.492 [INFO][4460] utils.go 196: Calico CNI releasing IP address ContainerID="17978490ffd842e930d9cb79632bd4dafc2ceae4ff1967f9eee156df238b4c31" Oct 2 19:47:56.508341 env[1461]: 2023-10-02 19:47:56.501 [INFO][4484] ipam_plugin.go 416: Releasing address using handleID ContainerID="17978490ffd842e930d9cb79632bd4dafc2ceae4ff1967f9eee156df238b4c31" HandleID="k8s-pod-network.17978490ffd842e930d9cb79632bd4dafc2ceae4ff1967f9eee156df238b4c31" Workload="ci--3510.3.0--a--b66ea99ec2-k8s-calico--kube--controllers--69c848ddc6--qqrrz-eth0" Oct 2 19:47:56.508341 env[1461]: time="2023-10-02T19:47:56Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:47:56.508341 env[1461]: time="2023-10-02T19:47:56Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:47:56.508341 env[1461]: 2023-10-02 19:47:56.505 [WARNING][4484] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="17978490ffd842e930d9cb79632bd4dafc2ceae4ff1967f9eee156df238b4c31" HandleID="k8s-pod-network.17978490ffd842e930d9cb79632bd4dafc2ceae4ff1967f9eee156df238b4c31" Workload="ci--3510.3.0--a--b66ea99ec2-k8s-calico--kube--controllers--69c848ddc6--qqrrz-eth0" Oct 2 19:47:56.508341 env[1461]: 2023-10-02 19:47:56.505 [INFO][4484] ipam_plugin.go 444: Releasing address using workloadID ContainerID="17978490ffd842e930d9cb79632bd4dafc2ceae4ff1967f9eee156df238b4c31" HandleID="k8s-pod-network.17978490ffd842e930d9cb79632bd4dafc2ceae4ff1967f9eee156df238b4c31" Workload="ci--3510.3.0--a--b66ea99ec2-k8s-calico--kube--controllers--69c848ddc6--qqrrz-eth0" Oct 2 19:47:56.508341 env[1461]: time="2023-10-02T19:47:56Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:47:56.508341 env[1461]: 2023-10-02 19:47:56.507 [INFO][4460] k8s.go 589: Teardown processing complete. ContainerID="17978490ffd842e930d9cb79632bd4dafc2ceae4ff1967f9eee156df238b4c31" Oct 2 19:47:56.508846 env[1461]: time="2023-10-02T19:47:56.508412535Z" level=info msg="TearDown network for sandbox \"17978490ffd842e930d9cb79632bd4dafc2ceae4ff1967f9eee156df238b4c31\" successfully" Oct 2 19:47:56.508846 env[1461]: time="2023-10-02T19:47:56.508433246Z" level=info msg="StopPodSandbox for \"17978490ffd842e930d9cb79632bd4dafc2ceae4ff1967f9eee156df238b4c31\" returns successfully" Oct 2 19:47:56.508846 env[1461]: time="2023-10-02T19:47:56.508754881Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-69c848ddc6-qqrrz,Uid:2a804127-9341-491a-b87d-9b61243b002d,Namespace:calico-system,Attempt:1,}" Oct 2 19:47:56.512783 env[1461]: 2023-10-02 19:47:56.493 [INFO][4459] k8s.go 576: Cleaning up netns ContainerID="17af3cbd1e5b27bb5fdb71e30df45dad7ac77e0941aaccf368f37f8a2c9ef875" Oct 2 19:47:56.512783 env[1461]: 2023-10-02 19:47:56.493 [INFO][4459] dataplane_linux.go 524: Deleting workload's device in netns. ContainerID="17af3cbd1e5b27bb5fdb71e30df45dad7ac77e0941aaccf368f37f8a2c9ef875" iface="eth0" netns="/var/run/netns/cni-d47e0de6-0817-0181-1202-1511af5be1f6" Oct 2 19:47:56.512783 env[1461]: 2023-10-02 19:47:56.493 [INFO][4459] dataplane_linux.go 535: Entered netns, deleting veth. ContainerID="17af3cbd1e5b27bb5fdb71e30df45dad7ac77e0941aaccf368f37f8a2c9ef875" iface="eth0" netns="/var/run/netns/cni-d47e0de6-0817-0181-1202-1511af5be1f6" Oct 2 19:47:56.512783 env[1461]: 2023-10-02 19:47:56.493 [INFO][4459] dataplane_linux.go 562: Workload's veth was already gone. Nothing to do. ContainerID="17af3cbd1e5b27bb5fdb71e30df45dad7ac77e0941aaccf368f37f8a2c9ef875" iface="eth0" netns="/var/run/netns/cni-d47e0de6-0817-0181-1202-1511af5be1f6" Oct 2 19:47:56.512783 env[1461]: 2023-10-02 19:47:56.493 [INFO][4459] k8s.go 583: Releasing IP address(es) ContainerID="17af3cbd1e5b27bb5fdb71e30df45dad7ac77e0941aaccf368f37f8a2c9ef875" Oct 2 19:47:56.512783 env[1461]: 2023-10-02 19:47:56.493 [INFO][4459] utils.go 196: Calico CNI releasing IP address ContainerID="17af3cbd1e5b27bb5fdb71e30df45dad7ac77e0941aaccf368f37f8a2c9ef875" Oct 2 19:47:56.512783 env[1461]: 2023-10-02 19:47:56.503 [INFO][4489] ipam_plugin.go 416: Releasing address using handleID ContainerID="17af3cbd1e5b27bb5fdb71e30df45dad7ac77e0941aaccf368f37f8a2c9ef875" HandleID="k8s-pod-network.17af3cbd1e5b27bb5fdb71e30df45dad7ac77e0941aaccf368f37f8a2c9ef875" Workload="ci--3510.3.0--a--b66ea99ec2-k8s-csi--node--driver--l8hvh-eth0" Oct 2 19:47:56.512783 env[1461]: time="2023-10-02T19:47:56Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:47:56.512783 env[1461]: time="2023-10-02T19:47:56Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:47:56.512783 env[1461]: 2023-10-02 19:47:56.510 [WARNING][4489] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="17af3cbd1e5b27bb5fdb71e30df45dad7ac77e0941aaccf368f37f8a2c9ef875" HandleID="k8s-pod-network.17af3cbd1e5b27bb5fdb71e30df45dad7ac77e0941aaccf368f37f8a2c9ef875" Workload="ci--3510.3.0--a--b66ea99ec2-k8s-csi--node--driver--l8hvh-eth0" Oct 2 19:47:56.512783 env[1461]: 2023-10-02 19:47:56.510 [INFO][4489] ipam_plugin.go 444: Releasing address using workloadID ContainerID="17af3cbd1e5b27bb5fdb71e30df45dad7ac77e0941aaccf368f37f8a2c9ef875" HandleID="k8s-pod-network.17af3cbd1e5b27bb5fdb71e30df45dad7ac77e0941aaccf368f37f8a2c9ef875" Workload="ci--3510.3.0--a--b66ea99ec2-k8s-csi--node--driver--l8hvh-eth0" Oct 2 19:47:56.512783 env[1461]: time="2023-10-02T19:47:56Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:47:56.512783 env[1461]: 2023-10-02 19:47:56.512 [INFO][4459] k8s.go 589: Teardown processing complete. ContainerID="17af3cbd1e5b27bb5fdb71e30df45dad7ac77e0941aaccf368f37f8a2c9ef875" Oct 2 19:47:56.513025 env[1461]: time="2023-10-02T19:47:56.512806069Z" level=info msg="TearDown network for sandbox \"17af3cbd1e5b27bb5fdb71e30df45dad7ac77e0941aaccf368f37f8a2c9ef875\" successfully" Oct 2 19:47:56.513025 env[1461]: time="2023-10-02T19:47:56.512818344Z" level=info msg="StopPodSandbox for \"17af3cbd1e5b27bb5fdb71e30df45dad7ac77e0941aaccf368f37f8a2c9ef875\" returns successfully" Oct 2 19:47:56.513064 env[1461]: time="2023-10-02T19:47:56.513042234Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-l8hvh,Uid:ebb11106-5253-488c-9095-50c2b68f321c,Namespace:calico-system,Attempt:1,}" Oct 2 19:47:56.530064 systemd[1]: run-netns-cni\x2dd47e0de6\x2d0817\x2d0181\x2d1202\x2d1511af5be1f6.mount: Deactivated successfully. Oct 2 19:47:56.530281 systemd[1]: run-netns-cni\x2d79e2ba58\x2da090\x2ddd20\x2db374\x2daff3222ad539.mount: Deactivated successfully. Oct 2 19:47:56.626172 kubelet[2613]: I1002 19:47:56.626107 2613 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-787d4945fb-brbpj" podStartSLOduration=33.626080637 pod.CreationTimestamp="2023-10-02 19:47:23 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 19:47:56.625633641 +0000 UTC m=+48.227389671" watchObservedRunningTime="2023-10-02 19:47:56.626080637 +0000 UTC m=+48.227836662" Oct 2 19:47:56.685589 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Oct 2 19:47:56.685677 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calif3e01b8290f: link becomes ready Oct 2 19:47:56.684000 audit[4612]: NETFILTER_CFG table=filter:114 family=2 entries=12 op=nft_register_rule pid=4612 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:47:56.684000 audit[4612]: SYSCALL arch=c000003e syscall=46 success=yes exit=4028 a0=3 a1=7ffe03d16280 a2=0 a3=7ffe03d1626c items=0 ppid=2915 pid=4612 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:56.684000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:47:56.685000 audit[4612]: NETFILTER_CFG table=nat:115 family=2 entries=30 op=nft_register_rule pid=4612 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:47:56.685000 audit[4612]: SYSCALL arch=c000003e syscall=46 success=yes exit=8836 a0=3 a1=7ffe03d16280 a2=0 a3=7ffe03d1626c items=0 ppid=2915 pid=4612 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:56.685000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:47:56.704955 systemd-networkd[1274]: calif3e01b8290f: Link UP Oct 2 19:47:56.704958 systemd-networkd[1274]: calif3e01b8290f: Gained carrier Oct 2 19:47:56.709851 env[1461]: 2023-10-02 19:47:56.575 [INFO][4516] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.0--a--b66ea99ec2-k8s-calico--kube--controllers--69c848ddc6--qqrrz-eth0 calico-kube-controllers-69c848ddc6- calico-system 2a804127-9341-491a-b87d-9b61243b002d 669 0 2023-10-02 19:47:29 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:69c848ddc6 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s ci-3510.3.0-a-b66ea99ec2 calico-kube-controllers-69c848ddc6-qqrrz eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] calif3e01b8290f [] []}} ContainerID="25c271726f2b4c39dacd577293b2288b445be6fec217fc7f5924528f99b4642f" Namespace="calico-system" Pod="calico-kube-controllers-69c848ddc6-qqrrz" WorkloadEndpoint="ci--3510.3.0--a--b66ea99ec2-k8s-calico--kube--controllers--69c848ddc6--qqrrz-" Oct 2 19:47:56.709851 env[1461]: 2023-10-02 19:47:56.575 [INFO][4516] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="25c271726f2b4c39dacd577293b2288b445be6fec217fc7f5924528f99b4642f" Namespace="calico-system" Pod="calico-kube-controllers-69c848ddc6-qqrrz" WorkloadEndpoint="ci--3510.3.0--a--b66ea99ec2-k8s-calico--kube--controllers--69c848ddc6--qqrrz-eth0" Oct 2 19:47:56.709851 env[1461]: 2023-10-02 19:47:56.598 [INFO][4556] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="25c271726f2b4c39dacd577293b2288b445be6fec217fc7f5924528f99b4642f" HandleID="k8s-pod-network.25c271726f2b4c39dacd577293b2288b445be6fec217fc7f5924528f99b4642f" Workload="ci--3510.3.0--a--b66ea99ec2-k8s-calico--kube--controllers--69c848ddc6--qqrrz-eth0" Oct 2 19:47:56.709851 env[1461]: 2023-10-02 19:47:56.608 [INFO][4556] ipam_plugin.go 269: Auto assigning IP ContainerID="25c271726f2b4c39dacd577293b2288b445be6fec217fc7f5924528f99b4642f" HandleID="k8s-pod-network.25c271726f2b4c39dacd577293b2288b445be6fec217fc7f5924528f99b4642f" Workload="ci--3510.3.0--a--b66ea99ec2-k8s-calico--kube--controllers--69c848ddc6--qqrrz-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000529380), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.0-a-b66ea99ec2", "pod":"calico-kube-controllers-69c848ddc6-qqrrz", "timestamp":"2023-10-02 19:47:56.598502919 +0000 UTC"}, Hostname:"ci-3510.3.0-a-b66ea99ec2", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 2 19:47:56.709851 env[1461]: time="2023-10-02T19:47:56Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:47:56.709851 env[1461]: time="2023-10-02T19:47:56Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:47:56.709851 env[1461]: 2023-10-02 19:47:56.608 [INFO][4556] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.0-a-b66ea99ec2' Oct 2 19:47:56.709851 env[1461]: 2023-10-02 19:47:56.610 [INFO][4556] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.25c271726f2b4c39dacd577293b2288b445be6fec217fc7f5924528f99b4642f" host="ci-3510.3.0-a-b66ea99ec2" Oct 2 19:47:56.709851 env[1461]: 2023-10-02 19:47:56.613 [INFO][4556] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.0-a-b66ea99ec2" Oct 2 19:47:56.709851 env[1461]: 2023-10-02 19:47:56.615 [INFO][4556] ipam.go 489: Trying affinity for 192.168.76.128/26 host="ci-3510.3.0-a-b66ea99ec2" Oct 2 19:47:56.709851 env[1461]: 2023-10-02 19:47:56.617 [INFO][4556] ipam.go 155: Attempting to load block cidr=192.168.76.128/26 host="ci-3510.3.0-a-b66ea99ec2" Oct 2 19:47:56.709851 env[1461]: 2023-10-02 19:47:56.619 [INFO][4556] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.76.128/26 host="ci-3510.3.0-a-b66ea99ec2" Oct 2 19:47:56.709851 env[1461]: 2023-10-02 19:47:56.619 [INFO][4556] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.76.128/26 handle="k8s-pod-network.25c271726f2b4c39dacd577293b2288b445be6fec217fc7f5924528f99b4642f" host="ci-3510.3.0-a-b66ea99ec2" Oct 2 19:47:56.709851 env[1461]: 2023-10-02 19:47:56.620 [INFO][4556] ipam.go 1682: Creating new handle: k8s-pod-network.25c271726f2b4c39dacd577293b2288b445be6fec217fc7f5924528f99b4642f Oct 2 19:47:56.709851 env[1461]: 2023-10-02 19:47:56.623 [INFO][4556] ipam.go 1203: Writing block in order to claim IPs block=192.168.76.128/26 handle="k8s-pod-network.25c271726f2b4c39dacd577293b2288b445be6fec217fc7f5924528f99b4642f" host="ci-3510.3.0-a-b66ea99ec2" Oct 2 19:47:56.709851 env[1461]: 2023-10-02 19:47:56.627 [INFO][4556] ipam.go 1216: Successfully claimed IPs: [192.168.76.130/26] block=192.168.76.128/26 handle="k8s-pod-network.25c271726f2b4c39dacd577293b2288b445be6fec217fc7f5924528f99b4642f" host="ci-3510.3.0-a-b66ea99ec2" Oct 2 19:47:56.709851 env[1461]: 2023-10-02 19:47:56.627 [INFO][4556] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.76.130/26] handle="k8s-pod-network.25c271726f2b4c39dacd577293b2288b445be6fec217fc7f5924528f99b4642f" host="ci-3510.3.0-a-b66ea99ec2" Oct 2 19:47:56.709851 env[1461]: time="2023-10-02T19:47:56Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:47:56.709851 env[1461]: 2023-10-02 19:47:56.627 [INFO][4556] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.76.130/26] IPv6=[] ContainerID="25c271726f2b4c39dacd577293b2288b445be6fec217fc7f5924528f99b4642f" HandleID="k8s-pod-network.25c271726f2b4c39dacd577293b2288b445be6fec217fc7f5924528f99b4642f" Workload="ci--3510.3.0--a--b66ea99ec2-k8s-calico--kube--controllers--69c848ddc6--qqrrz-eth0" Oct 2 19:47:56.710318 env[1461]: 2023-10-02 19:47:56.628 [INFO][4516] k8s.go 383: Populated endpoint ContainerID="25c271726f2b4c39dacd577293b2288b445be6fec217fc7f5924528f99b4642f" Namespace="calico-system" Pod="calico-kube-controllers-69c848ddc6-qqrrz" WorkloadEndpoint="ci--3510.3.0--a--b66ea99ec2-k8s-calico--kube--controllers--69c848ddc6--qqrrz-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--b66ea99ec2-k8s-calico--kube--controllers--69c848ddc6--qqrrz-eth0", GenerateName:"calico-kube-controllers-69c848ddc6-", Namespace:"calico-system", SelfLink:"", UID:"2a804127-9341-491a-b87d-9b61243b002d", ResourceVersion:"669", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 47, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"69c848ddc6", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-b66ea99ec2", ContainerID:"", Pod:"calico-kube-controllers-69c848ddc6-qqrrz", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.76.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calif3e01b8290f", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:47:56.710318 env[1461]: 2023-10-02 19:47:56.629 [INFO][4516] k8s.go 384: Calico CNI using IPs: [192.168.76.130/32] ContainerID="25c271726f2b4c39dacd577293b2288b445be6fec217fc7f5924528f99b4642f" Namespace="calico-system" Pod="calico-kube-controllers-69c848ddc6-qqrrz" WorkloadEndpoint="ci--3510.3.0--a--b66ea99ec2-k8s-calico--kube--controllers--69c848ddc6--qqrrz-eth0" Oct 2 19:47:56.710318 env[1461]: 2023-10-02 19:47:56.629 [INFO][4516] dataplane_linux.go 68: Setting the host side veth name to calif3e01b8290f ContainerID="25c271726f2b4c39dacd577293b2288b445be6fec217fc7f5924528f99b4642f" Namespace="calico-system" Pod="calico-kube-controllers-69c848ddc6-qqrrz" WorkloadEndpoint="ci--3510.3.0--a--b66ea99ec2-k8s-calico--kube--controllers--69c848ddc6--qqrrz-eth0" Oct 2 19:47:56.710318 env[1461]: 2023-10-02 19:47:56.685 [INFO][4516] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="25c271726f2b4c39dacd577293b2288b445be6fec217fc7f5924528f99b4642f" Namespace="calico-system" Pod="calico-kube-controllers-69c848ddc6-qqrrz" WorkloadEndpoint="ci--3510.3.0--a--b66ea99ec2-k8s-calico--kube--controllers--69c848ddc6--qqrrz-eth0" Oct 2 19:47:56.710318 env[1461]: 2023-10-02 19:47:56.704 [INFO][4516] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="25c271726f2b4c39dacd577293b2288b445be6fec217fc7f5924528f99b4642f" Namespace="calico-system" Pod="calico-kube-controllers-69c848ddc6-qqrrz" WorkloadEndpoint="ci--3510.3.0--a--b66ea99ec2-k8s-calico--kube--controllers--69c848ddc6--qqrrz-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--b66ea99ec2-k8s-calico--kube--controllers--69c848ddc6--qqrrz-eth0", GenerateName:"calico-kube-controllers-69c848ddc6-", Namespace:"calico-system", SelfLink:"", UID:"2a804127-9341-491a-b87d-9b61243b002d", ResourceVersion:"669", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 47, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"69c848ddc6", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-b66ea99ec2", ContainerID:"25c271726f2b4c39dacd577293b2288b445be6fec217fc7f5924528f99b4642f", Pod:"calico-kube-controllers-69c848ddc6-qqrrz", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.76.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calif3e01b8290f", MAC:"2a:86:4f:2f:74:b6", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:47:56.710318 env[1461]: 2023-10-02 19:47:56.709 [INFO][4516] k8s.go 489: Wrote updated endpoint to datastore ContainerID="25c271726f2b4c39dacd577293b2288b445be6fec217fc7f5924528f99b4642f" Namespace="calico-system" Pod="calico-kube-controllers-69c848ddc6-qqrrz" WorkloadEndpoint="ci--3510.3.0--a--b66ea99ec2-k8s-calico--kube--controllers--69c848ddc6--qqrrz-eth0" Oct 2 19:47:56.716087 env[1461]: time="2023-10-02T19:47:56.716051713Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:47:56.716087 env[1461]: time="2023-10-02T19:47:56.716076644Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:47:56.716087 env[1461]: time="2023-10-02T19:47:56.716084635Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:47:56.716244 env[1461]: time="2023-10-02T19:47:56.716155555Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/25c271726f2b4c39dacd577293b2288b445be6fec217fc7f5924528f99b4642f pid=4635 runtime=io.containerd.runc.v2 Oct 2 19:47:56.715000 audit[4640]: NETFILTER_CFG table=filter:116 family=2 entries=40 op=nft_register_chain pid=4640 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:47:56.715000 audit[4640]: SYSCALL arch=c000003e syscall=46 success=yes exit=21096 a0=3 a1=7ffd302580e0 a2=0 a3=7ffd302580cc items=0 ppid=3939 pid=4640 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:56.715000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:47:56.733115 systemd-networkd[1274]: cali66f25634d78: Gained IPv6LL Oct 2 19:47:56.733312 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali0a7171b4cfb: link becomes ready Oct 2 19:47:56.747897 systemd-networkd[1274]: cali0a7171b4cfb: Link UP Oct 2 19:47:56.747899 systemd-networkd[1274]: cali0a7171b4cfb: Gained carrier Oct 2 19:47:56.748635 systemd[1]: Started cri-containerd-25c271726f2b4c39dacd577293b2288b445be6fec217fc7f5924528f99b4642f.scope. Oct 2 19:47:56.753686 env[1461]: 2023-10-02 19:47:56.577 [INFO][4518] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.0--a--b66ea99ec2-k8s-csi--node--driver--l8hvh-eth0 csi-node-driver- calico-system ebb11106-5253-488c-9095-50c2b68f321c 670 0 2023-10-02 19:47:43 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:5877dcb8f5 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s ci-3510.3.0-a-b66ea99ec2 csi-node-driver-l8hvh eth0 default [] [] [kns.calico-system ksa.calico-system.default] cali0a7171b4cfb [] []}} ContainerID="2b4feb441613edbebea1e738177d6dbce62406de2e3133fa4e917b3b1c24513f" Namespace="calico-system" Pod="csi-node-driver-l8hvh" WorkloadEndpoint="ci--3510.3.0--a--b66ea99ec2-k8s-csi--node--driver--l8hvh-" Oct 2 19:47:56.753686 env[1461]: 2023-10-02 19:47:56.577 [INFO][4518] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="2b4feb441613edbebea1e738177d6dbce62406de2e3133fa4e917b3b1c24513f" Namespace="calico-system" Pod="csi-node-driver-l8hvh" WorkloadEndpoint="ci--3510.3.0--a--b66ea99ec2-k8s-csi--node--driver--l8hvh-eth0" Oct 2 19:47:56.753686 env[1461]: 2023-10-02 19:47:56.601 [INFO][4561] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="2b4feb441613edbebea1e738177d6dbce62406de2e3133fa4e917b3b1c24513f" HandleID="k8s-pod-network.2b4feb441613edbebea1e738177d6dbce62406de2e3133fa4e917b3b1c24513f" Workload="ci--3510.3.0--a--b66ea99ec2-k8s-csi--node--driver--l8hvh-eth0" Oct 2 19:47:56.753686 env[1461]: 2023-10-02 19:47:56.610 [INFO][4561] ipam_plugin.go 269: Auto assigning IP ContainerID="2b4feb441613edbebea1e738177d6dbce62406de2e3133fa4e917b3b1c24513f" HandleID="k8s-pod-network.2b4feb441613edbebea1e738177d6dbce62406de2e3133fa4e917b3b1c24513f" Workload="ci--3510.3.0--a--b66ea99ec2-k8s-csi--node--driver--l8hvh-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000125cd0), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.0-a-b66ea99ec2", "pod":"csi-node-driver-l8hvh", "timestamp":"2023-10-02 19:47:56.601397237 +0000 UTC"}, Hostname:"ci-3510.3.0-a-b66ea99ec2", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 2 19:47:56.753686 env[1461]: time="2023-10-02T19:47:56Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:47:56.753686 env[1461]: time="2023-10-02T19:47:56Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:47:56.753686 env[1461]: 2023-10-02 19:47:56.627 [INFO][4561] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.0-a-b66ea99ec2' Oct 2 19:47:56.753686 env[1461]: 2023-10-02 19:47:56.628 [INFO][4561] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.2b4feb441613edbebea1e738177d6dbce62406de2e3133fa4e917b3b1c24513f" host="ci-3510.3.0-a-b66ea99ec2" Oct 2 19:47:56.753686 env[1461]: 2023-10-02 19:47:56.632 [INFO][4561] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.0-a-b66ea99ec2" Oct 2 19:47:56.753686 env[1461]: 2023-10-02 19:47:56.659 [INFO][4561] ipam.go 489: Trying affinity for 192.168.76.128/26 host="ci-3510.3.0-a-b66ea99ec2" Oct 2 19:47:56.753686 env[1461]: 2023-10-02 19:47:56.686 [INFO][4561] ipam.go 155: Attempting to load block cidr=192.168.76.128/26 host="ci-3510.3.0-a-b66ea99ec2" Oct 2 19:47:56.753686 env[1461]: 2023-10-02 19:47:56.687 [INFO][4561] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.76.128/26 host="ci-3510.3.0-a-b66ea99ec2" Oct 2 19:47:56.753686 env[1461]: 2023-10-02 19:47:56.687 [INFO][4561] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.76.128/26 handle="k8s-pod-network.2b4feb441613edbebea1e738177d6dbce62406de2e3133fa4e917b3b1c24513f" host="ci-3510.3.0-a-b66ea99ec2" Oct 2 19:47:56.753686 env[1461]: 2023-10-02 19:47:56.688 [INFO][4561] ipam.go 1682: Creating new handle: k8s-pod-network.2b4feb441613edbebea1e738177d6dbce62406de2e3133fa4e917b3b1c24513f Oct 2 19:47:56.753686 env[1461]: 2023-10-02 19:47:56.691 [INFO][4561] ipam.go 1203: Writing block in order to claim IPs block=192.168.76.128/26 handle="k8s-pod-network.2b4feb441613edbebea1e738177d6dbce62406de2e3133fa4e917b3b1c24513f" host="ci-3510.3.0-a-b66ea99ec2" Oct 2 19:47:56.753686 env[1461]: 2023-10-02 19:47:56.693 [INFO][4561] ipam.go 1216: Successfully claimed IPs: [192.168.76.131/26] block=192.168.76.128/26 handle="k8s-pod-network.2b4feb441613edbebea1e738177d6dbce62406de2e3133fa4e917b3b1c24513f" host="ci-3510.3.0-a-b66ea99ec2" Oct 2 19:47:56.753686 env[1461]: 2023-10-02 19:47:56.693 [INFO][4561] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.76.131/26] handle="k8s-pod-network.2b4feb441613edbebea1e738177d6dbce62406de2e3133fa4e917b3b1c24513f" host="ci-3510.3.0-a-b66ea99ec2" Oct 2 19:47:56.753686 env[1461]: time="2023-10-02T19:47:56Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:47:56.753686 env[1461]: 2023-10-02 19:47:56.693 [INFO][4561] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.76.131/26] IPv6=[] ContainerID="2b4feb441613edbebea1e738177d6dbce62406de2e3133fa4e917b3b1c24513f" HandleID="k8s-pod-network.2b4feb441613edbebea1e738177d6dbce62406de2e3133fa4e917b3b1c24513f" Workload="ci--3510.3.0--a--b66ea99ec2-k8s-csi--node--driver--l8hvh-eth0" Oct 2 19:47:56.752000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:56.752000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:56.752000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:56.752000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:56.752000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:56.752000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:56.752000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:56.752000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:56.752000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:56.752000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:56.752000 audit: BPF prog-id=160 op=LOAD Oct 2 19:47:56.754373 env[1461]: 2023-10-02 19:47:56.694 [INFO][4518] k8s.go 383: Populated endpoint ContainerID="2b4feb441613edbebea1e738177d6dbce62406de2e3133fa4e917b3b1c24513f" Namespace="calico-system" Pod="csi-node-driver-l8hvh" WorkloadEndpoint="ci--3510.3.0--a--b66ea99ec2-k8s-csi--node--driver--l8hvh-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--b66ea99ec2-k8s-csi--node--driver--l8hvh-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"ebb11106-5253-488c-9095-50c2b68f321c", ResourceVersion:"670", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 47, 43, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5877dcb8f5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-b66ea99ec2", ContainerID:"", Pod:"csi-node-driver-l8hvh", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.76.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali0a7171b4cfb", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:47:56.754373 env[1461]: 2023-10-02 19:47:56.694 [INFO][4518] k8s.go 384: Calico CNI using IPs: [192.168.76.131/32] ContainerID="2b4feb441613edbebea1e738177d6dbce62406de2e3133fa4e917b3b1c24513f" Namespace="calico-system" Pod="csi-node-driver-l8hvh" WorkloadEndpoint="ci--3510.3.0--a--b66ea99ec2-k8s-csi--node--driver--l8hvh-eth0" Oct 2 19:47:56.754373 env[1461]: 2023-10-02 19:47:56.694 [INFO][4518] dataplane_linux.go 68: Setting the host side veth name to cali0a7171b4cfb ContainerID="2b4feb441613edbebea1e738177d6dbce62406de2e3133fa4e917b3b1c24513f" Namespace="calico-system" Pod="csi-node-driver-l8hvh" WorkloadEndpoint="ci--3510.3.0--a--b66ea99ec2-k8s-csi--node--driver--l8hvh-eth0" Oct 2 19:47:56.754373 env[1461]: 2023-10-02 19:47:56.732 [INFO][4518] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="2b4feb441613edbebea1e738177d6dbce62406de2e3133fa4e917b3b1c24513f" Namespace="calico-system" Pod="csi-node-driver-l8hvh" WorkloadEndpoint="ci--3510.3.0--a--b66ea99ec2-k8s-csi--node--driver--l8hvh-eth0" Oct 2 19:47:56.754373 env[1461]: 2023-10-02 19:47:56.747 [INFO][4518] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="2b4feb441613edbebea1e738177d6dbce62406de2e3133fa4e917b3b1c24513f" Namespace="calico-system" Pod="csi-node-driver-l8hvh" WorkloadEndpoint="ci--3510.3.0--a--b66ea99ec2-k8s-csi--node--driver--l8hvh-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--b66ea99ec2-k8s-csi--node--driver--l8hvh-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"ebb11106-5253-488c-9095-50c2b68f321c", ResourceVersion:"670", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 47, 43, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5877dcb8f5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-b66ea99ec2", ContainerID:"2b4feb441613edbebea1e738177d6dbce62406de2e3133fa4e917b3b1c24513f", Pod:"csi-node-driver-l8hvh", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.76.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali0a7171b4cfb", MAC:"96:de:d8:57:21:08", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:47:56.754373 env[1461]: 2023-10-02 19:47:56.752 [INFO][4518] k8s.go 489: Wrote updated endpoint to datastore ContainerID="2b4feb441613edbebea1e738177d6dbce62406de2e3133fa4e917b3b1c24513f" Namespace="calico-system" Pod="csi-node-driver-l8hvh" WorkloadEndpoint="ci--3510.3.0--a--b66ea99ec2-k8s-csi--node--driver--l8hvh-eth0" Oct 2 19:47:56.753000 audit[4646]: AVC avc: denied { bpf } for pid=4646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:56.753000 audit[4646]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=4635 pid=4646 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:56.753000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235633237313732366632623463333964616364353737323933623232 Oct 2 19:47:56.753000 audit[4646]: AVC avc: denied { perfmon } for pid=4646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:56.753000 audit[4646]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=4635 pid=4646 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:56.753000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235633237313732366632623463333964616364353737323933623232 Oct 2 19:47:56.753000 audit[4646]: AVC avc: denied { bpf } for pid=4646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:56.753000 audit[4646]: AVC avc: denied { bpf } for pid=4646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:56.753000 audit[4646]: AVC avc: denied { bpf } for pid=4646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:56.753000 audit[4646]: AVC avc: denied { perfmon } for pid=4646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:56.753000 audit[4646]: AVC avc: denied { perfmon } for pid=4646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:56.753000 audit[4646]: AVC avc: denied { perfmon } for pid=4646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:56.753000 audit[4646]: AVC avc: denied { perfmon } for pid=4646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:56.753000 audit[4646]: AVC avc: denied { perfmon } for pid=4646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:56.753000 audit[4646]: AVC avc: denied { bpf } for pid=4646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:56.753000 audit[4646]: AVC avc: denied { bpf } for pid=4646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:56.753000 audit: BPF prog-id=161 op=LOAD Oct 2 19:47:56.753000 audit[4646]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0003e0600 items=0 ppid=4635 pid=4646 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:56.753000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235633237313732366632623463333964616364353737323933623232 Oct 2 19:47:56.753000 audit[4646]: AVC avc: denied { bpf } for pid=4646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:56.753000 audit[4646]: AVC avc: denied { bpf } for pid=4646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:56.753000 audit[4646]: AVC avc: denied { perfmon } for pid=4646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:56.753000 audit[4646]: AVC avc: denied { perfmon } for pid=4646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:56.753000 audit[4646]: AVC avc: denied { perfmon } for pid=4646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:56.753000 audit[4646]: AVC avc: denied { perfmon } for pid=4646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:56.753000 audit[4646]: AVC avc: denied { perfmon } for pid=4646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:56.753000 audit[4646]: AVC avc: denied { bpf } for pid=4646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:56.753000 audit[4646]: AVC avc: denied { bpf } for pid=4646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:56.753000 audit: BPF prog-id=162 op=LOAD Oct 2 19:47:56.753000 audit[4646]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0003e0648 items=0 ppid=4635 pid=4646 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:56.753000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235633237313732366632623463333964616364353737323933623232 Oct 2 19:47:56.753000 audit: BPF prog-id=162 op=UNLOAD Oct 2 19:47:56.753000 audit: BPF prog-id=161 op=UNLOAD Oct 2 19:47:56.753000 audit[4646]: AVC avc: denied { bpf } for pid=4646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:56.753000 audit[4646]: AVC avc: denied { bpf } for pid=4646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:56.753000 audit[4646]: AVC avc: denied { bpf } for pid=4646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:56.753000 audit[4646]: AVC avc: denied { perfmon } for pid=4646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:56.753000 audit[4646]: AVC avc: denied { perfmon } for pid=4646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:56.753000 audit[4646]: AVC avc: denied { perfmon } for pid=4646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:56.753000 audit[4646]: AVC avc: denied { perfmon } for pid=4646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:56.753000 audit[4646]: AVC avc: denied { perfmon } for pid=4646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:56.753000 audit[4646]: AVC avc: denied { bpf } for pid=4646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:56.753000 audit[4646]: AVC avc: denied { bpf } for pid=4646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:56.753000 audit: BPF prog-id=163 op=LOAD Oct 2 19:47:56.753000 audit[4646]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0003e0a58 items=0 ppid=4635 pid=4646 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:56.753000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235633237313732366632623463333964616364353737323933623232 Oct 2 19:47:56.759357 env[1461]: time="2023-10-02T19:47:56.759275280Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:47:56.759357 env[1461]: time="2023-10-02T19:47:56.759319530Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:47:56.759357 env[1461]: time="2023-10-02T19:47:56.759328367Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:47:56.759495 env[1461]: time="2023-10-02T19:47:56.759400292Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2b4feb441613edbebea1e738177d6dbce62406de2e3133fa4e917b3b1c24513f pid=4685 runtime=io.containerd.runc.v2 Oct 2 19:47:56.758000 audit[4686]: NETFILTER_CFG table=filter:117 family=2 entries=38 op=nft_register_chain pid=4686 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:47:56.758000 audit[4686]: SYSCALL arch=c000003e syscall=46 success=yes exit=19508 a0=3 a1=7ffd1d475120 a2=0 a3=7ffd1d47510c items=0 ppid=3939 pid=4686 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:56.758000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:47:56.771756 env[1461]: time="2023-10-02T19:47:56.771729540Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-69c848ddc6-qqrrz,Uid:2a804127-9341-491a-b87d-9b61243b002d,Namespace:calico-system,Attempt:1,} returns sandbox id \"25c271726f2b4c39dacd577293b2288b445be6fec217fc7f5924528f99b4642f\"" Oct 2 19:47:56.772399 env[1461]: time="2023-10-02T19:47:56.772382678Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.25.0\"" Oct 2 19:47:56.776660 systemd[1]: Started cri-containerd-2b4feb441613edbebea1e738177d6dbce62406de2e3133fa4e917b3b1c24513f.scope. Oct 2 19:47:56.780000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:56.780000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:56.780000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:56.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:56.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:56.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:56.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:56.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:56.780000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:56.780000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:56.780000 audit: BPF prog-id=164 op=LOAD Oct 2 19:47:56.781000 audit[4695]: AVC avc: denied { bpf } for pid=4695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:56.781000 audit[4695]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4685 pid=4695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:56.781000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262346665623434313631336564626562656131653733383137376436 Oct 2 19:47:56.781000 audit[4695]: AVC avc: denied { perfmon } for pid=4695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:56.781000 audit[4695]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=4685 pid=4695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:56.781000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262346665623434313631336564626562656131653733383137376436 Oct 2 19:47:56.781000 audit[4695]: AVC avc: denied { bpf } for pid=4695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:56.781000 audit[4695]: AVC avc: denied { bpf } for pid=4695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:56.781000 audit[4695]: AVC avc: denied { bpf } for pid=4695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:56.781000 audit[4695]: AVC avc: denied { perfmon } for pid=4695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:56.781000 audit[4695]: AVC avc: denied { perfmon } for pid=4695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:56.781000 audit[4695]: AVC avc: denied { perfmon } for pid=4695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:56.781000 audit[4695]: AVC avc: denied { perfmon } for pid=4695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:56.781000 audit[4695]: AVC avc: denied { perfmon } for pid=4695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:56.781000 audit[4695]: AVC avc: denied { bpf } for pid=4695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:56.781000 audit[4695]: AVC avc: denied { bpf } for pid=4695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:56.781000 audit: BPF prog-id=165 op=LOAD Oct 2 19:47:56.781000 audit[4695]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000098e30 items=0 ppid=4685 pid=4695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:56.781000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262346665623434313631336564626562656131653733383137376436 Oct 2 19:47:56.781000 audit[4695]: AVC avc: denied { bpf } for pid=4695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:56.781000 audit[4695]: AVC avc: denied { bpf } for pid=4695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:56.781000 audit[4695]: AVC avc: denied { perfmon } for pid=4695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:56.781000 audit[4695]: AVC avc: denied { perfmon } for pid=4695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:56.781000 audit[4695]: AVC avc: denied { perfmon } for pid=4695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:56.781000 audit[4695]: AVC avc: denied { perfmon } for pid=4695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:56.781000 audit[4695]: AVC avc: denied { perfmon } for pid=4695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:56.781000 audit[4695]: AVC avc: denied { bpf } for pid=4695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:56.781000 audit[4695]: AVC avc: denied { bpf } for pid=4695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:56.781000 audit: BPF prog-id=166 op=LOAD Oct 2 19:47:56.781000 audit[4695]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000098e78 items=0 ppid=4685 pid=4695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:56.781000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262346665623434313631336564626562656131653733383137376436 Oct 2 19:47:56.781000 audit: BPF prog-id=166 op=UNLOAD Oct 2 19:47:56.781000 audit: BPF prog-id=165 op=UNLOAD Oct 2 19:47:56.781000 audit[4695]: AVC avc: denied { bpf } for pid=4695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:56.781000 audit[4695]: AVC avc: denied { bpf } for pid=4695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:56.781000 audit[4695]: AVC avc: denied { bpf } for pid=4695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:56.781000 audit[4695]: AVC avc: denied { perfmon } for pid=4695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:56.781000 audit[4695]: AVC avc: denied { perfmon } for pid=4695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:56.781000 audit[4695]: AVC avc: denied { perfmon } for pid=4695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:56.781000 audit[4695]: AVC avc: denied { perfmon } for pid=4695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:56.781000 audit[4695]: AVC avc: denied { perfmon } for pid=4695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:56.781000 audit[4695]: AVC avc: denied { bpf } for pid=4695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:56.781000 audit[4695]: AVC avc: denied { bpf } for pid=4695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:56.781000 audit: BPF prog-id=167 op=LOAD Oct 2 19:47:56.781000 audit[4695]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000099288 items=0 ppid=4685 pid=4695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:56.781000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262346665623434313631336564626562656131653733383137376436 Oct 2 19:47:56.788090 env[1461]: time="2023-10-02T19:47:56.788069137Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-l8hvh,Uid:ebb11106-5253-488c-9095-50c2b68f321c,Namespace:calico-system,Attempt:1,} returns sandbox id \"2b4feb441613edbebea1e738177d6dbce62406de2e3133fa4e917b3b1c24513f\"" Oct 2 19:47:57.758000 audit[4751]: NETFILTER_CFG table=filter:118 family=2 entries=9 op=nft_register_rule pid=4751 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:47:57.758000 audit[4751]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffc8c1f28b0 a2=0 a3=7ffc8c1f289c items=0 ppid=2915 pid=4751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:57.758000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:47:57.762000 audit[4751]: NETFILTER_CFG table=nat:119 family=2 entries=51 op=nft_register_chain pid=4751 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:47:57.762000 audit[4751]: SYSCALL arch=c000003e syscall=46 success=yes exit=19324 a0=3 a1=7ffc8c1f28b0 a2=0 a3=7ffc8c1f289c items=0 ppid=2915 pid=4751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:57.762000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:47:57.993614 systemd-networkd[1274]: calif3e01b8290f: Gained IPv6LL Oct 2 19:47:58.313608 systemd-networkd[1274]: cali0a7171b4cfb: Gained IPv6LL Oct 2 19:47:58.471140 env[1461]: time="2023-10-02T19:47:58.471041499Z" level=info msg="StopPodSandbox for \"2e2b96de98c691eab85ee19efbb41e4a4ad79a1423450e5ecb9533377027fe73\"" Oct 2 19:47:58.572542 env[1461]: 2023-10-02 19:47:58.542 [INFO][4774] k8s.go 576: Cleaning up netns ContainerID="2e2b96de98c691eab85ee19efbb41e4a4ad79a1423450e5ecb9533377027fe73" Oct 2 19:47:58.572542 env[1461]: 2023-10-02 19:47:58.542 [INFO][4774] dataplane_linux.go 524: Deleting workload's device in netns. ContainerID="2e2b96de98c691eab85ee19efbb41e4a4ad79a1423450e5ecb9533377027fe73" iface="eth0" netns="/var/run/netns/cni-2fedbcc0-0e9a-b542-d0a8-17a3dc2e690e" Oct 2 19:47:58.572542 env[1461]: 2023-10-02 19:47:58.542 [INFO][4774] dataplane_linux.go 535: Entered netns, deleting veth. ContainerID="2e2b96de98c691eab85ee19efbb41e4a4ad79a1423450e5ecb9533377027fe73" iface="eth0" netns="/var/run/netns/cni-2fedbcc0-0e9a-b542-d0a8-17a3dc2e690e" Oct 2 19:47:58.572542 env[1461]: 2023-10-02 19:47:58.542 [INFO][4774] dataplane_linux.go 562: Workload's veth was already gone. Nothing to do. ContainerID="2e2b96de98c691eab85ee19efbb41e4a4ad79a1423450e5ecb9533377027fe73" iface="eth0" netns="/var/run/netns/cni-2fedbcc0-0e9a-b542-d0a8-17a3dc2e690e" Oct 2 19:47:58.572542 env[1461]: 2023-10-02 19:47:58.542 [INFO][4774] k8s.go 583: Releasing IP address(es) ContainerID="2e2b96de98c691eab85ee19efbb41e4a4ad79a1423450e5ecb9533377027fe73" Oct 2 19:47:58.572542 env[1461]: 2023-10-02 19:47:58.542 [INFO][4774] utils.go 196: Calico CNI releasing IP address ContainerID="2e2b96de98c691eab85ee19efbb41e4a4ad79a1423450e5ecb9533377027fe73" Oct 2 19:47:58.572542 env[1461]: 2023-10-02 19:47:58.561 [INFO][4793] ipam_plugin.go 416: Releasing address using handleID ContainerID="2e2b96de98c691eab85ee19efbb41e4a4ad79a1423450e5ecb9533377027fe73" HandleID="k8s-pod-network.2e2b96de98c691eab85ee19efbb41e4a4ad79a1423450e5ecb9533377027fe73" Workload="ci--3510.3.0--a--b66ea99ec2-k8s-coredns--787d4945fb--p6twp-eth0" Oct 2 19:47:58.572542 env[1461]: time="2023-10-02T19:47:58Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:47:58.572542 env[1461]: time="2023-10-02T19:47:58Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:47:58.572542 env[1461]: 2023-10-02 19:47:58.568 [WARNING][4793] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="2e2b96de98c691eab85ee19efbb41e4a4ad79a1423450e5ecb9533377027fe73" HandleID="k8s-pod-network.2e2b96de98c691eab85ee19efbb41e4a4ad79a1423450e5ecb9533377027fe73" Workload="ci--3510.3.0--a--b66ea99ec2-k8s-coredns--787d4945fb--p6twp-eth0" Oct 2 19:47:58.572542 env[1461]: 2023-10-02 19:47:58.568 [INFO][4793] ipam_plugin.go 444: Releasing address using workloadID ContainerID="2e2b96de98c691eab85ee19efbb41e4a4ad79a1423450e5ecb9533377027fe73" HandleID="k8s-pod-network.2e2b96de98c691eab85ee19efbb41e4a4ad79a1423450e5ecb9533377027fe73" Workload="ci--3510.3.0--a--b66ea99ec2-k8s-coredns--787d4945fb--p6twp-eth0" Oct 2 19:47:58.572542 env[1461]: time="2023-10-02T19:47:58Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:47:58.572542 env[1461]: 2023-10-02 19:47:58.571 [INFO][4774] k8s.go 589: Teardown processing complete. ContainerID="2e2b96de98c691eab85ee19efbb41e4a4ad79a1423450e5ecb9533377027fe73" Oct 2 19:47:58.573104 env[1461]: time="2023-10-02T19:47:58.572620311Z" level=info msg="TearDown network for sandbox \"2e2b96de98c691eab85ee19efbb41e4a4ad79a1423450e5ecb9533377027fe73\" successfully" Oct 2 19:47:58.573104 env[1461]: time="2023-10-02T19:47:58.572660415Z" level=info msg="StopPodSandbox for \"2e2b96de98c691eab85ee19efbb41e4a4ad79a1423450e5ecb9533377027fe73\" returns successfully" Oct 2 19:47:58.573223 env[1461]: time="2023-10-02T19:47:58.573201227Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-p6twp,Uid:365d9e2c-338a-4964-844b-392b2e4962e8,Namespace:kube-system,Attempt:1,}" Oct 2 19:47:58.575559 systemd[1]: run-netns-cni\x2d2fedbcc0\x2d0e9a\x2db542\x2dd0a8\x2d17a3dc2e690e.mount: Deactivated successfully. Oct 2 19:47:58.721674 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Oct 2 19:47:58.721743 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali3d72f50ed48: link becomes ready Oct 2 19:47:58.743911 systemd-networkd[1274]: cali3d72f50ed48: Link UP Oct 2 19:47:58.743914 systemd-networkd[1274]: cali3d72f50ed48: Gained carrier Oct 2 19:47:58.749410 env[1461]: 2023-10-02 19:47:58.607 [INFO][4810] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.0--a--b66ea99ec2-k8s-coredns--787d4945fb--p6twp-eth0 coredns-787d4945fb- kube-system 365d9e2c-338a-4964-844b-392b2e4962e8 692 0 2023-10-02 19:47:23 +0000 UTC map[k8s-app:kube-dns pod-template-hash:787d4945fb projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510.3.0-a-b66ea99ec2 coredns-787d4945fb-p6twp eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali3d72f50ed48 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="2ae08ec5e2703c1e64cfbbba8b6be6ea337f5c38a5e7200dc36d419d5d7bad88" Namespace="kube-system" Pod="coredns-787d4945fb-p6twp" WorkloadEndpoint="ci--3510.3.0--a--b66ea99ec2-k8s-coredns--787d4945fb--p6twp-" Oct 2 19:47:58.749410 env[1461]: 2023-10-02 19:47:58.608 [INFO][4810] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="2ae08ec5e2703c1e64cfbbba8b6be6ea337f5c38a5e7200dc36d419d5d7bad88" Namespace="kube-system" Pod="coredns-787d4945fb-p6twp" WorkloadEndpoint="ci--3510.3.0--a--b66ea99ec2-k8s-coredns--787d4945fb--p6twp-eth0" Oct 2 19:47:58.749410 env[1461]: 2023-10-02 19:47:58.632 [INFO][4834] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="2ae08ec5e2703c1e64cfbbba8b6be6ea337f5c38a5e7200dc36d419d5d7bad88" HandleID="k8s-pod-network.2ae08ec5e2703c1e64cfbbba8b6be6ea337f5c38a5e7200dc36d419d5d7bad88" Workload="ci--3510.3.0--a--b66ea99ec2-k8s-coredns--787d4945fb--p6twp-eth0" Oct 2 19:47:58.749410 env[1461]: 2023-10-02 19:47:58.641 [INFO][4834] ipam_plugin.go 269: Auto assigning IP ContainerID="2ae08ec5e2703c1e64cfbbba8b6be6ea337f5c38a5e7200dc36d419d5d7bad88" HandleID="k8s-pod-network.2ae08ec5e2703c1e64cfbbba8b6be6ea337f5c38a5e7200dc36d419d5d7bad88" Workload="ci--3510.3.0--a--b66ea99ec2-k8s-coredns--787d4945fb--p6twp-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000125e90), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510.3.0-a-b66ea99ec2", "pod":"coredns-787d4945fb-p6twp", "timestamp":"2023-10-02 19:47:58.632922314 +0000 UTC"}, Hostname:"ci-3510.3.0-a-b66ea99ec2", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 2 19:47:58.749410 env[1461]: time="2023-10-02T19:47:58Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:47:58.749410 env[1461]: time="2023-10-02T19:47:58Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:47:58.749410 env[1461]: 2023-10-02 19:47:58.642 [INFO][4834] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.0-a-b66ea99ec2' Oct 2 19:47:58.749410 env[1461]: 2023-10-02 19:47:58.644 [INFO][4834] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.2ae08ec5e2703c1e64cfbbba8b6be6ea337f5c38a5e7200dc36d419d5d7bad88" host="ci-3510.3.0-a-b66ea99ec2" Oct 2 19:47:58.749410 env[1461]: 2023-10-02 19:47:58.647 [INFO][4834] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.0-a-b66ea99ec2" Oct 2 19:47:58.749410 env[1461]: 2023-10-02 19:47:58.651 [INFO][4834] ipam.go 489: Trying affinity for 192.168.76.128/26 host="ci-3510.3.0-a-b66ea99ec2" Oct 2 19:47:58.749410 env[1461]: 2023-10-02 19:47:58.653 [INFO][4834] ipam.go 155: Attempting to load block cidr=192.168.76.128/26 host="ci-3510.3.0-a-b66ea99ec2" Oct 2 19:47:58.749410 env[1461]: 2023-10-02 19:47:58.655 [INFO][4834] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.76.128/26 host="ci-3510.3.0-a-b66ea99ec2" Oct 2 19:47:58.749410 env[1461]: 2023-10-02 19:47:58.655 [INFO][4834] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.76.128/26 handle="k8s-pod-network.2ae08ec5e2703c1e64cfbbba8b6be6ea337f5c38a5e7200dc36d419d5d7bad88" host="ci-3510.3.0-a-b66ea99ec2" Oct 2 19:47:58.749410 env[1461]: 2023-10-02 19:47:58.657 [INFO][4834] ipam.go 1682: Creating new handle: k8s-pod-network.2ae08ec5e2703c1e64cfbbba8b6be6ea337f5c38a5e7200dc36d419d5d7bad88 Oct 2 19:47:58.749410 env[1461]: 2023-10-02 19:47:58.660 [INFO][4834] ipam.go 1203: Writing block in order to claim IPs block=192.168.76.128/26 handle="k8s-pod-network.2ae08ec5e2703c1e64cfbbba8b6be6ea337f5c38a5e7200dc36d419d5d7bad88" host="ci-3510.3.0-a-b66ea99ec2" Oct 2 19:47:58.749410 env[1461]: 2023-10-02 19:47:58.665 [INFO][4834] ipam.go 1216: Successfully claimed IPs: [192.168.76.132/26] block=192.168.76.128/26 handle="k8s-pod-network.2ae08ec5e2703c1e64cfbbba8b6be6ea337f5c38a5e7200dc36d419d5d7bad88" host="ci-3510.3.0-a-b66ea99ec2" Oct 2 19:47:58.749410 env[1461]: 2023-10-02 19:47:58.665 [INFO][4834] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.76.132/26] handle="k8s-pod-network.2ae08ec5e2703c1e64cfbbba8b6be6ea337f5c38a5e7200dc36d419d5d7bad88" host="ci-3510.3.0-a-b66ea99ec2" Oct 2 19:47:58.749410 env[1461]: time="2023-10-02T19:47:58Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:47:58.749410 env[1461]: 2023-10-02 19:47:58.665 [INFO][4834] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.76.132/26] IPv6=[] ContainerID="2ae08ec5e2703c1e64cfbbba8b6be6ea337f5c38a5e7200dc36d419d5d7bad88" HandleID="k8s-pod-network.2ae08ec5e2703c1e64cfbbba8b6be6ea337f5c38a5e7200dc36d419d5d7bad88" Workload="ci--3510.3.0--a--b66ea99ec2-k8s-coredns--787d4945fb--p6twp-eth0" Oct 2 19:47:58.749846 env[1461]: 2023-10-02 19:47:58.667 [INFO][4810] k8s.go 383: Populated endpoint ContainerID="2ae08ec5e2703c1e64cfbbba8b6be6ea337f5c38a5e7200dc36d419d5d7bad88" Namespace="kube-system" Pod="coredns-787d4945fb-p6twp" WorkloadEndpoint="ci--3510.3.0--a--b66ea99ec2-k8s-coredns--787d4945fb--p6twp-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--b66ea99ec2-k8s-coredns--787d4945fb--p6twp-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"365d9e2c-338a-4964-844b-392b2e4962e8", ResourceVersion:"692", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 47, 23, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-b66ea99ec2", ContainerID:"", Pod:"coredns-787d4945fb-p6twp", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.76.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali3d72f50ed48", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:47:58.749846 env[1461]: 2023-10-02 19:47:58.667 [INFO][4810] k8s.go 384: Calico CNI using IPs: [192.168.76.132/32] ContainerID="2ae08ec5e2703c1e64cfbbba8b6be6ea337f5c38a5e7200dc36d419d5d7bad88" Namespace="kube-system" Pod="coredns-787d4945fb-p6twp" WorkloadEndpoint="ci--3510.3.0--a--b66ea99ec2-k8s-coredns--787d4945fb--p6twp-eth0" Oct 2 19:47:58.749846 env[1461]: 2023-10-02 19:47:58.667 [INFO][4810] dataplane_linux.go 68: Setting the host side veth name to cali3d72f50ed48 ContainerID="2ae08ec5e2703c1e64cfbbba8b6be6ea337f5c38a5e7200dc36d419d5d7bad88" Namespace="kube-system" Pod="coredns-787d4945fb-p6twp" WorkloadEndpoint="ci--3510.3.0--a--b66ea99ec2-k8s-coredns--787d4945fb--p6twp-eth0" Oct 2 19:47:58.749846 env[1461]: 2023-10-02 19:47:58.721 [INFO][4810] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="2ae08ec5e2703c1e64cfbbba8b6be6ea337f5c38a5e7200dc36d419d5d7bad88" Namespace="kube-system" Pod="coredns-787d4945fb-p6twp" WorkloadEndpoint="ci--3510.3.0--a--b66ea99ec2-k8s-coredns--787d4945fb--p6twp-eth0" Oct 2 19:47:58.749846 env[1461]: 2023-10-02 19:47:58.743 [INFO][4810] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="2ae08ec5e2703c1e64cfbbba8b6be6ea337f5c38a5e7200dc36d419d5d7bad88" Namespace="kube-system" Pod="coredns-787d4945fb-p6twp" WorkloadEndpoint="ci--3510.3.0--a--b66ea99ec2-k8s-coredns--787d4945fb--p6twp-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--b66ea99ec2-k8s-coredns--787d4945fb--p6twp-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"365d9e2c-338a-4964-844b-392b2e4962e8", ResourceVersion:"692", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 47, 23, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-b66ea99ec2", ContainerID:"2ae08ec5e2703c1e64cfbbba8b6be6ea337f5c38a5e7200dc36d419d5d7bad88", Pod:"coredns-787d4945fb-p6twp", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.76.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali3d72f50ed48", MAC:"fa:b7:f7:60:70:42", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:47:58.749846 env[1461]: 2023-10-02 19:47:58.748 [INFO][4810] k8s.go 489: Wrote updated endpoint to datastore ContainerID="2ae08ec5e2703c1e64cfbbba8b6be6ea337f5c38a5e7200dc36d419d5d7bad88" Namespace="kube-system" Pod="coredns-787d4945fb-p6twp" WorkloadEndpoint="ci--3510.3.0--a--b66ea99ec2-k8s-coredns--787d4945fb--p6twp-eth0" Oct 2 19:47:58.755224 env[1461]: time="2023-10-02T19:47:58.755189344Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:47:58.755224 env[1461]: time="2023-10-02T19:47:58.755211126Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:47:58.755224 env[1461]: time="2023-10-02T19:47:58.755218093Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:47:58.753000 audit[4871]: NETFILTER_CFG table=filter:120 family=2 entries=38 op=nft_register_chain pid=4871 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:47:58.753000 audit[4871]: SYSCALL arch=c000003e syscall=46 success=yes exit=19088 a0=3 a1=7ffecd1e2f50 a2=0 a3=7ffecd1e2f3c items=0 ppid=3939 pid=4871 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:58.753000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:47:58.755476 env[1461]: time="2023-10-02T19:47:58.755278002Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2ae08ec5e2703c1e64cfbbba8b6be6ea337f5c38a5e7200dc36d419d5d7bad88 pid=4873 runtime=io.containerd.runc.v2 Oct 2 19:47:58.774426 systemd[1]: Started cri-containerd-2ae08ec5e2703c1e64cfbbba8b6be6ea337f5c38a5e7200dc36d419d5d7bad88.scope. Oct 2 19:47:58.778000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:58.778000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:58.778000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:58.778000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:58.778000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:58.778000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:58.778000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:58.778000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:58.778000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:58.778000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:58.778000 audit: BPF prog-id=168 op=LOAD Oct 2 19:47:58.778000 audit[4883]: AVC avc: denied { bpf } for pid=4883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:58.778000 audit[4883]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=4873 pid=4883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:58.778000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261653038656335653237303363316536346366626262613862366265 Oct 2 19:47:58.778000 audit[4883]: AVC avc: denied { perfmon } for pid=4883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:58.778000 audit[4883]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=4873 pid=4883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:58.778000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261653038656335653237303363316536346366626262613862366265 Oct 2 19:47:58.778000 audit[4883]: AVC avc: denied { bpf } for pid=4883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:58.778000 audit[4883]: AVC avc: denied { bpf } for pid=4883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:58.778000 audit[4883]: AVC avc: denied { bpf } for pid=4883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:58.778000 audit[4883]: AVC avc: denied { perfmon } for pid=4883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:58.778000 audit[4883]: AVC avc: denied { perfmon } for pid=4883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:58.778000 audit[4883]: AVC avc: denied { perfmon } for pid=4883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:58.778000 audit[4883]: AVC avc: denied { perfmon } for pid=4883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:58.778000 audit[4883]: AVC avc: denied { perfmon } for pid=4883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:58.778000 audit[4883]: AVC avc: denied { bpf } for pid=4883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:58.778000 audit[4883]: AVC avc: denied { bpf } for pid=4883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:58.778000 audit: BPF prog-id=169 op=LOAD Oct 2 19:47:58.778000 audit[4883]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c00024a8b0 items=0 ppid=4873 pid=4883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:58.778000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261653038656335653237303363316536346366626262613862366265 Oct 2 19:47:58.779000 audit[4883]: AVC avc: denied { bpf } for pid=4883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:58.779000 audit[4883]: AVC avc: denied { bpf } for pid=4883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:58.779000 audit[4883]: AVC avc: denied { perfmon } for pid=4883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:58.779000 audit[4883]: AVC avc: denied { perfmon } for pid=4883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:58.779000 audit[4883]: AVC avc: denied { perfmon } for pid=4883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:58.779000 audit[4883]: AVC avc: denied { perfmon } for pid=4883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:58.779000 audit[4883]: AVC avc: denied { perfmon } for pid=4883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:58.779000 audit[4883]: AVC avc: denied { bpf } for pid=4883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:58.779000 audit[4883]: AVC avc: denied { bpf } for pid=4883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:58.779000 audit: BPF prog-id=170 op=LOAD Oct 2 19:47:58.779000 audit[4883]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c00024a8f8 items=0 ppid=4873 pid=4883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:58.779000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261653038656335653237303363316536346366626262613862366265 Oct 2 19:47:58.779000 audit: BPF prog-id=170 op=UNLOAD Oct 2 19:47:58.779000 audit: BPF prog-id=169 op=UNLOAD Oct 2 19:47:58.779000 audit[4883]: AVC avc: denied { bpf } for pid=4883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:58.779000 audit[4883]: AVC avc: denied { bpf } for pid=4883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:58.779000 audit[4883]: AVC avc: denied { bpf } for pid=4883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:58.779000 audit[4883]: AVC avc: denied { perfmon } for pid=4883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:58.779000 audit[4883]: AVC avc: denied { perfmon } for pid=4883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:58.779000 audit[4883]: AVC avc: denied { perfmon } for pid=4883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:58.779000 audit[4883]: AVC avc: denied { perfmon } for pid=4883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:58.779000 audit[4883]: AVC avc: denied { perfmon } for pid=4883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:58.779000 audit[4883]: AVC avc: denied { bpf } for pid=4883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:58.779000 audit[4883]: AVC avc: denied { bpf } for pid=4883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:58.779000 audit: BPF prog-id=171 op=LOAD Oct 2 19:47:58.779000 audit[4883]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c00024ad08 items=0 ppid=4873 pid=4883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:58.779000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261653038656335653237303363316536346366626262613862366265 Oct 2 19:47:58.811486 env[1461]: time="2023-10-02T19:47:58.811430463Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-p6twp,Uid:365d9e2c-338a-4964-844b-392b2e4962e8,Namespace:kube-system,Attempt:1,} returns sandbox id \"2ae08ec5e2703c1e64cfbbba8b6be6ea337f5c38a5e7200dc36d419d5d7bad88\"" Oct 2 19:47:58.812901 env[1461]: time="2023-10-02T19:47:58.812856317Z" level=info msg="CreateContainer within sandbox \"2ae08ec5e2703c1e64cfbbba8b6be6ea337f5c38a5e7200dc36d419d5d7bad88\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Oct 2 19:47:58.817407 env[1461]: time="2023-10-02T19:47:58.817363065Z" level=info msg="CreateContainer within sandbox \"2ae08ec5e2703c1e64cfbbba8b6be6ea337f5c38a5e7200dc36d419d5d7bad88\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"a2a358285bb247367d46f7f0901c531cab4217bb60916abbc37e34fff4142b45\"" Oct 2 19:47:58.817734 env[1461]: time="2023-10-02T19:47:58.817684079Z" level=info msg="StartContainer for \"a2a358285bb247367d46f7f0901c531cab4217bb60916abbc37e34fff4142b45\"" Oct 2 19:47:58.828512 systemd[1]: Started cri-containerd-a2a358285bb247367d46f7f0901c531cab4217bb60916abbc37e34fff4142b45.scope. Oct 2 19:47:58.836000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:58.836000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:58.836000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:58.836000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:58.836000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:58.836000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:58.836000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:58.836000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:58.836000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:58.836000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:58.836000 audit: BPF prog-id=172 op=LOAD Oct 2 19:47:58.837000 audit[4912]: AVC avc: denied { bpf } for pid=4912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:58.837000 audit[4912]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000149c48 a2=10 a3=1c items=0 ppid=4873 pid=4912 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:58.837000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132613335383238356262323437333637643436663766303930316335 Oct 2 19:47:58.837000 audit[4912]: AVC avc: denied { perfmon } for pid=4912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:58.837000 audit[4912]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001496b0 a2=3c a3=c items=0 ppid=4873 pid=4912 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:58.837000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132613335383238356262323437333637643436663766303930316335 Oct 2 19:47:58.837000 audit[4912]: AVC avc: denied { bpf } for pid=4912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:58.837000 audit[4912]: AVC avc: denied { bpf } for pid=4912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:58.837000 audit[4912]: AVC avc: denied { bpf } for pid=4912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:58.837000 audit[4912]: AVC avc: denied { perfmon } for pid=4912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:58.837000 audit[4912]: AVC avc: denied { perfmon } for pid=4912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:58.837000 audit[4912]: AVC avc: denied { perfmon } for pid=4912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:58.837000 audit[4912]: AVC avc: denied { perfmon } for pid=4912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:58.837000 audit[4912]: AVC avc: denied { perfmon } for pid=4912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:58.837000 audit[4912]: AVC avc: denied { bpf } for pid=4912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:58.837000 audit[4912]: AVC avc: denied { bpf } for pid=4912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:58.837000 audit: BPF prog-id=173 op=LOAD Oct 2 19:47:58.837000 audit[4912]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001499d8 a2=78 a3=c000305500 items=0 ppid=4873 pid=4912 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:58.837000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132613335383238356262323437333637643436663766303930316335 Oct 2 19:47:58.837000 audit[4912]: AVC avc: denied { bpf } for pid=4912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:58.837000 audit[4912]: AVC avc: denied { bpf } for pid=4912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:58.837000 audit[4912]: AVC avc: denied { perfmon } for pid=4912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:58.837000 audit[4912]: AVC avc: denied { perfmon } for pid=4912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:58.837000 audit[4912]: AVC avc: denied { perfmon } for pid=4912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:58.837000 audit[4912]: AVC avc: denied { perfmon } for pid=4912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:58.837000 audit[4912]: AVC avc: denied { perfmon } for pid=4912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:58.837000 audit[4912]: AVC avc: denied { bpf } for pid=4912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:58.837000 audit[4912]: AVC avc: denied { bpf } for pid=4912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:58.837000 audit: BPF prog-id=174 op=LOAD Oct 2 19:47:58.837000 audit[4912]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000149770 a2=78 a3=c000305548 items=0 ppid=4873 pid=4912 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:58.837000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132613335383238356262323437333637643436663766303930316335 Oct 2 19:47:58.837000 audit: BPF prog-id=174 op=UNLOAD Oct 2 19:47:58.837000 audit: BPF prog-id=173 op=UNLOAD Oct 2 19:47:58.837000 audit[4912]: AVC avc: denied { bpf } for pid=4912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:58.837000 audit[4912]: AVC avc: denied { bpf } for pid=4912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:58.837000 audit[4912]: AVC avc: denied { bpf } for pid=4912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:58.837000 audit[4912]: AVC avc: denied { perfmon } for pid=4912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:58.837000 audit[4912]: AVC avc: denied { perfmon } for pid=4912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:58.837000 audit[4912]: AVC avc: denied { perfmon } for pid=4912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:58.837000 audit[4912]: AVC avc: denied { perfmon } for pid=4912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:58.837000 audit[4912]: AVC avc: denied { perfmon } for pid=4912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:58.837000 audit[4912]: AVC avc: denied { bpf } for pid=4912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:58.837000 audit[4912]: AVC avc: denied { bpf } for pid=4912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:47:58.837000 audit: BPF prog-id=175 op=LOAD Oct 2 19:47:58.837000 audit[4912]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000149c30 a2=78 a3=c000305958 items=0 ppid=4873 pid=4912 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:58.837000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132613335383238356262323437333637643436663766303930316335 Oct 2 19:47:58.864712 env[1461]: time="2023-10-02T19:47:58.864615602Z" level=info msg="StartContainer for \"a2a358285bb247367d46f7f0901c531cab4217bb60916abbc37e34fff4142b45\" returns successfully" Oct 2 19:47:59.640543 kubelet[2613]: I1002 19:47:59.640509 2613 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-787d4945fb-p6twp" podStartSLOduration=36.640464723 pod.CreationTimestamp="2023-10-02 19:47:23 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 19:47:59.640146575 +0000 UTC m=+51.241902614" watchObservedRunningTime="2023-10-02 19:47:59.640464723 +0000 UTC m=+51.242220752" Oct 2 19:47:59.680000 audit[5017]: NETFILTER_CFG table=filter:121 family=2 entries=6 op=nft_register_rule pid=5017 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:47:59.680000 audit[5017]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffebfe3bef0 a2=0 a3=7ffebfe3bedc items=0 ppid=2915 pid=5017 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:59.680000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:47:59.681000 audit[5017]: NETFILTER_CFG table=nat:122 family=2 entries=60 op=nft_register_rule pid=5017 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:47:59.681000 audit[5017]: SYSCALL arch=c000003e syscall=46 success=yes exit=19324 a0=3 a1=7ffebfe3bef0 a2=0 a3=7ffebfe3bedc items=0 ppid=2915 pid=5017 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:47:59.681000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:48:00.041496 systemd-networkd[1274]: cali3d72f50ed48: Gained IPv6LL Oct 2 19:48:00.104849 env[1461]: time="2023-10-02T19:48:00.104799273Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:48:00.105454 env[1461]: time="2023-10-02T19:48:00.105409718Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5e785d005ccc1ab22527a783835cf2741f6f5f385a8956144c661f8c23ae9d78,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:48:00.106751 env[1461]: time="2023-10-02T19:48:00.106711561Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:48:00.107583 env[1461]: time="2023-10-02T19:48:00.107548344Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:b764feb1777655aabce5988324b69b412d23e087436ee2414dff893a158fcdef,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 19:48:00.108478 env[1461]: time="2023-10-02T19:48:00.108437426Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.25.0\" returns image reference \"sha256:5e785d005ccc1ab22527a783835cf2741f6f5f385a8956144c661f8c23ae9d78\"" Oct 2 19:48:00.108947 env[1461]: time="2023-10-02T19:48:00.108909209Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\"" Oct 2 19:48:00.109641 env[1461]: time="2023-10-02T19:48:00.109604130Z" level=info msg="CreateContainer within sandbox \"25c271726f2b4c39dacd577293b2288b445be6fec217fc7f5924528f99b4642f\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Oct 2 19:48:00.113995 env[1461]: time="2023-10-02T19:48:00.113946785Z" level=info msg="CreateContainer within sandbox \"25c271726f2b4c39dacd577293b2288b445be6fec217fc7f5924528f99b4642f\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"2eeb0d632b93be3618e81c4160b48c1f1995c0fd4925d61f95f59f8943b31420\"" Oct 2 19:48:00.114213 env[1461]: time="2023-10-02T19:48:00.114202576Z" level=info msg="StartContainer for \"2eeb0d632b93be3618e81c4160b48c1f1995c0fd4925d61f95f59f8943b31420\"" Oct 2 19:48:00.135850 systemd[1]: Started cri-containerd-2eeb0d632b93be3618e81c4160b48c1f1995c0fd4925d61f95f59f8943b31420.scope. Oct 2 19:48:00.140000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:48:00.140000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:48:00.140000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:48:00.140000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:48:00.140000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:48:00.140000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:48:00.140000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:48:00.140000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:48:00.140000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:48:00.140000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:48:00.140000 audit: BPF prog-id=176 op=LOAD Oct 2 19:48:00.140000 audit[5027]: AVC avc: denied { bpf } for pid=5027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:48:00.140000 audit[5027]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4635 pid=5027 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:48:00.140000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265656230643633326239336265333631386538316334313630623438 Oct 2 19:48:00.140000 audit[5027]: AVC avc: denied { perfmon } for pid=5027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:48:00.140000 audit[5027]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=4635 pid=5027 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:48:00.140000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265656230643633326239336265333631386538316334313630623438 Oct 2 19:48:00.140000 audit[5027]: AVC avc: denied { bpf } for pid=5027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:48:00.140000 audit[5027]: AVC avc: denied { bpf } for pid=5027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:48:00.140000 audit[5027]: AVC avc: denied { bpf } for pid=5027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:48:00.140000 audit[5027]: AVC avc: denied { perfmon } for pid=5027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:48:00.140000 audit[5027]: AVC avc: denied { perfmon } for pid=5027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:48:00.140000 audit[5027]: AVC avc: denied { perfmon } for pid=5027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:48:00.140000 audit[5027]: AVC avc: denied { perfmon } for pid=5027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:48:00.140000 audit[5027]: AVC avc: denied { perfmon } for pid=5027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:48:00.140000 audit[5027]: AVC avc: denied { bpf } for pid=5027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:48:00.140000 audit[5027]: AVC avc: denied { bpf } for pid=5027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:48:00.140000 audit: BPF prog-id=177 op=LOAD Oct 2 19:48:00.140000 audit[5027]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0002fcc00 items=0 ppid=4635 pid=5027 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:48:00.140000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265656230643633326239336265333631386538316334313630623438 Oct 2 19:48:00.141000 audit[5027]: AVC avc: denied { bpf } for pid=5027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:48:00.141000 audit[5027]: AVC avc: denied { bpf } for pid=5027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:48:00.141000 audit[5027]: AVC avc: denied { perfmon } for pid=5027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:48:00.141000 audit[5027]: AVC avc: denied { perfmon } for pid=5027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:48:00.141000 audit[5027]: AVC avc: denied { perfmon } for pid=5027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:48:00.141000 audit[5027]: AVC avc: denied { perfmon } for pid=5027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:48:00.141000 audit[5027]: AVC avc: denied { perfmon } for pid=5027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:48:00.141000 audit[5027]: AVC avc: denied { bpf } for pid=5027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:48:00.141000 audit[5027]: AVC avc: denied { bpf } for pid=5027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:48:00.141000 audit: BPF prog-id=178 op=LOAD Oct 2 19:48:00.141000 audit[5027]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0002fcc48 items=0 ppid=4635 pid=5027 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:48:00.141000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265656230643633326239336265333631386538316334313630623438 Oct 2 19:48:00.141000 audit: BPF prog-id=178 op=UNLOAD Oct 2 19:48:00.141000 audit: BPF prog-id=177 op=UNLOAD Oct 2 19:48:00.141000 audit[5027]: AVC avc: denied { bpf } for pid=5027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:48:00.141000 audit[5027]: AVC avc: denied { bpf } for pid=5027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:48:00.141000 audit[5027]: AVC avc: denied { bpf } for pid=5027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:48:00.141000 audit[5027]: AVC avc: denied { perfmon } for pid=5027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:48:00.141000 audit[5027]: AVC avc: denied { perfmon } for pid=5027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:48:00.141000 audit[5027]: AVC avc: denied { perfmon } for pid=5027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:48:00.141000 audit[5027]: AVC avc: denied { perfmon } for pid=5027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:48:00.141000 audit[5027]: AVC avc: denied { perfmon } for pid=5027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:48:00.141000 audit[5027]: AVC avc: denied { bpf } for pid=5027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:48:00.141000 audit[5027]: AVC avc: denied { bpf } for pid=5027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:48:00.141000 audit: BPF prog-id=179 op=LOAD Oct 2 19:48:00.141000 audit[5027]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0002fd058 items=0 ppid=4635 pid=5027 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:48:00.141000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265656230643633326239336265333631386538316334313630623438 Oct 2 19:48:00.167940 env[1461]: time="2023-10-02T19:48:00.167843848Z" level=info msg="StartContainer for \"2eeb0d632b93be3618e81c4160b48c1f1995c0fd4925d61f95f59f8943b31420\" returns successfully" Oct 2 19:48:00.354296 env[1461]: time="2023-10-02T19:48:00.354070513Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:48:00.355164 env[1461]: time="2023-10-02T19:48:00.355051926Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:48:00.355579 kubelet[2613]: E1002 19:48:00.355528 2613 remote_image.go:171] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 19:48:00.355813 kubelet[2613]: E1002 19:48:00.355619 2613 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 19:48:00.356029 kubelet[2613]: E1002 19:48:00.355842 2613 kuberuntime_manager.go:872] container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.25.0,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:etccalico,ReadOnly:false,MountPath:/etc/calico,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,},VolumeMount{Name:kube-api-access-d9v5h,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod csi-node-driver-l8hvh_calico-system(ebb11106-5253-488c-9095-50c2b68f321c): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/csi:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/csi:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:48:00.357530 env[1461]: time="2023-10-02T19:48:00.357465773Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\"" Oct 2 19:48:00.601099 env[1461]: time="2023-10-02T19:48:00.600955807Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:48:00.601997 env[1461]: time="2023-10-02T19:48:00.601881762Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:48:00.602474 kubelet[2613]: E1002 19:48:00.602430 2613 remote_image.go:171] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 19:48:00.602657 kubelet[2613]: E1002 19:48:00.602521 2613 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 19:48:00.602907 kubelet[2613]: E1002 19:48:00.602871 2613 kuberuntime_manager.go:872] container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-d9v5h,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod csi-node-driver-l8hvh_calico-system(ebb11106-5253-488c-9095-50c2b68f321c): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:48:00.603244 kubelet[2613]: E1002 19:48:00.603048 2613 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/csi-node-driver-l8hvh" podUID=ebb11106-5253-488c-9095-50c2b68f321c Oct 2 19:48:00.643158 kubelet[2613]: E1002 19:48:00.643002 2613 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-l8hvh" podUID=ebb11106-5253-488c-9095-50c2b68f321c Oct 2 19:48:00.683067 kubelet[2613]: I1002 19:48:00.682997 2613 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-69c848ddc6-qqrrz" podStartSLOduration=-9.223372005171915e+09 pod.CreationTimestamp="2023-10-02 19:47:29 +0000 UTC" firstStartedPulling="2023-10-02 19:47:56.772245971 +0000 UTC m=+48.374001994" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 19:48:00.681361119 +0000 UTC m=+52.283117262" watchObservedRunningTime="2023-10-02 19:48:00.682861004 +0000 UTC m=+52.284617090" Oct 2 19:48:00.743000 audit[5114]: NETFILTER_CFG table=filter:123 family=2 entries=6 op=nft_register_rule pid=5114 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:48:00.769566 kernel: kauditd_printk_skb: 419 callbacks suppressed Oct 2 19:48:00.769634 kernel: audit: type=1325 audit(1696276080.743:1327): table=filter:123 family=2 entries=6 op=nft_register_rule pid=5114 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:48:00.743000 audit[5114]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffda19d9490 a2=0 a3=7ffda19d947c items=0 ppid=2915 pid=5114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:48:00.916979 kernel: audit: type=1300 audit(1696276080.743:1327): arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffda19d9490 a2=0 a3=7ffda19d947c items=0 ppid=2915 pid=5114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:48:00.917021 kernel: audit: type=1327 audit(1696276080.743:1327): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:48:00.743000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:48:00.970000 audit[5114]: NETFILTER_CFG table=nat:124 family=2 entries=72 op=nft_register_chain pid=5114 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:48:00.970000 audit[5114]: SYSCALL arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7ffda19d9490 a2=0 a3=7ffda19d947c items=0 ppid=2915 pid=5114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:48:01.120955 kernel: audit: type=1325 audit(1696276080.970:1328): table=nat:124 family=2 entries=72 op=nft_register_chain pid=5114 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:48:01.120987 kernel: audit: type=1300 audit(1696276080.970:1328): arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7ffda19d9490 a2=0 a3=7ffda19d947c items=0 ppid=2915 pid=5114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:48:01.121004 kernel: audit: type=1327 audit(1696276080.970:1328): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:48:00.970000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:48:03.486293 kubelet[2613]: I1002 19:48:03.486266 2613 topology_manager.go:210] "Topology Admit Handler" Oct 2 19:48:03.490425 systemd[1]: Created slice kubepods-besteffort-pod310b30f1_9833_4562_98cb_ec9154e42258.slice. Oct 2 19:48:03.491998 kubelet[2613]: I1002 19:48:03.491979 2613 topology_manager.go:210] "Topology Admit Handler" Oct 2 19:48:03.496770 systemd[1]: Created slice kubepods-besteffort-pod1c17f6ed_b372_41fa_b684_1123dfeeec16.slice. Oct 2 19:48:03.496000 audit[5147]: NETFILTER_CFG table=filter:125 family=2 entries=7 op=nft_register_rule pid=5147 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:48:03.496000 audit[5147]: SYSCALL arch=c000003e syscall=46 success=yes exit=2620 a0=3 a1=7ffe5c461490 a2=0 a3=7ffe5c46147c items=0 ppid=2915 pid=5147 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:48:03.592772 kubelet[2613]: I1002 19:48:03.592721 2613 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/310b30f1-9833-4562-98cb-ec9154e42258-calico-apiserver-certs\") pod \"calico-apiserver-6955b54ffb-9s99f\" (UID: \"310b30f1-9833-4562-98cb-ec9154e42258\") " pod="calico-apiserver/calico-apiserver-6955b54ffb-9s99f" Oct 2 19:48:03.592772 kubelet[2613]: I1002 19:48:03.592759 2613 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/1c17f6ed-b372-41fa-b684-1123dfeeec16-calico-apiserver-certs\") pod \"calico-apiserver-6955b54ffb-xptd5\" (UID: \"1c17f6ed-b372-41fa-b684-1123dfeeec16\") " pod="calico-apiserver/calico-apiserver-6955b54ffb-xptd5" Oct 2 19:48:03.592905 kubelet[2613]: I1002 19:48:03.592783 2613 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-tz6nf\" (UniqueName: \"kubernetes.io/projected/310b30f1-9833-4562-98cb-ec9154e42258-kube-api-access-tz6nf\") pod \"calico-apiserver-6955b54ffb-9s99f\" (UID: \"310b30f1-9833-4562-98cb-ec9154e42258\") " pod="calico-apiserver/calico-apiserver-6955b54ffb-9s99f" Oct 2 19:48:03.592905 kubelet[2613]: I1002 19:48:03.592839 2613 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-26bxm\" (UniqueName: \"kubernetes.io/projected/1c17f6ed-b372-41fa-b684-1123dfeeec16-kube-api-access-26bxm\") pod \"calico-apiserver-6955b54ffb-xptd5\" (UID: \"1c17f6ed-b372-41fa-b684-1123dfeeec16\") " pod="calico-apiserver/calico-apiserver-6955b54ffb-xptd5" Oct 2 19:48:03.646736 kernel: audit: type=1325 audit(1696276083.496:1329): table=filter:125 family=2 entries=7 op=nft_register_rule pid=5147 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:48:03.646795 kernel: audit: type=1300 audit(1696276083.496:1329): arch=c000003e syscall=46 success=yes exit=2620 a0=3 a1=7ffe5c461490 a2=0 a3=7ffe5c46147c items=0 ppid=2915 pid=5147 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:48:03.496000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:48:03.703060 kernel: audit: type=1327 audit(1696276083.496:1329): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:48:03.498000 audit[5147]: NETFILTER_CFG table=nat:126 family=2 entries=78 op=nft_register_rule pid=5147 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:48:03.498000 audit[5147]: SYSCALL arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7ffe5c461490 a2=0 a3=7ffe5c46147c items=0 ppid=2915 pid=5147 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:48:03.498000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:48:03.764354 kernel: audit: type=1325 audit(1696276083.498:1330): table=nat:126 family=2 entries=78 op=nft_register_rule pid=5147 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:48:03.724000 audit[5177]: NETFILTER_CFG table=filter:127 family=2 entries=8 op=nft_register_rule pid=5177 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:48:03.724000 audit[5177]: SYSCALL arch=c000003e syscall=46 success=yes exit=2620 a0=3 a1=7ffcb455eb40 a2=0 a3=7ffcb455eb2c items=0 ppid=2915 pid=5177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:48:03.724000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:48:03.773000 audit[5177]: NETFILTER_CFG table=nat:128 family=2 entries=78 op=nft_register_rule pid=5177 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:48:03.773000 audit[5177]: SYSCALL arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7ffcb455eb40 a2=0 a3=7ffcb455eb2c items=0 ppid=2915 pid=5177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:48:03.773000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:48:03.792993 env[1461]: time="2023-10-02T19:48:03.792974936Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6955b54ffb-9s99f,Uid:310b30f1-9833-4562-98cb-ec9154e42258,Namespace:calico-apiserver,Attempt:0,}" Oct 2 19:48:03.798511 env[1461]: time="2023-10-02T19:48:03.798479364Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6955b54ffb-xptd5,Uid:1c17f6ed-b372-41fa-b684-1123dfeeec16,Namespace:calico-apiserver,Attempt:0,}" Oct 2 19:48:03.903956 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Oct 2 19:48:03.904035 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calia8a7c9cbd38: link becomes ready Oct 2 19:48:03.918878 systemd-networkd[1274]: calia8a7c9cbd38: Link UP Oct 2 19:48:03.918882 systemd-networkd[1274]: calia8a7c9cbd38: Gained carrier Oct 2 19:48:03.923684 env[1461]: 2023-10-02 19:48:03.813 [INFO][5179] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.0--a--b66ea99ec2-k8s-calico--apiserver--6955b54ffb--9s99f-eth0 calico-apiserver-6955b54ffb- calico-apiserver 310b30f1-9833-4562-98cb-ec9154e42258 783 0 2023-10-02 19:48:03 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:6955b54ffb projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510.3.0-a-b66ea99ec2 calico-apiserver-6955b54ffb-9s99f eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calia8a7c9cbd38 [] []}} ContainerID="6f47871819c9d71698a1fb58ea934db42695ce79795c363f2c372fe0a967411b" Namespace="calico-apiserver" Pod="calico-apiserver-6955b54ffb-9s99f" WorkloadEndpoint="ci--3510.3.0--a--b66ea99ec2-k8s-calico--apiserver--6955b54ffb--9s99f-" Oct 2 19:48:03.923684 env[1461]: 2023-10-02 19:48:03.813 [INFO][5179] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="6f47871819c9d71698a1fb58ea934db42695ce79795c363f2c372fe0a967411b" Namespace="calico-apiserver" Pod="calico-apiserver-6955b54ffb-9s99f" WorkloadEndpoint="ci--3510.3.0--a--b66ea99ec2-k8s-calico--apiserver--6955b54ffb--9s99f-eth0" Oct 2 19:48:03.923684 env[1461]: 2023-10-02 19:48:03.827 [INFO][5222] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="6f47871819c9d71698a1fb58ea934db42695ce79795c363f2c372fe0a967411b" HandleID="k8s-pod-network.6f47871819c9d71698a1fb58ea934db42695ce79795c363f2c372fe0a967411b" Workload="ci--3510.3.0--a--b66ea99ec2-k8s-calico--apiserver--6955b54ffb--9s99f-eth0" Oct 2 19:48:03.923684 env[1461]: 2023-10-02 19:48:03.832 [INFO][5222] ipam_plugin.go 269: Auto assigning IP ContainerID="6f47871819c9d71698a1fb58ea934db42695ce79795c363f2c372fe0a967411b" HandleID="k8s-pod-network.6f47871819c9d71698a1fb58ea934db42695ce79795c363f2c372fe0a967411b" Workload="ci--3510.3.0--a--b66ea99ec2-k8s-calico--apiserver--6955b54ffb--9s99f-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00051e0b0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510.3.0-a-b66ea99ec2", "pod":"calico-apiserver-6955b54ffb-9s99f", "timestamp":"2023-10-02 19:48:03.827252009 +0000 UTC"}, Hostname:"ci-3510.3.0-a-b66ea99ec2", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 2 19:48:03.923684 env[1461]: time="2023-10-02T19:48:03Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:48:03.923684 env[1461]: time="2023-10-02T19:48:03Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:48:03.923684 env[1461]: 2023-10-02 19:48:03.832 [INFO][5222] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.0-a-b66ea99ec2' Oct 2 19:48:03.923684 env[1461]: 2023-10-02 19:48:03.833 [INFO][5222] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.6f47871819c9d71698a1fb58ea934db42695ce79795c363f2c372fe0a967411b" host="ci-3510.3.0-a-b66ea99ec2" Oct 2 19:48:03.923684 env[1461]: 2023-10-02 19:48:03.836 [INFO][5222] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.0-a-b66ea99ec2" Oct 2 19:48:03.923684 env[1461]: 2023-10-02 19:48:03.838 [INFO][5222] ipam.go 489: Trying affinity for 192.168.76.128/26 host="ci-3510.3.0-a-b66ea99ec2" Oct 2 19:48:03.923684 env[1461]: 2023-10-02 19:48:03.840 [INFO][5222] ipam.go 155: Attempting to load block cidr=192.168.76.128/26 host="ci-3510.3.0-a-b66ea99ec2" Oct 2 19:48:03.923684 env[1461]: 2023-10-02 19:48:03.841 [INFO][5222] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.76.128/26 host="ci-3510.3.0-a-b66ea99ec2" Oct 2 19:48:03.923684 env[1461]: 2023-10-02 19:48:03.841 [INFO][5222] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.76.128/26 handle="k8s-pod-network.6f47871819c9d71698a1fb58ea934db42695ce79795c363f2c372fe0a967411b" host="ci-3510.3.0-a-b66ea99ec2" Oct 2 19:48:03.923684 env[1461]: 2023-10-02 19:48:03.843 [INFO][5222] ipam.go 1682: Creating new handle: k8s-pod-network.6f47871819c9d71698a1fb58ea934db42695ce79795c363f2c372fe0a967411b Oct 2 19:48:03.923684 env[1461]: 2023-10-02 19:48:03.845 [INFO][5222] ipam.go 1203: Writing block in order to claim IPs block=192.168.76.128/26 handle="k8s-pod-network.6f47871819c9d71698a1fb58ea934db42695ce79795c363f2c372fe0a967411b" host="ci-3510.3.0-a-b66ea99ec2" Oct 2 19:48:03.923684 env[1461]: 2023-10-02 19:48:03.848 [INFO][5222] ipam.go 1216: Successfully claimed IPs: [192.168.76.133/26] block=192.168.76.128/26 handle="k8s-pod-network.6f47871819c9d71698a1fb58ea934db42695ce79795c363f2c372fe0a967411b" host="ci-3510.3.0-a-b66ea99ec2" Oct 2 19:48:03.923684 env[1461]: 2023-10-02 19:48:03.848 [INFO][5222] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.76.133/26] handle="k8s-pod-network.6f47871819c9d71698a1fb58ea934db42695ce79795c363f2c372fe0a967411b" host="ci-3510.3.0-a-b66ea99ec2" Oct 2 19:48:03.923684 env[1461]: time="2023-10-02T19:48:03Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:48:03.923684 env[1461]: 2023-10-02 19:48:03.848 [INFO][5222] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.76.133/26] IPv6=[] ContainerID="6f47871819c9d71698a1fb58ea934db42695ce79795c363f2c372fe0a967411b" HandleID="k8s-pod-network.6f47871819c9d71698a1fb58ea934db42695ce79795c363f2c372fe0a967411b" Workload="ci--3510.3.0--a--b66ea99ec2-k8s-calico--apiserver--6955b54ffb--9s99f-eth0" Oct 2 19:48:03.924159 env[1461]: 2023-10-02 19:48:03.849 [INFO][5179] k8s.go 383: Populated endpoint ContainerID="6f47871819c9d71698a1fb58ea934db42695ce79795c363f2c372fe0a967411b" Namespace="calico-apiserver" Pod="calico-apiserver-6955b54ffb-9s99f" WorkloadEndpoint="ci--3510.3.0--a--b66ea99ec2-k8s-calico--apiserver--6955b54ffb--9s99f-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--b66ea99ec2-k8s-calico--apiserver--6955b54ffb--9s99f-eth0", GenerateName:"calico-apiserver-6955b54ffb-", Namespace:"calico-apiserver", SelfLink:"", UID:"310b30f1-9833-4562-98cb-ec9154e42258", ResourceVersion:"783", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 48, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6955b54ffb", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-b66ea99ec2", ContainerID:"", Pod:"calico-apiserver-6955b54ffb-9s99f", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.76.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calia8a7c9cbd38", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:48:03.924159 env[1461]: 2023-10-02 19:48:03.849 [INFO][5179] k8s.go 384: Calico CNI using IPs: [192.168.76.133/32] ContainerID="6f47871819c9d71698a1fb58ea934db42695ce79795c363f2c372fe0a967411b" Namespace="calico-apiserver" Pod="calico-apiserver-6955b54ffb-9s99f" WorkloadEndpoint="ci--3510.3.0--a--b66ea99ec2-k8s-calico--apiserver--6955b54ffb--9s99f-eth0" Oct 2 19:48:03.924159 env[1461]: 2023-10-02 19:48:03.849 [INFO][5179] dataplane_linux.go 68: Setting the host side veth name to calia8a7c9cbd38 ContainerID="6f47871819c9d71698a1fb58ea934db42695ce79795c363f2c372fe0a967411b" Namespace="calico-apiserver" Pod="calico-apiserver-6955b54ffb-9s99f" WorkloadEndpoint="ci--3510.3.0--a--b66ea99ec2-k8s-calico--apiserver--6955b54ffb--9s99f-eth0" Oct 2 19:48:03.924159 env[1461]: 2023-10-02 19:48:03.904 [INFO][5179] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="6f47871819c9d71698a1fb58ea934db42695ce79795c363f2c372fe0a967411b" Namespace="calico-apiserver" Pod="calico-apiserver-6955b54ffb-9s99f" WorkloadEndpoint="ci--3510.3.0--a--b66ea99ec2-k8s-calico--apiserver--6955b54ffb--9s99f-eth0" Oct 2 19:48:03.924159 env[1461]: 2023-10-02 19:48:03.918 [INFO][5179] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="6f47871819c9d71698a1fb58ea934db42695ce79795c363f2c372fe0a967411b" Namespace="calico-apiserver" Pod="calico-apiserver-6955b54ffb-9s99f" WorkloadEndpoint="ci--3510.3.0--a--b66ea99ec2-k8s-calico--apiserver--6955b54ffb--9s99f-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--b66ea99ec2-k8s-calico--apiserver--6955b54ffb--9s99f-eth0", GenerateName:"calico-apiserver-6955b54ffb-", Namespace:"calico-apiserver", SelfLink:"", UID:"310b30f1-9833-4562-98cb-ec9154e42258", ResourceVersion:"783", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 48, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6955b54ffb", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-b66ea99ec2", ContainerID:"6f47871819c9d71698a1fb58ea934db42695ce79795c363f2c372fe0a967411b", Pod:"calico-apiserver-6955b54ffb-9s99f", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.76.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calia8a7c9cbd38", MAC:"de:02:70:cf:02:ee", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:48:03.924159 env[1461]: 2023-10-02 19:48:03.922 [INFO][5179] k8s.go 489: Wrote updated endpoint to datastore ContainerID="6f47871819c9d71698a1fb58ea934db42695ce79795c363f2c372fe0a967411b" Namespace="calico-apiserver" Pod="calico-apiserver-6955b54ffb-9s99f" WorkloadEndpoint="ci--3510.3.0--a--b66ea99ec2-k8s-calico--apiserver--6955b54ffb--9s99f-eth0" Oct 2 19:48:03.930217 env[1461]: time="2023-10-02T19:48:03.930047987Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:48:03.930217 env[1461]: time="2023-10-02T19:48:03.930083907Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:48:03.930217 env[1461]: time="2023-10-02T19:48:03.930095229Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:48:03.930217 env[1461]: time="2023-10-02T19:48:03.930207280Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/6f47871819c9d71698a1fb58ea934db42695ce79795c363f2c372fe0a967411b pid=5294 runtime=io.containerd.runc.v2 Oct 2 19:48:03.931000 audit[5305]: NETFILTER_CFG table=filter:129 family=2 entries=59 op=nft_register_chain pid=5305 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:48:03.931000 audit[5305]: SYSCALL arch=c000003e syscall=46 success=yes exit=29292 a0=3 a1=7fff0a27ae60 a2=0 a3=7fff0a27ae4c items=0 ppid=3939 pid=5305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:48:03.931000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:48:03.946311 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calid1cf931eab5: link becomes ready Oct 2 19:48:03.948576 systemd[1]: Started cri-containerd-6f47871819c9d71698a1fb58ea934db42695ce79795c363f2c372fe0a967411b.scope. Oct 2 19:48:03.954000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:48:03.954000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:48:03.954000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:48:03.954000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:48:03.954000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:48:03.954000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:48:03.954000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:48:03.954000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:48:03.954000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:48:03.954000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:48:03.954000 audit: BPF prog-id=180 op=LOAD Oct 2 19:48:03.954000 audit[5304]: AVC avc: denied { bpf } for pid=5304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:48:03.954000 audit[5304]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=5294 pid=5304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:48:03.954000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666343738373138313963396437313639386131666235386561393334 Oct 2 19:48:03.954000 audit[5304]: AVC avc: denied { perfmon } for pid=5304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:48:03.954000 audit[5304]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=5294 pid=5304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:48:03.954000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666343738373138313963396437313639386131666235386561393334 Oct 2 19:48:03.954000 audit[5304]: AVC avc: denied { bpf } for pid=5304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:48:03.954000 audit[5304]: AVC avc: denied { bpf } for pid=5304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:48:03.954000 audit[5304]: AVC avc: denied { bpf } for pid=5304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:48:03.954000 audit[5304]: AVC avc: denied { perfmon } for pid=5304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:48:03.954000 audit[5304]: AVC avc: denied { perfmon } for pid=5304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:48:03.954000 audit[5304]: AVC avc: denied { perfmon } for pid=5304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:48:03.954000 audit[5304]: AVC avc: denied { perfmon } for pid=5304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:48:03.954000 audit[5304]: AVC avc: denied { perfmon } for pid=5304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:48:03.954000 audit[5304]: AVC avc: denied { bpf } for pid=5304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:48:03.954000 audit[5304]: AVC avc: denied { bpf } for pid=5304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:48:03.954000 audit: BPF prog-id=181 op=LOAD Oct 2 19:48:03.954000 audit[5304]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0000a95d0 items=0 ppid=5294 pid=5304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:48:03.954000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666343738373138313963396437313639386131666235386561393334 Oct 2 19:48:03.955000 audit[5304]: AVC avc: denied { bpf } for pid=5304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:48:03.955000 audit[5304]: AVC avc: denied { bpf } for pid=5304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:48:03.955000 audit[5304]: AVC avc: denied { perfmon } for pid=5304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:48:03.955000 audit[5304]: AVC avc: denied { perfmon } for pid=5304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:48:03.955000 audit[5304]: AVC avc: denied { perfmon } for pid=5304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:48:03.955000 audit[5304]: AVC avc: denied { perfmon } for pid=5304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:48:03.955000 audit[5304]: AVC avc: denied { perfmon } for pid=5304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:48:03.955000 audit[5304]: AVC avc: denied { bpf } for pid=5304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:48:03.955000 audit[5304]: AVC avc: denied { bpf } for pid=5304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:48:03.955000 audit: BPF prog-id=182 op=LOAD Oct 2 19:48:03.955000 audit[5304]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0000a9618 items=0 ppid=5294 pid=5304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:48:03.955000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666343738373138313963396437313639386131666235386561393334 Oct 2 19:48:03.955000 audit: BPF prog-id=182 op=UNLOAD Oct 2 19:48:03.955000 audit: BPF prog-id=181 op=UNLOAD Oct 2 19:48:03.955000 audit[5304]: AVC avc: denied { bpf } for pid=5304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:48:03.955000 audit[5304]: AVC avc: denied { bpf } for pid=5304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:48:03.955000 audit[5304]: AVC avc: denied { bpf } for pid=5304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:48:03.955000 audit[5304]: AVC avc: denied { perfmon } for pid=5304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:48:03.955000 audit[5304]: AVC avc: denied { perfmon } for pid=5304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:48:03.955000 audit[5304]: AVC avc: denied { perfmon } for pid=5304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:48:03.955000 audit[5304]: AVC avc: denied { perfmon } for pid=5304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:48:03.955000 audit[5304]: AVC avc: denied { perfmon } for pid=5304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:48:03.955000 audit[5304]: AVC avc: denied { bpf } for pid=5304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:48:03.955000 audit[5304]: AVC avc: denied { bpf } for pid=5304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:48:03.955000 audit: BPF prog-id=183 op=LOAD Oct 2 19:48:03.955000 audit[5304]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0000a9a28 items=0 ppid=5294 pid=5304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:48:03.955000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666343738373138313963396437313639386131666235386561393334 Oct 2 19:48:03.958085 systemd-networkd[1274]: calid1cf931eab5: Link UP Oct 2 19:48:03.958089 systemd-networkd[1274]: calid1cf931eab5: Gained carrier Oct 2 19:48:03.962794 env[1461]: 2023-10-02 19:48:03.818 [INFO][5193] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.0--a--b66ea99ec2-k8s-calico--apiserver--6955b54ffb--xptd5-eth0 calico-apiserver-6955b54ffb- calico-apiserver 1c17f6ed-b372-41fa-b684-1123dfeeec16 785 0 2023-10-02 19:48:03 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:6955b54ffb projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510.3.0-a-b66ea99ec2 calico-apiserver-6955b54ffb-xptd5 eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calid1cf931eab5 [] []}} ContainerID="d1905cb1c6f6a25581d448900b1d0a1e667e7f621be15cf0ac8b175fab147dab" Namespace="calico-apiserver" Pod="calico-apiserver-6955b54ffb-xptd5" WorkloadEndpoint="ci--3510.3.0--a--b66ea99ec2-k8s-calico--apiserver--6955b54ffb--xptd5-" Oct 2 19:48:03.962794 env[1461]: 2023-10-02 19:48:03.818 [INFO][5193] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="d1905cb1c6f6a25581d448900b1d0a1e667e7f621be15cf0ac8b175fab147dab" Namespace="calico-apiserver" Pod="calico-apiserver-6955b54ffb-xptd5" WorkloadEndpoint="ci--3510.3.0--a--b66ea99ec2-k8s-calico--apiserver--6955b54ffb--xptd5-eth0" Oct 2 19:48:03.962794 env[1461]: 2023-10-02 19:48:03.831 [INFO][5227] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="d1905cb1c6f6a25581d448900b1d0a1e667e7f621be15cf0ac8b175fab147dab" HandleID="k8s-pod-network.d1905cb1c6f6a25581d448900b1d0a1e667e7f621be15cf0ac8b175fab147dab" Workload="ci--3510.3.0--a--b66ea99ec2-k8s-calico--apiserver--6955b54ffb--xptd5-eth0" Oct 2 19:48:03.962794 env[1461]: 2023-10-02 19:48:03.836 [INFO][5227] ipam_plugin.go 269: Auto assigning IP ContainerID="d1905cb1c6f6a25581d448900b1d0a1e667e7f621be15cf0ac8b175fab147dab" HandleID="k8s-pod-network.d1905cb1c6f6a25581d448900b1d0a1e667e7f621be15cf0ac8b175fab147dab" Workload="ci--3510.3.0--a--b66ea99ec2-k8s-calico--apiserver--6955b54ffb--xptd5-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00014d1e0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510.3.0-a-b66ea99ec2", "pod":"calico-apiserver-6955b54ffb-xptd5", "timestamp":"2023-10-02 19:48:03.831193444 +0000 UTC"}, Hostname:"ci-3510.3.0-a-b66ea99ec2", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 2 19:48:03.962794 env[1461]: time="2023-10-02T19:48:03Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:48:03.962794 env[1461]: time="2023-10-02T19:48:03Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:48:03.962794 env[1461]: 2023-10-02 19:48:03.848 [INFO][5227] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.0-a-b66ea99ec2' Oct 2 19:48:03.962794 env[1461]: 2023-10-02 19:48:03.850 [INFO][5227] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.d1905cb1c6f6a25581d448900b1d0a1e667e7f621be15cf0ac8b175fab147dab" host="ci-3510.3.0-a-b66ea99ec2" Oct 2 19:48:03.962794 env[1461]: 2023-10-02 19:48:03.877 [INFO][5227] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.0-a-b66ea99ec2" Oct 2 19:48:03.962794 env[1461]: 2023-10-02 19:48:03.879 [INFO][5227] ipam.go 489: Trying affinity for 192.168.76.128/26 host="ci-3510.3.0-a-b66ea99ec2" Oct 2 19:48:03.962794 env[1461]: 2023-10-02 19:48:03.881 [INFO][5227] ipam.go 155: Attempting to load block cidr=192.168.76.128/26 host="ci-3510.3.0-a-b66ea99ec2" Oct 2 19:48:03.962794 env[1461]: 2023-10-02 19:48:03.904 [INFO][5227] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.76.128/26 host="ci-3510.3.0-a-b66ea99ec2" Oct 2 19:48:03.962794 env[1461]: 2023-10-02 19:48:03.904 [INFO][5227] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.76.128/26 handle="k8s-pod-network.d1905cb1c6f6a25581d448900b1d0a1e667e7f621be15cf0ac8b175fab147dab" host="ci-3510.3.0-a-b66ea99ec2" Oct 2 19:48:03.962794 env[1461]: 2023-10-02 19:48:03.906 [INFO][5227] ipam.go 1682: Creating new handle: k8s-pod-network.d1905cb1c6f6a25581d448900b1d0a1e667e7f621be15cf0ac8b175fab147dab Oct 2 19:48:03.962794 env[1461]: 2023-10-02 19:48:03.908 [INFO][5227] ipam.go 1203: Writing block in order to claim IPs block=192.168.76.128/26 handle="k8s-pod-network.d1905cb1c6f6a25581d448900b1d0a1e667e7f621be15cf0ac8b175fab147dab" host="ci-3510.3.0-a-b66ea99ec2" Oct 2 19:48:03.962794 env[1461]: 2023-10-02 19:48:03.911 [INFO][5227] ipam.go 1216: Successfully claimed IPs: [192.168.76.134/26] block=192.168.76.128/26 handle="k8s-pod-network.d1905cb1c6f6a25581d448900b1d0a1e667e7f621be15cf0ac8b175fab147dab" host="ci-3510.3.0-a-b66ea99ec2" Oct 2 19:48:03.962794 env[1461]: 2023-10-02 19:48:03.911 [INFO][5227] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.76.134/26] handle="k8s-pod-network.d1905cb1c6f6a25581d448900b1d0a1e667e7f621be15cf0ac8b175fab147dab" host="ci-3510.3.0-a-b66ea99ec2" Oct 2 19:48:03.962794 env[1461]: time="2023-10-02T19:48:03Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:48:03.962794 env[1461]: 2023-10-02 19:48:03.911 [INFO][5227] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.76.134/26] IPv6=[] ContainerID="d1905cb1c6f6a25581d448900b1d0a1e667e7f621be15cf0ac8b175fab147dab" HandleID="k8s-pod-network.d1905cb1c6f6a25581d448900b1d0a1e667e7f621be15cf0ac8b175fab147dab" Workload="ci--3510.3.0--a--b66ea99ec2-k8s-calico--apiserver--6955b54ffb--xptd5-eth0" Oct 2 19:48:03.963291 env[1461]: 2023-10-02 19:48:03.912 [INFO][5193] k8s.go 383: Populated endpoint ContainerID="d1905cb1c6f6a25581d448900b1d0a1e667e7f621be15cf0ac8b175fab147dab" Namespace="calico-apiserver" Pod="calico-apiserver-6955b54ffb-xptd5" WorkloadEndpoint="ci--3510.3.0--a--b66ea99ec2-k8s-calico--apiserver--6955b54ffb--xptd5-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--b66ea99ec2-k8s-calico--apiserver--6955b54ffb--xptd5-eth0", GenerateName:"calico-apiserver-6955b54ffb-", Namespace:"calico-apiserver", SelfLink:"", UID:"1c17f6ed-b372-41fa-b684-1123dfeeec16", ResourceVersion:"785", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 48, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6955b54ffb", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-b66ea99ec2", ContainerID:"", Pod:"calico-apiserver-6955b54ffb-xptd5", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.76.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calid1cf931eab5", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:48:03.963291 env[1461]: 2023-10-02 19:48:03.912 [INFO][5193] k8s.go 384: Calico CNI using IPs: [192.168.76.134/32] ContainerID="d1905cb1c6f6a25581d448900b1d0a1e667e7f621be15cf0ac8b175fab147dab" Namespace="calico-apiserver" Pod="calico-apiserver-6955b54ffb-xptd5" WorkloadEndpoint="ci--3510.3.0--a--b66ea99ec2-k8s-calico--apiserver--6955b54ffb--xptd5-eth0" Oct 2 19:48:03.963291 env[1461]: 2023-10-02 19:48:03.912 [INFO][5193] dataplane_linux.go 68: Setting the host side veth name to calid1cf931eab5 ContainerID="d1905cb1c6f6a25581d448900b1d0a1e667e7f621be15cf0ac8b175fab147dab" Namespace="calico-apiserver" Pod="calico-apiserver-6955b54ffb-xptd5" WorkloadEndpoint="ci--3510.3.0--a--b66ea99ec2-k8s-calico--apiserver--6955b54ffb--xptd5-eth0" Oct 2 19:48:03.963291 env[1461]: 2023-10-02 19:48:03.945 [INFO][5193] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="d1905cb1c6f6a25581d448900b1d0a1e667e7f621be15cf0ac8b175fab147dab" Namespace="calico-apiserver" Pod="calico-apiserver-6955b54ffb-xptd5" WorkloadEndpoint="ci--3510.3.0--a--b66ea99ec2-k8s-calico--apiserver--6955b54ffb--xptd5-eth0" Oct 2 19:48:03.963291 env[1461]: 2023-10-02 19:48:03.957 [INFO][5193] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="d1905cb1c6f6a25581d448900b1d0a1e667e7f621be15cf0ac8b175fab147dab" Namespace="calico-apiserver" Pod="calico-apiserver-6955b54ffb-xptd5" WorkloadEndpoint="ci--3510.3.0--a--b66ea99ec2-k8s-calico--apiserver--6955b54ffb--xptd5-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--b66ea99ec2-k8s-calico--apiserver--6955b54ffb--xptd5-eth0", GenerateName:"calico-apiserver-6955b54ffb-", Namespace:"calico-apiserver", SelfLink:"", UID:"1c17f6ed-b372-41fa-b684-1123dfeeec16", ResourceVersion:"785", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 48, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6955b54ffb", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-b66ea99ec2", ContainerID:"d1905cb1c6f6a25581d448900b1d0a1e667e7f621be15cf0ac8b175fab147dab", Pod:"calico-apiserver-6955b54ffb-xptd5", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.76.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calid1cf931eab5", MAC:"ba:91:46:14:1a:47", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:48:03.963291 env[1461]: 2023-10-02 19:48:03.962 [INFO][5193] k8s.go 489: Wrote updated endpoint to datastore ContainerID="d1905cb1c6f6a25581d448900b1d0a1e667e7f621be15cf0ac8b175fab147dab" Namespace="calico-apiserver" Pod="calico-apiserver-6955b54ffb-xptd5" WorkloadEndpoint="ci--3510.3.0--a--b66ea99ec2-k8s-calico--apiserver--6955b54ffb--xptd5-eth0" Oct 2 19:48:03.968209 env[1461]: time="2023-10-02T19:48:03.968171481Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 19:48:03.968209 env[1461]: time="2023-10-02T19:48:03.968195709Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 19:48:03.968209 env[1461]: time="2023-10-02T19:48:03.968203175Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 19:48:03.968386 env[1461]: time="2023-10-02T19:48:03.968274774Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d1905cb1c6f6a25581d448900b1d0a1e667e7f621be15cf0ac8b175fab147dab pid=5343 runtime=io.containerd.runc.v2 Oct 2 19:48:03.968000 audit[5348]: NETFILTER_CFG table=filter:130 family=2 entries=50 op=nft_register_chain pid=5348 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 19:48:03.968000 audit[5348]: SYSCALL arch=c000003e syscall=46 success=yes exit=24496 a0=3 a1=7fff54ddc250 a2=0 a3=7fff54ddc23c items=0 ppid=3939 pid=5348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:48:03.968000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 19:48:03.974201 systemd[1]: Started cri-containerd-d1905cb1c6f6a25581d448900b1d0a1e667e7f621be15cf0ac8b175fab147dab.scope. Oct 2 19:48:03.978000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:48:03.978000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:48:03.978000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:48:03.978000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:48:03.978000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:48:03.978000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:48:03.978000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:48:03.978000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:48:03.978000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:48:03.978000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:48:03.978000 audit: BPF prog-id=184 op=LOAD Oct 2 19:48:03.979000 audit[5355]: AVC avc: denied { bpf } for pid=5355 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:48:03.979000 audit[5355]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=5343 pid=5355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:48:03.979000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431393035636231633666366132353538316434343839303062316430 Oct 2 19:48:03.979000 audit[5355]: AVC avc: denied { perfmon } for pid=5355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:48:03.979000 audit[5355]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=c items=0 ppid=5343 pid=5355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:48:03.979000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431393035636231633666366132353538316434343839303062316430 Oct 2 19:48:03.979000 audit[5355]: AVC avc: denied { bpf } for pid=5355 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:48:03.979000 audit[5355]: AVC avc: denied { bpf } for pid=5355 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:48:03.979000 audit[5355]: AVC avc: denied { bpf } for pid=5355 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:48:03.979000 audit[5355]: AVC avc: denied { perfmon } for pid=5355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:48:03.979000 audit[5355]: AVC avc: denied { perfmon } for pid=5355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:48:03.979000 audit[5355]: AVC avc: denied { perfmon } for pid=5355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:48:03.979000 audit[5355]: AVC avc: denied { perfmon } for pid=5355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:48:03.979000 audit[5355]: AVC avc: denied { perfmon } for pid=5355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:48:03.979000 audit[5355]: AVC avc: denied { bpf } for pid=5355 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:48:03.979000 audit[5355]: AVC avc: denied { bpf } for pid=5355 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:48:03.979000 audit: BPF prog-id=185 op=LOAD Oct 2 19:48:03.979000 audit[5355]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c000309150 items=0 ppid=5343 pid=5355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:48:03.979000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431393035636231633666366132353538316434343839303062316430 Oct 2 19:48:03.979000 audit[5355]: AVC avc: denied { bpf } for pid=5355 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:48:03.979000 audit[5355]: AVC avc: denied { bpf } for pid=5355 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:48:03.979000 audit[5355]: AVC avc: denied { perfmon } for pid=5355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:48:03.979000 audit[5355]: AVC avc: denied { perfmon } for pid=5355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:48:03.979000 audit[5355]: AVC avc: denied { perfmon } for pid=5355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:48:03.979000 audit[5355]: AVC avc: denied { perfmon } for pid=5355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:48:03.979000 audit[5355]: AVC avc: denied { perfmon } for pid=5355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:48:03.979000 audit[5355]: AVC avc: denied { bpf } for pid=5355 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:48:03.979000 audit[5355]: AVC avc: denied { bpf } for pid=5355 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:48:03.979000 audit: BPF prog-id=186 op=LOAD Oct 2 19:48:03.979000 audit[5355]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c000309198 items=0 ppid=5343 pid=5355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:48:03.979000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431393035636231633666366132353538316434343839303062316430 Oct 2 19:48:03.979000 audit: BPF prog-id=186 op=UNLOAD Oct 2 19:48:03.979000 audit: BPF prog-id=185 op=UNLOAD Oct 2 19:48:03.979000 audit[5355]: AVC avc: denied { bpf } for pid=5355 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:48:03.979000 audit[5355]: AVC avc: denied { bpf } for pid=5355 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:48:03.979000 audit[5355]: AVC avc: denied { bpf } for pid=5355 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:48:03.979000 audit[5355]: AVC avc: denied { perfmon } for pid=5355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:48:03.979000 audit[5355]: AVC avc: denied { perfmon } for pid=5355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:48:03.979000 audit[5355]: AVC avc: denied { perfmon } for pid=5355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:48:03.979000 audit[5355]: AVC avc: denied { perfmon } for pid=5355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:48:03.979000 audit[5355]: AVC avc: denied { perfmon } for pid=5355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:48:03.979000 audit[5355]: AVC avc: denied { bpf } for pid=5355 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:48:03.979000 audit[5355]: AVC avc: denied { bpf } for pid=5355 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 19:48:03.979000 audit: BPF prog-id=187 op=LOAD Oct 2 19:48:03.979000 audit[5355]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c0003095a8 items=0 ppid=5343 pid=5355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:48:03.979000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431393035636231633666366132353538316434343839303062316430 Oct 2 19:48:03.985015 env[1461]: time="2023-10-02T19:48:03.984990549Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6955b54ffb-9s99f,Uid:310b30f1-9833-4562-98cb-ec9154e42258,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"6f47871819c9d71698a1fb58ea934db42695ce79795c363f2c372fe0a967411b\"" Oct 2 19:48:03.985739 env[1461]: time="2023-10-02T19:48:03.985724789Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\"" Oct 2 19:48:03.998579 env[1461]: time="2023-10-02T19:48:03.998550439Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6955b54ffb-xptd5,Uid:1c17f6ed-b372-41fa-b684-1123dfeeec16,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"d1905cb1c6f6a25581d448900b1d0a1e667e7f621be15cf0ac8b175fab147dab\"" Oct 2 19:48:04.248942 env[1461]: time="2023-10-02T19:48:04.248820519Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:48:04.249883 env[1461]: time="2023-10-02T19:48:04.249798201Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:48:04.250286 kubelet[2613]: E1002 19:48:04.250244 2613 remote_image.go:171] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:48:04.250476 kubelet[2613]: E1002 19:48:04.250377 2613 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:48:04.250869 kubelet[2613]: E1002 19:48:04.250821 2613 kuberuntime_manager.go:872] container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.25.0,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-tz6nf,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/version,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:90,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/code/filecheck],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:5,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:5,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*false,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod calico-apiserver-6955b54ffb-9s99f_calico-apiserver(310b30f1-9833-4562-98cb-ec9154e42258): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:48:04.251287 kubelet[2613]: E1002 19:48:04.250942 2613 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-apiserver/calico-apiserver-6955b54ffb-9s99f" podUID=310b30f1-9833-4562-98cb-ec9154e42258 Oct 2 19:48:04.251510 env[1461]: time="2023-10-02T19:48:04.251093335Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\"" Oct 2 19:48:04.496359 env[1461]: time="2023-10-02T19:48:04.496226737Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:48:04.502600 env[1461]: time="2023-10-02T19:48:04.502371675Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:48:04.502879 kubelet[2613]: E1002 19:48:04.502820 2613 remote_image.go:171] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:48:04.503801 kubelet[2613]: E1002 19:48:04.502922 2613 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:48:04.503801 kubelet[2613]: E1002 19:48:04.503202 2613 kuberuntime_manager.go:872] container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.25.0,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-26bxm,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/version,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:90,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/code/filecheck],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:5,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:5,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*false,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod calico-apiserver-6955b54ffb-xptd5_calico-apiserver(1c17f6ed-b372-41fa-b684-1123dfeeec16): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:48:04.503801 kubelet[2613]: E1002 19:48:04.503352 2613 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-apiserver/calico-apiserver-6955b54ffb-xptd5" podUID=1c17f6ed-b372-41fa-b684-1123dfeeec16 Oct 2 19:48:04.652211 kubelet[2613]: E1002 19:48:04.652150 2613 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-6955b54ffb-xptd5" podUID=1c17f6ed-b372-41fa-b684-1123dfeeec16 Oct 2 19:48:04.654623 kubelet[2613]: E1002 19:48:04.654568 2613 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-6955b54ffb-9s99f" podUID=310b30f1-9833-4562-98cb-ec9154e42258 Oct 2 19:48:04.756000 audit[5409]: NETFILTER_CFG table=filter:131 family=2 entries=8 op=nft_register_rule pid=5409 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:48:04.756000 audit[5409]: SYSCALL arch=c000003e syscall=46 success=yes exit=2620 a0=3 a1=7ffdc6d69d40 a2=0 a3=7ffdc6d69d2c items=0 ppid=2915 pid=5409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:48:04.756000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:48:04.760000 audit[5409]: NETFILTER_CFG table=nat:132 family=2 entries=78 op=nft_register_rule pid=5409 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:48:04.760000 audit[5409]: SYSCALL arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7ffdc6d69d40 a2=0 a3=7ffdc6d69d2c items=0 ppid=2915 pid=5409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:48:04.760000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:48:05.122000 audit[2432]: AVC avc: denied { watch } for pid=2432 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c275,c430 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:48:05.122000 audit[2432]: AVC avc: denied { watch } for pid=2432 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c275,c430 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:48:05.122000 audit[2432]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c0027065c0 a2=fc6 a3=0 items=0 ppid=2271 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c275,c430 key=(null) Oct 2 19:48:05.122000 audit[2432]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00232ade0 a2=fc6 a3=0 items=0 ppid=2271 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c275,c430 key=(null) Oct 2 19:48:05.122000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:48:05.122000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:48:05.225000 audit[2430]: AVC avc: denied { watch } for pid=2430 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=521268 scontext=system_u:system_r:svirt_lxc_net_t:s0:c581,c935 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:48:05.225000 audit[2430]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6d a1=c0045b2a50 a2=fc6 a3=0 items=0 ppid=2280 pid=2430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c581,c935 key=(null) Oct 2 19:48:05.225000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134352E34302E38322E323133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:48:05.225000 audit[2430]: AVC avc: denied { watch } for pid=2430 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c581,c935 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:48:05.225000 audit[2430]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6d a1=c012272090 a2=fc6 a3=0 items=0 ppid=2280 pid=2430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c581,c935 key=(null) Oct 2 19:48:05.225000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134352E34302E38322E323133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:48:05.225000 audit[2430]: AVC avc: denied { watch } for pid=2430 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c581,c935 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:48:05.225000 audit[2430]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6d a1=c003188ec0 a2=fc6 a3=0 items=0 ppid=2280 pid=2430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c581,c935 key=(null) Oct 2 19:48:05.225000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134352E34302E38322E323133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:48:05.226000 audit[2430]: AVC avc: denied { watch } for pid=2430 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=521274 scontext=system_u:system_r:svirt_lxc_net_t:s0:c581,c935 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:48:05.226000 audit[2430]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6d a1=c012bb2f90 a2=fc6 a3=0 items=0 ppid=2280 pid=2430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c581,c935 key=(null) Oct 2 19:48:05.226000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134352E34302E38322E323133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:48:05.227000 audit[2430]: AVC avc: denied { watch } for pid=2430 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c581,c935 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:48:05.227000 audit[2430]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6e a1=c002072ca0 a2=fc6 a3=0 items=0 ppid=2280 pid=2430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c581,c935 key=(null) Oct 2 19:48:05.227000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134352E34302E38322E323133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:48:05.227000 audit[2430]: AVC avc: denied { watch } for pid=2430 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c581,c935 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:48:05.227000 audit[2430]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6f a1=c0049cbf50 a2=fc6 a3=0 items=0 ppid=2280 pid=2430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c581,c935 key=(null) Oct 2 19:48:05.227000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134352E34302E38322E323133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:48:05.289670 systemd-networkd[1274]: calid1cf931eab5: Gained IPv6LL Oct 2 19:48:05.655271 kubelet[2613]: E1002 19:48:05.655254 2613 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-6955b54ffb-9s99f" podUID=310b30f1-9833-4562-98cb-ec9154e42258 Oct 2 19:48:05.655271 kubelet[2613]: E1002 19:48:05.655260 2613 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-6955b54ffb-xptd5" podUID=1c17f6ed-b372-41fa-b684-1123dfeeec16 Oct 2 19:48:05.737633 systemd-networkd[1274]: calia8a7c9cbd38: Gained IPv6LL Oct 2 19:48:05.874000 audit[5437]: NETFILTER_CFG table=filter:133 family=2 entries=8 op=nft_register_rule pid=5437 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:48:05.915774 kernel: kauditd_printk_skb: 158 callbacks suppressed Oct 2 19:48:05.915885 kernel: audit: type=1325 audit(1696276085.874:1381): table=filter:133 family=2 entries=8 op=nft_register_rule pid=5437 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:48:05.874000 audit[5437]: SYSCALL arch=c000003e syscall=46 success=yes exit=2620 a0=3 a1=7fff7439f9c0 a2=0 a3=7fff7439f9ac items=0 ppid=2915 pid=5437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:48:06.061469 kernel: audit: type=1300 audit(1696276085.874:1381): arch=c000003e syscall=46 success=yes exit=2620 a0=3 a1=7fff7439f9c0 a2=0 a3=7fff7439f9ac items=0 ppid=2915 pid=5437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:48:06.061511 kernel: audit: type=1327 audit(1696276085.874:1381): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:48:05.874000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:48:05.879000 audit[5437]: NETFILTER_CFG table=nat:134 family=2 entries=78 op=nft_register_rule pid=5437 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:48:05.879000 audit[5437]: SYSCALL arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7fff7439f9c0 a2=0 a3=7fff7439f9ac items=0 ppid=2915 pid=5437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:48:06.270141 kernel: audit: type=1325 audit(1696276085.879:1382): table=nat:134 family=2 entries=78 op=nft_register_rule pid=5437 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 19:48:06.270185 kernel: audit: type=1300 audit(1696276085.879:1382): arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7fff7439f9c0 a2=0 a3=7fff7439f9ac items=0 ppid=2915 pid=5437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:48:06.270201 kernel: audit: type=1327 audit(1696276085.879:1382): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:48:05.879000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 19:48:08.451640 env[1461]: time="2023-10-02T19:48:08.451549192Z" level=info msg="StopPodSandbox for \"23c9ad6741a3f90dd9df1224eb0be613f01cbaa595626a8135295aed6514d075\"" Oct 2 19:48:08.576849 env[1461]: 2023-10-02 19:48:08.521 [WARNING][5464] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="23c9ad6741a3f90dd9df1224eb0be613f01cbaa595626a8135295aed6514d075" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--b66ea99ec2-k8s-coredns--787d4945fb--brbpj-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"4fcca1ab-8a1f-4075-a69b-cda7fd2d32ee", ResourceVersion:"684", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 47, 23, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-b66ea99ec2", ContainerID:"b463b65f10c962f244035f83f242bf06c8e16db6f3e518256debf0d2e3f3125c", Pod:"coredns-787d4945fb-brbpj", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.76.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali66f25634d78", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:48:08.576849 env[1461]: 2023-10-02 19:48:08.521 [INFO][5464] k8s.go 576: Cleaning up netns ContainerID="23c9ad6741a3f90dd9df1224eb0be613f01cbaa595626a8135295aed6514d075" Oct 2 19:48:08.576849 env[1461]: 2023-10-02 19:48:08.522 [INFO][5464] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="23c9ad6741a3f90dd9df1224eb0be613f01cbaa595626a8135295aed6514d075" iface="eth0" netns="" Oct 2 19:48:08.576849 env[1461]: 2023-10-02 19:48:08.522 [INFO][5464] k8s.go 583: Releasing IP address(es) ContainerID="23c9ad6741a3f90dd9df1224eb0be613f01cbaa595626a8135295aed6514d075" Oct 2 19:48:08.576849 env[1461]: 2023-10-02 19:48:08.522 [INFO][5464] utils.go 196: Calico CNI releasing IP address ContainerID="23c9ad6741a3f90dd9df1224eb0be613f01cbaa595626a8135295aed6514d075" Oct 2 19:48:08.576849 env[1461]: 2023-10-02 19:48:08.566 [INFO][5481] ipam_plugin.go 416: Releasing address using handleID ContainerID="23c9ad6741a3f90dd9df1224eb0be613f01cbaa595626a8135295aed6514d075" HandleID="k8s-pod-network.23c9ad6741a3f90dd9df1224eb0be613f01cbaa595626a8135295aed6514d075" Workload="ci--3510.3.0--a--b66ea99ec2-k8s-coredns--787d4945fb--brbpj-eth0" Oct 2 19:48:08.576849 env[1461]: time="2023-10-02T19:48:08Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:48:08.576849 env[1461]: time="2023-10-02T19:48:08Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:48:08.576849 env[1461]: 2023-10-02 19:48:08.573 [WARNING][5481] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="23c9ad6741a3f90dd9df1224eb0be613f01cbaa595626a8135295aed6514d075" HandleID="k8s-pod-network.23c9ad6741a3f90dd9df1224eb0be613f01cbaa595626a8135295aed6514d075" Workload="ci--3510.3.0--a--b66ea99ec2-k8s-coredns--787d4945fb--brbpj-eth0" Oct 2 19:48:08.576849 env[1461]: 2023-10-02 19:48:08.573 [INFO][5481] ipam_plugin.go 444: Releasing address using workloadID ContainerID="23c9ad6741a3f90dd9df1224eb0be613f01cbaa595626a8135295aed6514d075" HandleID="k8s-pod-network.23c9ad6741a3f90dd9df1224eb0be613f01cbaa595626a8135295aed6514d075" Workload="ci--3510.3.0--a--b66ea99ec2-k8s-coredns--787d4945fb--brbpj-eth0" Oct 2 19:48:08.576849 env[1461]: time="2023-10-02T19:48:08Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:48:08.576849 env[1461]: 2023-10-02 19:48:08.575 [INFO][5464] k8s.go 589: Teardown processing complete. ContainerID="23c9ad6741a3f90dd9df1224eb0be613f01cbaa595626a8135295aed6514d075" Oct 2 19:48:08.577384 env[1461]: time="2023-10-02T19:48:08.576873335Z" level=info msg="TearDown network for sandbox \"23c9ad6741a3f90dd9df1224eb0be613f01cbaa595626a8135295aed6514d075\" successfully" Oct 2 19:48:08.577384 env[1461]: time="2023-10-02T19:48:08.576901607Z" level=info msg="StopPodSandbox for \"23c9ad6741a3f90dd9df1224eb0be613f01cbaa595626a8135295aed6514d075\" returns successfully" Oct 2 19:48:08.577384 env[1461]: time="2023-10-02T19:48:08.577234043Z" level=info msg="RemovePodSandbox for \"23c9ad6741a3f90dd9df1224eb0be613f01cbaa595626a8135295aed6514d075\"" Oct 2 19:48:08.577384 env[1461]: time="2023-10-02T19:48:08.577259927Z" level=info msg="Forcibly stopping sandbox \"23c9ad6741a3f90dd9df1224eb0be613f01cbaa595626a8135295aed6514d075\"" Oct 2 19:48:08.620565 env[1461]: 2023-10-02 19:48:08.600 [WARNING][5510] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="23c9ad6741a3f90dd9df1224eb0be613f01cbaa595626a8135295aed6514d075" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--b66ea99ec2-k8s-coredns--787d4945fb--brbpj-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"4fcca1ab-8a1f-4075-a69b-cda7fd2d32ee", ResourceVersion:"684", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 47, 23, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-b66ea99ec2", ContainerID:"b463b65f10c962f244035f83f242bf06c8e16db6f3e518256debf0d2e3f3125c", Pod:"coredns-787d4945fb-brbpj", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.76.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali66f25634d78", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:48:08.620565 env[1461]: 2023-10-02 19:48:08.600 [INFO][5510] k8s.go 576: Cleaning up netns ContainerID="23c9ad6741a3f90dd9df1224eb0be613f01cbaa595626a8135295aed6514d075" Oct 2 19:48:08.620565 env[1461]: 2023-10-02 19:48:08.600 [INFO][5510] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="23c9ad6741a3f90dd9df1224eb0be613f01cbaa595626a8135295aed6514d075" iface="eth0" netns="" Oct 2 19:48:08.620565 env[1461]: 2023-10-02 19:48:08.600 [INFO][5510] k8s.go 583: Releasing IP address(es) ContainerID="23c9ad6741a3f90dd9df1224eb0be613f01cbaa595626a8135295aed6514d075" Oct 2 19:48:08.620565 env[1461]: 2023-10-02 19:48:08.600 [INFO][5510] utils.go 196: Calico CNI releasing IP address ContainerID="23c9ad6741a3f90dd9df1224eb0be613f01cbaa595626a8135295aed6514d075" Oct 2 19:48:08.620565 env[1461]: 2023-10-02 19:48:08.612 [INFO][5528] ipam_plugin.go 416: Releasing address using handleID ContainerID="23c9ad6741a3f90dd9df1224eb0be613f01cbaa595626a8135295aed6514d075" HandleID="k8s-pod-network.23c9ad6741a3f90dd9df1224eb0be613f01cbaa595626a8135295aed6514d075" Workload="ci--3510.3.0--a--b66ea99ec2-k8s-coredns--787d4945fb--brbpj-eth0" Oct 2 19:48:08.620565 env[1461]: time="2023-10-02T19:48:08Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:48:08.620565 env[1461]: time="2023-10-02T19:48:08Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:48:08.620565 env[1461]: 2023-10-02 19:48:08.617 [WARNING][5528] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="23c9ad6741a3f90dd9df1224eb0be613f01cbaa595626a8135295aed6514d075" HandleID="k8s-pod-network.23c9ad6741a3f90dd9df1224eb0be613f01cbaa595626a8135295aed6514d075" Workload="ci--3510.3.0--a--b66ea99ec2-k8s-coredns--787d4945fb--brbpj-eth0" Oct 2 19:48:08.620565 env[1461]: 2023-10-02 19:48:08.617 [INFO][5528] ipam_plugin.go 444: Releasing address using workloadID ContainerID="23c9ad6741a3f90dd9df1224eb0be613f01cbaa595626a8135295aed6514d075" HandleID="k8s-pod-network.23c9ad6741a3f90dd9df1224eb0be613f01cbaa595626a8135295aed6514d075" Workload="ci--3510.3.0--a--b66ea99ec2-k8s-coredns--787d4945fb--brbpj-eth0" Oct 2 19:48:08.620565 env[1461]: time="2023-10-02T19:48:08Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:48:08.620565 env[1461]: 2023-10-02 19:48:08.619 [INFO][5510] k8s.go 589: Teardown processing complete. ContainerID="23c9ad6741a3f90dd9df1224eb0be613f01cbaa595626a8135295aed6514d075" Oct 2 19:48:08.620565 env[1461]: time="2023-10-02T19:48:08.620548762Z" level=info msg="TearDown network for sandbox \"23c9ad6741a3f90dd9df1224eb0be613f01cbaa595626a8135295aed6514d075\" successfully" Oct 2 19:48:08.621999 env[1461]: time="2023-10-02T19:48:08.621954176Z" level=info msg="RemovePodSandbox \"23c9ad6741a3f90dd9df1224eb0be613f01cbaa595626a8135295aed6514d075\" returns successfully" Oct 2 19:48:08.622334 env[1461]: time="2023-10-02T19:48:08.622291474Z" level=info msg="StopPodSandbox for \"17af3cbd1e5b27bb5fdb71e30df45dad7ac77e0941aaccf368f37f8a2c9ef875\"" Oct 2 19:48:08.663731 env[1461]: 2023-10-02 19:48:08.643 [WARNING][5557] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="17af3cbd1e5b27bb5fdb71e30df45dad7ac77e0941aaccf368f37f8a2c9ef875" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--b66ea99ec2-k8s-csi--node--driver--l8hvh-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"ebb11106-5253-488c-9095-50c2b68f321c", ResourceVersion:"724", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 47, 43, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5877dcb8f5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-b66ea99ec2", ContainerID:"2b4feb441613edbebea1e738177d6dbce62406de2e3133fa4e917b3b1c24513f", Pod:"csi-node-driver-l8hvh", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.76.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali0a7171b4cfb", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:48:08.663731 env[1461]: 2023-10-02 19:48:08.643 [INFO][5557] k8s.go 576: Cleaning up netns ContainerID="17af3cbd1e5b27bb5fdb71e30df45dad7ac77e0941aaccf368f37f8a2c9ef875" Oct 2 19:48:08.663731 env[1461]: 2023-10-02 19:48:08.643 [INFO][5557] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="17af3cbd1e5b27bb5fdb71e30df45dad7ac77e0941aaccf368f37f8a2c9ef875" iface="eth0" netns="" Oct 2 19:48:08.663731 env[1461]: 2023-10-02 19:48:08.643 [INFO][5557] k8s.go 583: Releasing IP address(es) ContainerID="17af3cbd1e5b27bb5fdb71e30df45dad7ac77e0941aaccf368f37f8a2c9ef875" Oct 2 19:48:08.663731 env[1461]: 2023-10-02 19:48:08.643 [INFO][5557] utils.go 196: Calico CNI releasing IP address ContainerID="17af3cbd1e5b27bb5fdb71e30df45dad7ac77e0941aaccf368f37f8a2c9ef875" Oct 2 19:48:08.663731 env[1461]: 2023-10-02 19:48:08.656 [INFO][5571] ipam_plugin.go 416: Releasing address using handleID ContainerID="17af3cbd1e5b27bb5fdb71e30df45dad7ac77e0941aaccf368f37f8a2c9ef875" HandleID="k8s-pod-network.17af3cbd1e5b27bb5fdb71e30df45dad7ac77e0941aaccf368f37f8a2c9ef875" Workload="ci--3510.3.0--a--b66ea99ec2-k8s-csi--node--driver--l8hvh-eth0" Oct 2 19:48:08.663731 env[1461]: time="2023-10-02T19:48:08Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:48:08.663731 env[1461]: time="2023-10-02T19:48:08Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:48:08.663731 env[1461]: 2023-10-02 19:48:08.660 [WARNING][5571] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="17af3cbd1e5b27bb5fdb71e30df45dad7ac77e0941aaccf368f37f8a2c9ef875" HandleID="k8s-pod-network.17af3cbd1e5b27bb5fdb71e30df45dad7ac77e0941aaccf368f37f8a2c9ef875" Workload="ci--3510.3.0--a--b66ea99ec2-k8s-csi--node--driver--l8hvh-eth0" Oct 2 19:48:08.663731 env[1461]: 2023-10-02 19:48:08.660 [INFO][5571] ipam_plugin.go 444: Releasing address using workloadID ContainerID="17af3cbd1e5b27bb5fdb71e30df45dad7ac77e0941aaccf368f37f8a2c9ef875" HandleID="k8s-pod-network.17af3cbd1e5b27bb5fdb71e30df45dad7ac77e0941aaccf368f37f8a2c9ef875" Workload="ci--3510.3.0--a--b66ea99ec2-k8s-csi--node--driver--l8hvh-eth0" Oct 2 19:48:08.663731 env[1461]: time="2023-10-02T19:48:08Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:48:08.663731 env[1461]: 2023-10-02 19:48:08.663 [INFO][5557] k8s.go 589: Teardown processing complete. ContainerID="17af3cbd1e5b27bb5fdb71e30df45dad7ac77e0941aaccf368f37f8a2c9ef875" Oct 2 19:48:08.664233 env[1461]: time="2023-10-02T19:48:08.663746744Z" level=info msg="TearDown network for sandbox \"17af3cbd1e5b27bb5fdb71e30df45dad7ac77e0941aaccf368f37f8a2c9ef875\" successfully" Oct 2 19:48:08.664233 env[1461]: time="2023-10-02T19:48:08.663764624Z" level=info msg="StopPodSandbox for \"17af3cbd1e5b27bb5fdb71e30df45dad7ac77e0941aaccf368f37f8a2c9ef875\" returns successfully" Oct 2 19:48:08.664233 env[1461]: time="2023-10-02T19:48:08.663903166Z" level=info msg="RemovePodSandbox for \"17af3cbd1e5b27bb5fdb71e30df45dad7ac77e0941aaccf368f37f8a2c9ef875\"" Oct 2 19:48:08.664233 env[1461]: time="2023-10-02T19:48:08.663926094Z" level=info msg="Forcibly stopping sandbox \"17af3cbd1e5b27bb5fdb71e30df45dad7ac77e0941aaccf368f37f8a2c9ef875\"" Oct 2 19:48:08.704509 env[1461]: 2023-10-02 19:48:08.685 [WARNING][5598] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="17af3cbd1e5b27bb5fdb71e30df45dad7ac77e0941aaccf368f37f8a2c9ef875" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--b66ea99ec2-k8s-csi--node--driver--l8hvh-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"ebb11106-5253-488c-9095-50c2b68f321c", ResourceVersion:"724", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 47, 43, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5877dcb8f5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-b66ea99ec2", ContainerID:"2b4feb441613edbebea1e738177d6dbce62406de2e3133fa4e917b3b1c24513f", Pod:"csi-node-driver-l8hvh", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.76.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali0a7171b4cfb", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:48:08.704509 env[1461]: 2023-10-02 19:48:08.685 [INFO][5598] k8s.go 576: Cleaning up netns ContainerID="17af3cbd1e5b27bb5fdb71e30df45dad7ac77e0941aaccf368f37f8a2c9ef875" Oct 2 19:48:08.704509 env[1461]: 2023-10-02 19:48:08.685 [INFO][5598] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="17af3cbd1e5b27bb5fdb71e30df45dad7ac77e0941aaccf368f37f8a2c9ef875" iface="eth0" netns="" Oct 2 19:48:08.704509 env[1461]: 2023-10-02 19:48:08.685 [INFO][5598] k8s.go 583: Releasing IP address(es) ContainerID="17af3cbd1e5b27bb5fdb71e30df45dad7ac77e0941aaccf368f37f8a2c9ef875" Oct 2 19:48:08.704509 env[1461]: 2023-10-02 19:48:08.685 [INFO][5598] utils.go 196: Calico CNI releasing IP address ContainerID="17af3cbd1e5b27bb5fdb71e30df45dad7ac77e0941aaccf368f37f8a2c9ef875" Oct 2 19:48:08.704509 env[1461]: 2023-10-02 19:48:08.697 [INFO][5610] ipam_plugin.go 416: Releasing address using handleID ContainerID="17af3cbd1e5b27bb5fdb71e30df45dad7ac77e0941aaccf368f37f8a2c9ef875" HandleID="k8s-pod-network.17af3cbd1e5b27bb5fdb71e30df45dad7ac77e0941aaccf368f37f8a2c9ef875" Workload="ci--3510.3.0--a--b66ea99ec2-k8s-csi--node--driver--l8hvh-eth0" Oct 2 19:48:08.704509 env[1461]: time="2023-10-02T19:48:08Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:48:08.704509 env[1461]: time="2023-10-02T19:48:08Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:48:08.704509 env[1461]: 2023-10-02 19:48:08.701 [WARNING][5610] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="17af3cbd1e5b27bb5fdb71e30df45dad7ac77e0941aaccf368f37f8a2c9ef875" HandleID="k8s-pod-network.17af3cbd1e5b27bb5fdb71e30df45dad7ac77e0941aaccf368f37f8a2c9ef875" Workload="ci--3510.3.0--a--b66ea99ec2-k8s-csi--node--driver--l8hvh-eth0" Oct 2 19:48:08.704509 env[1461]: 2023-10-02 19:48:08.702 [INFO][5610] ipam_plugin.go 444: Releasing address using workloadID ContainerID="17af3cbd1e5b27bb5fdb71e30df45dad7ac77e0941aaccf368f37f8a2c9ef875" HandleID="k8s-pod-network.17af3cbd1e5b27bb5fdb71e30df45dad7ac77e0941aaccf368f37f8a2c9ef875" Workload="ci--3510.3.0--a--b66ea99ec2-k8s-csi--node--driver--l8hvh-eth0" Oct 2 19:48:08.704509 env[1461]: time="2023-10-02T19:48:08Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:48:08.704509 env[1461]: 2023-10-02 19:48:08.703 [INFO][5598] k8s.go 589: Teardown processing complete. ContainerID="17af3cbd1e5b27bb5fdb71e30df45dad7ac77e0941aaccf368f37f8a2c9ef875" Oct 2 19:48:08.704509 env[1461]: time="2023-10-02T19:48:08.704489643Z" level=info msg="TearDown network for sandbox \"17af3cbd1e5b27bb5fdb71e30df45dad7ac77e0941aaccf368f37f8a2c9ef875\" successfully" Oct 2 19:48:08.705918 env[1461]: time="2023-10-02T19:48:08.705874736Z" level=info msg="RemovePodSandbox \"17af3cbd1e5b27bb5fdb71e30df45dad7ac77e0941aaccf368f37f8a2c9ef875\" returns successfully" Oct 2 19:48:08.706200 env[1461]: time="2023-10-02T19:48:08.706158549Z" level=info msg="StopPodSandbox for \"17978490ffd842e930d9cb79632bd4dafc2ceae4ff1967f9eee156df238b4c31\"" Oct 2 19:48:08.750596 env[1461]: 2023-10-02 19:48:08.728 [WARNING][5639] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="17978490ffd842e930d9cb79632bd4dafc2ceae4ff1967f9eee156df238b4c31" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--b66ea99ec2-k8s-calico--kube--controllers--69c848ddc6--qqrrz-eth0", GenerateName:"calico-kube-controllers-69c848ddc6-", Namespace:"calico-system", SelfLink:"", UID:"2a804127-9341-491a-b87d-9b61243b002d", ResourceVersion:"734", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 47, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"69c848ddc6", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-b66ea99ec2", ContainerID:"25c271726f2b4c39dacd577293b2288b445be6fec217fc7f5924528f99b4642f", Pod:"calico-kube-controllers-69c848ddc6-qqrrz", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.76.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calif3e01b8290f", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:48:08.750596 env[1461]: 2023-10-02 19:48:08.728 [INFO][5639] k8s.go 576: Cleaning up netns ContainerID="17978490ffd842e930d9cb79632bd4dafc2ceae4ff1967f9eee156df238b4c31" Oct 2 19:48:08.750596 env[1461]: 2023-10-02 19:48:08.728 [INFO][5639] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="17978490ffd842e930d9cb79632bd4dafc2ceae4ff1967f9eee156df238b4c31" iface="eth0" netns="" Oct 2 19:48:08.750596 env[1461]: 2023-10-02 19:48:08.728 [INFO][5639] k8s.go 583: Releasing IP address(es) ContainerID="17978490ffd842e930d9cb79632bd4dafc2ceae4ff1967f9eee156df238b4c31" Oct 2 19:48:08.750596 env[1461]: 2023-10-02 19:48:08.728 [INFO][5639] utils.go 196: Calico CNI releasing IP address ContainerID="17978490ffd842e930d9cb79632bd4dafc2ceae4ff1967f9eee156df238b4c31" Oct 2 19:48:08.750596 env[1461]: 2023-10-02 19:48:08.741 [INFO][5654] ipam_plugin.go 416: Releasing address using handleID ContainerID="17978490ffd842e930d9cb79632bd4dafc2ceae4ff1967f9eee156df238b4c31" HandleID="k8s-pod-network.17978490ffd842e930d9cb79632bd4dafc2ceae4ff1967f9eee156df238b4c31" Workload="ci--3510.3.0--a--b66ea99ec2-k8s-calico--kube--controllers--69c848ddc6--qqrrz-eth0" Oct 2 19:48:08.750596 env[1461]: time="2023-10-02T19:48:08Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:48:08.750596 env[1461]: time="2023-10-02T19:48:08Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:48:08.750596 env[1461]: 2023-10-02 19:48:08.747 [WARNING][5654] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="17978490ffd842e930d9cb79632bd4dafc2ceae4ff1967f9eee156df238b4c31" HandleID="k8s-pod-network.17978490ffd842e930d9cb79632bd4dafc2ceae4ff1967f9eee156df238b4c31" Workload="ci--3510.3.0--a--b66ea99ec2-k8s-calico--kube--controllers--69c848ddc6--qqrrz-eth0" Oct 2 19:48:08.750596 env[1461]: 2023-10-02 19:48:08.747 [INFO][5654] ipam_plugin.go 444: Releasing address using workloadID ContainerID="17978490ffd842e930d9cb79632bd4dafc2ceae4ff1967f9eee156df238b4c31" HandleID="k8s-pod-network.17978490ffd842e930d9cb79632bd4dafc2ceae4ff1967f9eee156df238b4c31" Workload="ci--3510.3.0--a--b66ea99ec2-k8s-calico--kube--controllers--69c848ddc6--qqrrz-eth0" Oct 2 19:48:08.750596 env[1461]: time="2023-10-02T19:48:08Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:48:08.750596 env[1461]: 2023-10-02 19:48:08.749 [INFO][5639] k8s.go 589: Teardown processing complete. ContainerID="17978490ffd842e930d9cb79632bd4dafc2ceae4ff1967f9eee156df238b4c31" Oct 2 19:48:08.751007 env[1461]: time="2023-10-02T19:48:08.750621080Z" level=info msg="TearDown network for sandbox \"17978490ffd842e930d9cb79632bd4dafc2ceae4ff1967f9eee156df238b4c31\" successfully" Oct 2 19:48:08.751007 env[1461]: time="2023-10-02T19:48:08.750644367Z" level=info msg="StopPodSandbox for \"17978490ffd842e930d9cb79632bd4dafc2ceae4ff1967f9eee156df238b4c31\" returns successfully" Oct 2 19:48:08.751007 env[1461]: time="2023-10-02T19:48:08.750961368Z" level=info msg="RemovePodSandbox for \"17978490ffd842e930d9cb79632bd4dafc2ceae4ff1967f9eee156df238b4c31\"" Oct 2 19:48:08.751007 env[1461]: time="2023-10-02T19:48:08.750982399Z" level=info msg="Forcibly stopping sandbox \"17978490ffd842e930d9cb79632bd4dafc2ceae4ff1967f9eee156df238b4c31\"" Oct 2 19:48:08.795618 env[1461]: 2023-10-02 19:48:08.773 [WARNING][5688] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="17978490ffd842e930d9cb79632bd4dafc2ceae4ff1967f9eee156df238b4c31" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--b66ea99ec2-k8s-calico--kube--controllers--69c848ddc6--qqrrz-eth0", GenerateName:"calico-kube-controllers-69c848ddc6-", Namespace:"calico-system", SelfLink:"", UID:"2a804127-9341-491a-b87d-9b61243b002d", ResourceVersion:"734", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 47, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"69c848ddc6", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-b66ea99ec2", ContainerID:"25c271726f2b4c39dacd577293b2288b445be6fec217fc7f5924528f99b4642f", Pod:"calico-kube-controllers-69c848ddc6-qqrrz", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.76.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calif3e01b8290f", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:48:08.795618 env[1461]: 2023-10-02 19:48:08.773 [INFO][5688] k8s.go 576: Cleaning up netns ContainerID="17978490ffd842e930d9cb79632bd4dafc2ceae4ff1967f9eee156df238b4c31" Oct 2 19:48:08.795618 env[1461]: 2023-10-02 19:48:08.773 [INFO][5688] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="17978490ffd842e930d9cb79632bd4dafc2ceae4ff1967f9eee156df238b4c31" iface="eth0" netns="" Oct 2 19:48:08.795618 env[1461]: 2023-10-02 19:48:08.774 [INFO][5688] k8s.go 583: Releasing IP address(es) ContainerID="17978490ffd842e930d9cb79632bd4dafc2ceae4ff1967f9eee156df238b4c31" Oct 2 19:48:08.795618 env[1461]: 2023-10-02 19:48:08.774 [INFO][5688] utils.go 196: Calico CNI releasing IP address ContainerID="17978490ffd842e930d9cb79632bd4dafc2ceae4ff1967f9eee156df238b4c31" Oct 2 19:48:08.795618 env[1461]: 2023-10-02 19:48:08.786 [INFO][5702] ipam_plugin.go 416: Releasing address using handleID ContainerID="17978490ffd842e930d9cb79632bd4dafc2ceae4ff1967f9eee156df238b4c31" HandleID="k8s-pod-network.17978490ffd842e930d9cb79632bd4dafc2ceae4ff1967f9eee156df238b4c31" Workload="ci--3510.3.0--a--b66ea99ec2-k8s-calico--kube--controllers--69c848ddc6--qqrrz-eth0" Oct 2 19:48:08.795618 env[1461]: time="2023-10-02T19:48:08Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:48:08.795618 env[1461]: time="2023-10-02T19:48:08Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:48:08.795618 env[1461]: 2023-10-02 19:48:08.792 [WARNING][5702] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="17978490ffd842e930d9cb79632bd4dafc2ceae4ff1967f9eee156df238b4c31" HandleID="k8s-pod-network.17978490ffd842e930d9cb79632bd4dafc2ceae4ff1967f9eee156df238b4c31" Workload="ci--3510.3.0--a--b66ea99ec2-k8s-calico--kube--controllers--69c848ddc6--qqrrz-eth0" Oct 2 19:48:08.795618 env[1461]: 2023-10-02 19:48:08.792 [INFO][5702] ipam_plugin.go 444: Releasing address using workloadID ContainerID="17978490ffd842e930d9cb79632bd4dafc2ceae4ff1967f9eee156df238b4c31" HandleID="k8s-pod-network.17978490ffd842e930d9cb79632bd4dafc2ceae4ff1967f9eee156df238b4c31" Workload="ci--3510.3.0--a--b66ea99ec2-k8s-calico--kube--controllers--69c848ddc6--qqrrz-eth0" Oct 2 19:48:08.795618 env[1461]: time="2023-10-02T19:48:08Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:48:08.795618 env[1461]: 2023-10-02 19:48:08.794 [INFO][5688] k8s.go 589: Teardown processing complete. ContainerID="17978490ffd842e930d9cb79632bd4dafc2ceae4ff1967f9eee156df238b4c31" Oct 2 19:48:08.796023 env[1461]: time="2023-10-02T19:48:08.795635992Z" level=info msg="TearDown network for sandbox \"17978490ffd842e930d9cb79632bd4dafc2ceae4ff1967f9eee156df238b4c31\" successfully" Oct 2 19:48:08.797285 env[1461]: time="2023-10-02T19:48:08.797249078Z" level=info msg="RemovePodSandbox \"17978490ffd842e930d9cb79632bd4dafc2ceae4ff1967f9eee156df238b4c31\" returns successfully" Oct 2 19:48:08.797625 env[1461]: time="2023-10-02T19:48:08.797575966Z" level=info msg="StopPodSandbox for \"2e2b96de98c691eab85ee19efbb41e4a4ad79a1423450e5ecb9533377027fe73\"" Oct 2 19:48:08.841431 env[1461]: 2023-10-02 19:48:08.820 [WARNING][5732] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="2e2b96de98c691eab85ee19efbb41e4a4ad79a1423450e5ecb9533377027fe73" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--b66ea99ec2-k8s-coredns--787d4945fb--p6twp-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"365d9e2c-338a-4964-844b-392b2e4962e8", ResourceVersion:"729", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 47, 23, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-b66ea99ec2", ContainerID:"2ae08ec5e2703c1e64cfbbba8b6be6ea337f5c38a5e7200dc36d419d5d7bad88", Pod:"coredns-787d4945fb-p6twp", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.76.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali3d72f50ed48", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:48:08.841431 env[1461]: 2023-10-02 19:48:08.820 [INFO][5732] k8s.go 576: Cleaning up netns ContainerID="2e2b96de98c691eab85ee19efbb41e4a4ad79a1423450e5ecb9533377027fe73" Oct 2 19:48:08.841431 env[1461]: 2023-10-02 19:48:08.820 [INFO][5732] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="2e2b96de98c691eab85ee19efbb41e4a4ad79a1423450e5ecb9533377027fe73" iface="eth0" netns="" Oct 2 19:48:08.841431 env[1461]: 2023-10-02 19:48:08.820 [INFO][5732] k8s.go 583: Releasing IP address(es) ContainerID="2e2b96de98c691eab85ee19efbb41e4a4ad79a1423450e5ecb9533377027fe73" Oct 2 19:48:08.841431 env[1461]: 2023-10-02 19:48:08.820 [INFO][5732] utils.go 196: Calico CNI releasing IP address ContainerID="2e2b96de98c691eab85ee19efbb41e4a4ad79a1423450e5ecb9533377027fe73" Oct 2 19:48:08.841431 env[1461]: 2023-10-02 19:48:08.833 [INFO][5747] ipam_plugin.go 416: Releasing address using handleID ContainerID="2e2b96de98c691eab85ee19efbb41e4a4ad79a1423450e5ecb9533377027fe73" HandleID="k8s-pod-network.2e2b96de98c691eab85ee19efbb41e4a4ad79a1423450e5ecb9533377027fe73" Workload="ci--3510.3.0--a--b66ea99ec2-k8s-coredns--787d4945fb--p6twp-eth0" Oct 2 19:48:08.841431 env[1461]: time="2023-10-02T19:48:08Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:48:08.841431 env[1461]: time="2023-10-02T19:48:08Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:48:08.841431 env[1461]: 2023-10-02 19:48:08.838 [WARNING][5747] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="2e2b96de98c691eab85ee19efbb41e4a4ad79a1423450e5ecb9533377027fe73" HandleID="k8s-pod-network.2e2b96de98c691eab85ee19efbb41e4a4ad79a1423450e5ecb9533377027fe73" Workload="ci--3510.3.0--a--b66ea99ec2-k8s-coredns--787d4945fb--p6twp-eth0" Oct 2 19:48:08.841431 env[1461]: 2023-10-02 19:48:08.838 [INFO][5747] ipam_plugin.go 444: Releasing address using workloadID ContainerID="2e2b96de98c691eab85ee19efbb41e4a4ad79a1423450e5ecb9533377027fe73" HandleID="k8s-pod-network.2e2b96de98c691eab85ee19efbb41e4a4ad79a1423450e5ecb9533377027fe73" Workload="ci--3510.3.0--a--b66ea99ec2-k8s-coredns--787d4945fb--p6twp-eth0" Oct 2 19:48:08.841431 env[1461]: time="2023-10-02T19:48:08Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:48:08.841431 env[1461]: 2023-10-02 19:48:08.840 [INFO][5732] k8s.go 589: Teardown processing complete. ContainerID="2e2b96de98c691eab85ee19efbb41e4a4ad79a1423450e5ecb9533377027fe73" Oct 2 19:48:08.841843 env[1461]: time="2023-10-02T19:48:08.841449383Z" level=info msg="TearDown network for sandbox \"2e2b96de98c691eab85ee19efbb41e4a4ad79a1423450e5ecb9533377027fe73\" successfully" Oct 2 19:48:08.841843 env[1461]: time="2023-10-02T19:48:08.841477551Z" level=info msg="StopPodSandbox for \"2e2b96de98c691eab85ee19efbb41e4a4ad79a1423450e5ecb9533377027fe73\" returns successfully" Oct 2 19:48:08.841843 env[1461]: time="2023-10-02T19:48:08.841762711Z" level=info msg="RemovePodSandbox for \"2e2b96de98c691eab85ee19efbb41e4a4ad79a1423450e5ecb9533377027fe73\"" Oct 2 19:48:08.841843 env[1461]: time="2023-10-02T19:48:08.841785467Z" level=info msg="Forcibly stopping sandbox \"2e2b96de98c691eab85ee19efbb41e4a4ad79a1423450e5ecb9533377027fe73\"" Oct 2 19:48:08.889558 env[1461]: 2023-10-02 19:48:08.866 [WARNING][5777] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="2e2b96de98c691eab85ee19efbb41e4a4ad79a1423450e5ecb9533377027fe73" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--b66ea99ec2-k8s-coredns--787d4945fb--p6twp-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"365d9e2c-338a-4964-844b-392b2e4962e8", ResourceVersion:"729", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 19, 47, 23, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-b66ea99ec2", ContainerID:"2ae08ec5e2703c1e64cfbbba8b6be6ea337f5c38a5e7200dc36d419d5d7bad88", Pod:"coredns-787d4945fb-p6twp", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.76.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali3d72f50ed48", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 19:48:08.889558 env[1461]: 2023-10-02 19:48:08.866 [INFO][5777] k8s.go 576: Cleaning up netns ContainerID="2e2b96de98c691eab85ee19efbb41e4a4ad79a1423450e5ecb9533377027fe73" Oct 2 19:48:08.889558 env[1461]: 2023-10-02 19:48:08.866 [INFO][5777] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="2e2b96de98c691eab85ee19efbb41e4a4ad79a1423450e5ecb9533377027fe73" iface="eth0" netns="" Oct 2 19:48:08.889558 env[1461]: 2023-10-02 19:48:08.866 [INFO][5777] k8s.go 583: Releasing IP address(es) ContainerID="2e2b96de98c691eab85ee19efbb41e4a4ad79a1423450e5ecb9533377027fe73" Oct 2 19:48:08.889558 env[1461]: 2023-10-02 19:48:08.866 [INFO][5777] utils.go 196: Calico CNI releasing IP address ContainerID="2e2b96de98c691eab85ee19efbb41e4a4ad79a1423450e5ecb9533377027fe73" Oct 2 19:48:08.889558 env[1461]: 2023-10-02 19:48:08.880 [INFO][5791] ipam_plugin.go 416: Releasing address using handleID ContainerID="2e2b96de98c691eab85ee19efbb41e4a4ad79a1423450e5ecb9533377027fe73" HandleID="k8s-pod-network.2e2b96de98c691eab85ee19efbb41e4a4ad79a1423450e5ecb9533377027fe73" Workload="ci--3510.3.0--a--b66ea99ec2-k8s-coredns--787d4945fb--p6twp-eth0" Oct 2 19:48:08.889558 env[1461]: time="2023-10-02T19:48:08Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 19:48:08.889558 env[1461]: time="2023-10-02T19:48:08Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 19:48:08.889558 env[1461]: 2023-10-02 19:48:08.886 [WARNING][5791] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="2e2b96de98c691eab85ee19efbb41e4a4ad79a1423450e5ecb9533377027fe73" HandleID="k8s-pod-network.2e2b96de98c691eab85ee19efbb41e4a4ad79a1423450e5ecb9533377027fe73" Workload="ci--3510.3.0--a--b66ea99ec2-k8s-coredns--787d4945fb--p6twp-eth0" Oct 2 19:48:08.889558 env[1461]: 2023-10-02 19:48:08.886 [INFO][5791] ipam_plugin.go 444: Releasing address using workloadID ContainerID="2e2b96de98c691eab85ee19efbb41e4a4ad79a1423450e5ecb9533377027fe73" HandleID="k8s-pod-network.2e2b96de98c691eab85ee19efbb41e4a4ad79a1423450e5ecb9533377027fe73" Workload="ci--3510.3.0--a--b66ea99ec2-k8s-coredns--787d4945fb--p6twp-eth0" Oct 2 19:48:08.889558 env[1461]: time="2023-10-02T19:48:08Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 19:48:08.889558 env[1461]: 2023-10-02 19:48:08.888 [INFO][5777] k8s.go 589: Teardown processing complete. ContainerID="2e2b96de98c691eab85ee19efbb41e4a4ad79a1423450e5ecb9533377027fe73" Oct 2 19:48:08.889990 env[1461]: time="2023-10-02T19:48:08.889558309Z" level=info msg="TearDown network for sandbox \"2e2b96de98c691eab85ee19efbb41e4a4ad79a1423450e5ecb9533377027fe73\" successfully" Oct 2 19:48:08.891234 env[1461]: time="2023-10-02T19:48:08.891190281Z" level=info msg="RemovePodSandbox \"2e2b96de98c691eab85ee19efbb41e4a4ad79a1423450e5ecb9533377027fe73\" returns successfully" Oct 2 19:48:09.653000 audit[2432]: AVC avc: denied { watch } for pid=2432 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c275,c430 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:48:09.653000 audit[2432]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002c811c0 a2=fc6 a3=0 items=0 ppid=2271 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c275,c430 key=(null) Oct 2 19:48:09.858168 kernel: audit: type=1400 audit(1696276089.653:1383): avc: denied { watch } for pid=2432 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c275,c430 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:48:09.858208 kernel: audit: type=1300 audit(1696276089.653:1383): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002c811c0 a2=fc6 a3=0 items=0 ppid=2271 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c275,c430 key=(null) Oct 2 19:48:09.858226 kernel: audit: type=1327 audit(1696276089.653:1383): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:48:09.653000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:48:09.949640 kernel: audit: type=1400 audit(1696276089.653:1384): avc: denied { watch } for pid=2432 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c275,c430 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:48:09.653000 audit[2432]: AVC avc: denied { watch } for pid=2432 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c275,c430 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:48:09.653000 audit[2432]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002c811e0 a2=fc6 a3=0 items=0 ppid=2271 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c275,c430 key=(null) Oct 2 19:48:09.653000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:48:09.655000 audit[2432]: AVC avc: denied { watch } for pid=2432 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c275,c430 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:48:09.655000 audit[2432]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0027065e0 a2=fc6 a3=0 items=0 ppid=2271 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c275,c430 key=(null) Oct 2 19:48:09.655000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:48:09.655000 audit[2432]: AVC avc: denied { watch } for pid=2432 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c275,c430 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:48:09.655000 audit[2432]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c002c81200 a2=fc6 a3=0 items=0 ppid=2271 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c275,c430 key=(null) Oct 2 19:48:09.655000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:48:12.472594 env[1461]: time="2023-10-02T19:48:12.472488139Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\"" Oct 2 19:48:12.717746 env[1461]: time="2023-10-02T19:48:12.717589771Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:48:12.718657 env[1461]: time="2023-10-02T19:48:12.718526868Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:48:12.719016 kubelet[2613]: E1002 19:48:12.718963 2613 remote_image.go:171] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 19:48:12.720018 kubelet[2613]: E1002 19:48:12.719075 2613 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 19:48:12.720018 kubelet[2613]: E1002 19:48:12.719393 2613 kuberuntime_manager.go:872] container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.25.0,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:etccalico,ReadOnly:false,MountPath:/etc/calico,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,},VolumeMount{Name:kube-api-access-d9v5h,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod csi-node-driver-l8hvh_calico-system(ebb11106-5253-488c-9095-50c2b68f321c): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/csi:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/csi:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:48:12.721203 env[1461]: time="2023-10-02T19:48:12.721107330Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\"" Oct 2 19:48:12.960757 env[1461]: time="2023-10-02T19:48:12.960587699Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:48:12.961906 env[1461]: time="2023-10-02T19:48:12.961727406Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:48:12.962266 kubelet[2613]: E1002 19:48:12.962213 2613 remote_image.go:171] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 19:48:12.962458 kubelet[2613]: E1002 19:48:12.962327 2613 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 19:48:12.962571 kubelet[2613]: E1002 19:48:12.962527 2613 kuberuntime_manager.go:872] container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-d9v5h,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod csi-node-driver-l8hvh_calico-system(ebb11106-5253-488c-9095-50c2b68f321c): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:48:12.962871 kubelet[2613]: E1002 19:48:12.962671 2613 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/csi-node-driver-l8hvh" podUID=ebb11106-5253-488c-9095-50c2b68f321c Oct 2 19:48:16.475623 env[1461]: time="2023-10-02T19:48:16.475521241Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\"" Oct 2 19:48:16.718027 env[1461]: time="2023-10-02T19:48:16.717867096Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:48:16.719404 env[1461]: time="2023-10-02T19:48:16.719267479Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:48:16.719833 kubelet[2613]: E1002 19:48:16.719735 2613 remote_image.go:171] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:48:16.719833 kubelet[2613]: E1002 19:48:16.719820 2613 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:48:16.720749 kubelet[2613]: E1002 19:48:16.720055 2613 kuberuntime_manager.go:872] container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.25.0,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-tz6nf,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/version,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:90,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/code/filecheck],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:5,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:5,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*false,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod calico-apiserver-6955b54ffb-9s99f_calico-apiserver(310b30f1-9833-4562-98cb-ec9154e42258): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:48:16.720749 kubelet[2613]: E1002 19:48:16.720169 2613 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-apiserver/calico-apiserver-6955b54ffb-9s99f" podUID=310b30f1-9833-4562-98cb-ec9154e42258 Oct 2 19:48:19.471558 env[1461]: time="2023-10-02T19:48:19.471430654Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\"" Oct 2 19:48:19.725445 env[1461]: time="2023-10-02T19:48:19.725131222Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:48:19.726224 env[1461]: time="2023-10-02T19:48:19.726123356Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:48:19.726638 kubelet[2613]: E1002 19:48:19.726555 2613 remote_image.go:171] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:48:19.726638 kubelet[2613]: E1002 19:48:19.726642 2613 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:48:19.727487 kubelet[2613]: E1002 19:48:19.726876 2613 kuberuntime_manager.go:872] container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.25.0,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-26bxm,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/version,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:90,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/code/filecheck],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:5,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:5,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*false,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod calico-apiserver-6955b54ffb-xptd5_calico-apiserver(1c17f6ed-b372-41fa-b684-1123dfeeec16): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:48:19.727487 kubelet[2613]: E1002 19:48:19.726983 2613 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-apiserver/calico-apiserver-6955b54ffb-xptd5" podUID=1c17f6ed-b372-41fa-b684-1123dfeeec16 Oct 2 19:48:28.472344 kubelet[2613]: E1002 19:48:28.472247 2613 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-6955b54ffb-9s99f" podUID=310b30f1-9833-4562-98cb-ec9154e42258 Oct 2 19:48:28.473813 kubelet[2613]: E1002 19:48:28.473085 2613 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-l8hvh" podUID=ebb11106-5253-488c-9095-50c2b68f321c Oct 2 19:48:34.471326 kubelet[2613]: E1002 19:48:34.471236 2613 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-6955b54ffb-xptd5" podUID=1c17f6ed-b372-41fa-b684-1123dfeeec16 Oct 2 19:48:38.818025 systemd[1]: Started sshd@12-145.40.82.213:22-27.154.63.190:2074.service. Oct 2 19:48:38.817000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-145.40.82.213:22-27.154.63.190:2074 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:48:38.844968 kernel: kauditd_printk_skb: 8 callbacks suppressed Oct 2 19:48:38.845009 kernel: audit: type=1130 audit(1696276118.817:1387): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-145.40.82.213:22-27.154.63.190:2074 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:48:39.472138 env[1461]: time="2023-10-02T19:48:39.472050773Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\"" Oct 2 19:48:39.727921 env[1461]: time="2023-10-02T19:48:39.727647075Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:48:39.728936 env[1461]: time="2023-10-02T19:48:39.728796323Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:48:39.729279 kubelet[2613]: E1002 19:48:39.729236 2613 remote_image.go:171] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:48:39.729986 kubelet[2613]: E1002 19:48:39.729350 2613 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:48:39.729986 kubelet[2613]: E1002 19:48:39.729583 2613 kuberuntime_manager.go:872] container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.25.0,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-tz6nf,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/version,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:90,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/code/filecheck],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:5,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:5,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*false,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod calico-apiserver-6955b54ffb-9s99f_calico-apiserver(310b30f1-9833-4562-98cb-ec9154e42258): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:48:39.729986 kubelet[2613]: E1002 19:48:39.729680 2613 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-apiserver/calico-apiserver-6955b54ffb-9s99f" podUID=310b30f1-9833-4562-98cb-ec9154e42258 Oct 2 19:48:40.472644 env[1461]: time="2023-10-02T19:48:40.472552026Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\"" Oct 2 19:48:40.712709 env[1461]: time="2023-10-02T19:48:40.712589989Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:48:40.713907 env[1461]: time="2023-10-02T19:48:40.713749302Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:48:40.714245 kubelet[2613]: E1002 19:48:40.714201 2613 remote_image.go:171] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 19:48:40.714500 kubelet[2613]: E1002 19:48:40.714287 2613 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 19:48:40.714656 kubelet[2613]: E1002 19:48:40.714591 2613 kuberuntime_manager.go:872] container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.25.0,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:etccalico,ReadOnly:false,MountPath:/etc/calico,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,},VolumeMount{Name:kube-api-access-d9v5h,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod csi-node-driver-l8hvh_calico-system(ebb11106-5253-488c-9095-50c2b68f321c): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/csi:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/csi:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:48:40.716318 env[1461]: time="2023-10-02T19:48:40.716236645Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\"" Oct 2 19:48:40.982045 env[1461]: time="2023-10-02T19:48:40.981871632Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:48:40.994772 env[1461]: time="2023-10-02T19:48:40.994625749Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:48:40.995190 kubelet[2613]: E1002 19:48:40.995097 2613 remote_image.go:171] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 19:48:40.995190 kubelet[2613]: E1002 19:48:40.995188 2613 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 19:48:40.996069 kubelet[2613]: E1002 19:48:40.995423 2613 kuberuntime_manager.go:872] container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-d9v5h,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod csi-node-driver-l8hvh_calico-system(ebb11106-5253-488c-9095-50c2b68f321c): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:48:40.996069 kubelet[2613]: E1002 19:48:40.995626 2613 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/csi-node-driver-l8hvh" podUID=ebb11106-5253-488c-9095-50c2b68f321c Oct 2 19:48:44.118119 sshd[6037]: Invalid user rundeck from 27.154.63.190 port 2074 Oct 2 19:48:44.124212 sshd[6037]: pam_faillock(sshd:auth): User unknown Oct 2 19:48:44.125362 sshd[6037]: pam_unix(sshd:auth): check pass; user unknown Oct 2 19:48:44.125495 sshd[6037]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.154.63.190 Oct 2 19:48:44.126590 sshd[6037]: pam_faillock(sshd:auth): User unknown Oct 2 19:48:44.125000 audit[6037]: USER_AUTH pid=6037 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="rundeck" exe="/usr/sbin/sshd" hostname=27.154.63.190 addr=27.154.63.190 terminal=ssh res=failed' Oct 2 19:48:44.213355 kernel: audit: type=1100 audit(1696276124.125:1388): pid=6037 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="rundeck" exe="/usr/sbin/sshd" hostname=27.154.63.190 addr=27.154.63.190 terminal=ssh res=failed' Oct 2 19:48:46.803921 sshd[6037]: Failed password for invalid user rundeck from 27.154.63.190 port 2074 ssh2 Oct 2 19:48:47.242074 sshd[6037]: Received disconnect from 27.154.63.190 port 2074:11: Bye Bye [preauth] Oct 2 19:48:47.242074 sshd[6037]: Disconnected from invalid user rundeck 27.154.63.190 port 2074 [preauth] Oct 2 19:48:47.244560 systemd[1]: sshd@12-145.40.82.213:22-27.154.63.190:2074.service: Deactivated successfully. Oct 2 19:48:47.243000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-145.40.82.213:22-27.154.63.190:2074 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:48:47.333516 kernel: audit: type=1131 audit(1696276127.243:1389): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-145.40.82.213:22-27.154.63.190:2074 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:48:47.741322 systemd[1]: Started sshd@13-145.40.82.213:22-182.43.83.179:50316.service. Oct 2 19:48:47.740000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-145.40.82.213:22-182.43.83.179:50316 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:48:47.829349 kernel: audit: type=1130 audit(1696276127.740:1390): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-145.40.82.213:22-182.43.83.179:50316 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:48:48.118393 sshd[1631]: Timeout before authentication for 182.43.83.179 port 42414 Oct 2 19:48:48.119844 systemd[1]: sshd@9-145.40.82.213:22-182.43.83.179:42414.service: Deactivated successfully. Oct 2 19:48:48.119000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-145.40.82.213:22-182.43.83.179:42414 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:48:48.213382 kernel: audit: type=1131 audit(1696276128.119:1391): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-145.40.82.213:22-182.43.83.179:42414 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:48:48.722740 sshd[6114]: Invalid user jose from 182.43.83.179 port 50316 Oct 2 19:48:48.729336 sshd[6114]: pam_faillock(sshd:auth): User unknown Oct 2 19:48:48.730243 sshd[6114]: pam_unix(sshd:auth): check pass; user unknown Oct 2 19:48:48.730351 sshd[6114]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.43.83.179 Oct 2 19:48:48.731189 sshd[6114]: pam_faillock(sshd:auth): User unknown Oct 2 19:48:48.730000 audit[6114]: USER_AUTH pid=6114 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="jose" exe="/usr/sbin/sshd" hostname=182.43.83.179 addr=182.43.83.179 terminal=ssh res=failed' Oct 2 19:48:48.826381 kernel: audit: type=1100 audit(1696276128.730:1392): pid=6114 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="jose" exe="/usr/sbin/sshd" hostname=182.43.83.179 addr=182.43.83.179 terminal=ssh res=failed' Oct 2 19:48:49.472532 env[1461]: time="2023-10-02T19:48:49.472393034Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\"" Oct 2 19:48:49.706825 env[1461]: time="2023-10-02T19:48:49.706652425Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:48:49.707919 env[1461]: time="2023-10-02T19:48:49.707818094Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:48:49.708328 kubelet[2613]: E1002 19:48:49.708256 2613 remote_image.go:171] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:48:49.709052 kubelet[2613]: E1002 19:48:49.708389 2613 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:48:49.709052 kubelet[2613]: E1002 19:48:49.708661 2613 kuberuntime_manager.go:872] container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.25.0,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-26bxm,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/version,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:90,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/code/filecheck],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:5,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:5,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*false,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod calico-apiserver-6955b54ffb-xptd5_calico-apiserver(1c17f6ed-b372-41fa-b684-1123dfeeec16): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:48:49.709052 kubelet[2613]: E1002 19:48:49.708786 2613 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-apiserver/calico-apiserver-6955b54ffb-xptd5" podUID=1c17f6ed-b372-41fa-b684-1123dfeeec16 Oct 2 19:48:50.620578 sshd[6114]: Failed password for invalid user jose from 182.43.83.179 port 50316 ssh2 Oct 2 19:48:52.472238 kubelet[2613]: E1002 19:48:52.472137 2613 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-6955b54ffb-9s99f" podUID=310b30f1-9833-4562-98cb-ec9154e42258 Oct 2 19:48:52.593122 sshd[6114]: Received disconnect from 182.43.83.179 port 50316:11: Bye Bye [preauth] Oct 2 19:48:52.593122 sshd[6114]: Disconnected from invalid user jose 182.43.83.179 port 50316 [preauth] Oct 2 19:48:52.595814 systemd[1]: sshd@13-145.40.82.213:22-182.43.83.179:50316.service: Deactivated successfully. Oct 2 19:48:52.595000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-145.40.82.213:22-182.43.83.179:50316 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:48:52.688408 kernel: audit: type=1131 audit(1696276132.595:1393): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-145.40.82.213:22-182.43.83.179:50316 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:48:53.473060 kubelet[2613]: E1002 19:48:53.472948 2613 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-l8hvh" podUID=ebb11106-5253-488c-9095-50c2b68f321c Oct 2 19:49:01.471709 kubelet[2613]: E1002 19:49:01.471600 2613 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-6955b54ffb-xptd5" podUID=1c17f6ed-b372-41fa-b684-1123dfeeec16 Oct 2 19:49:05.123000 audit[2432]: AVC avc: denied { watch } for pid=2432 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c275,c430 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:49:05.123000 audit[2432]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002e4aea0 a2=fc6 a3=0 items=0 ppid=2271 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c275,c430 key=(null) Oct 2 19:49:05.339213 kernel: audit: type=1400 audit(1696276145.123:1394): avc: denied { watch } for pid=2432 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c275,c430 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:49:05.339277 kernel: audit: type=1300 audit(1696276145.123:1394): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002e4aea0 a2=fc6 a3=0 items=0 ppid=2271 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c275,c430 key=(null) Oct 2 19:49:05.339321 kernel: audit: type=1327 audit(1696276145.123:1394): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:49:05.123000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:49:05.123000 audit[2432]: AVC avc: denied { watch } for pid=2432 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c275,c430 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:49:05.525924 kernel: audit: type=1400 audit(1696276145.123:1395): avc: denied { watch } for pid=2432 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c275,c430 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:49:05.525958 kernel: audit: type=1300 audit(1696276145.123:1395): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0020408c0 a2=fc6 a3=0 items=0 ppid=2271 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c275,c430 key=(null) Oct 2 19:49:05.123000 audit[2432]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0020408c0 a2=fc6 a3=0 items=0 ppid=2271 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c275,c430 key=(null) Oct 2 19:49:05.646479 kernel: audit: type=1327 audit(1696276145.123:1395): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:49:05.123000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:49:05.739721 kernel: audit: type=1400 audit(1696276145.226:1396): avc: denied { watch } for pid=2430 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c581,c935 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:49:05.226000 audit[2430]: AVC avc: denied { watch } for pid=2430 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c581,c935 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:49:05.831003 kernel: audit: type=1300 audit(1696276145.226:1396): arch=c000003e syscall=254 success=no exit=-13 a0=6d a1=c0134aa060 a2=fc6 a3=0 items=0 ppid=2280 pid=2430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c581,c935 key=(null) Oct 2 19:49:05.226000 audit[2430]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6d a1=c0134aa060 a2=fc6 a3=0 items=0 ppid=2280 pid=2430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c581,c935 key=(null) Oct 2 19:49:05.929643 kernel: audit: type=1327 audit(1696276145.226:1396): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134352E34302E38322E323133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:49:05.226000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134352E34302E38322E323133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:49:06.023754 kernel: audit: type=1400 audit(1696276145.226:1397): avc: denied { watch } for pid=2430 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=521268 scontext=system_u:system_r:svirt_lxc_net_t:s0:c581,c935 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:49:05.226000 audit[2430]: AVC avc: denied { watch } for pid=2430 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=521268 scontext=system_u:system_r:svirt_lxc_net_t:s0:c581,c935 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:49:05.226000 audit[2430]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6e a1=c012a1e960 a2=fc6 a3=0 items=0 ppid=2280 pid=2430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c581,c935 key=(null) Oct 2 19:49:05.226000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134352E34302E38322E323133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:49:05.226000 audit[2430]: AVC avc: denied { watch } for pid=2430 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c581,c935 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:49:05.226000 audit[2430]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6d a1=c00c3aa7a0 a2=fc6 a3=0 items=0 ppid=2280 pid=2430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c581,c935 key=(null) Oct 2 19:49:05.226000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134352E34302E38322E323133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:49:05.227000 audit[2430]: AVC avc: denied { watch } for pid=2430 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c581,c935 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:49:05.227000 audit[2430]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6d a1=c014fee330 a2=fc6 a3=0 items=0 ppid=2280 pid=2430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c581,c935 key=(null) Oct 2 19:49:05.227000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134352E34302E38322E323133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:49:05.227000 audit[2430]: AVC avc: denied { watch } for pid=2430 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c581,c935 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:49:05.227000 audit[2430]: AVC avc: denied { watch } for pid=2430 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=521274 scontext=system_u:system_r:svirt_lxc_net_t:s0:c581,c935 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:49:05.227000 audit[2430]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6f a1=c00440e040 a2=fc6 a3=0 items=0 ppid=2280 pid=2430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c581,c935 key=(null) Oct 2 19:49:05.227000 audit[2430]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6e a1=c014fee3c0 a2=fc6 a3=0 items=0 ppid=2280 pid=2430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c581,c935 key=(null) Oct 2 19:49:05.227000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134352E34302E38322E323133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:49:05.227000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134352E34302E38322E323133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:49:06.472174 kubelet[2613]: E1002 19:49:06.472005 2613 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-6955b54ffb-9s99f" podUID=310b30f1-9833-4562-98cb-ec9154e42258 Oct 2 19:49:06.473191 kubelet[2613]: E1002 19:49:06.472789 2613 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-l8hvh" podUID=ebb11106-5253-488c-9095-50c2b68f321c Oct 2 19:49:09.653000 audit[2432]: AVC avc: denied { watch } for pid=2432 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c275,c430 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:49:09.653000 audit[2432]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0001cdc80 a2=fc6 a3=0 items=0 ppid=2271 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c275,c430 key=(null) Oct 2 19:49:09.653000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:49:09.654000 audit[2432]: AVC avc: denied { watch } for pid=2432 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c275,c430 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:49:09.654000 audit[2432]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c002040c00 a2=fc6 a3=0 items=0 ppid=2271 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c275,c430 key=(null) Oct 2 19:49:09.654000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:49:09.655000 audit[2432]: AVC avc: denied { watch } for pid=2432 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c275,c430 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:49:09.655000 audit[2432]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002040c20 a2=fc6 a3=0 items=0 ppid=2271 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c275,c430 key=(null) Oct 2 19:49:09.655000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:49:09.655000 audit[2432]: AVC avc: denied { watch } for pid=2432 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c275,c430 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:49:09.655000 audit[2432]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c0001cdce0 a2=fc6 a3=0 items=0 ppid=2271 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c275,c430 key=(null) Oct 2 19:49:09.655000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:49:15.470344 kubelet[2613]: E1002 19:49:15.470314 2613 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-6955b54ffb-xptd5" podUID=1c17f6ed-b372-41fa-b684-1123dfeeec16 Oct 2 19:49:18.472120 kubelet[2613]: E1002 19:49:18.472056 2613 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-6955b54ffb-9s99f" podUID=310b30f1-9833-4562-98cb-ec9154e42258 Oct 2 19:49:19.471834 kubelet[2613]: E1002 19:49:19.471779 2613 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-l8hvh" podUID=ebb11106-5253-488c-9095-50c2b68f321c Oct 2 19:49:27.471550 kubelet[2613]: E1002 19:49:27.471365 2613 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-6955b54ffb-xptd5" podUID=1c17f6ed-b372-41fa-b684-1123dfeeec16 Oct 2 19:49:29.472579 env[1461]: time="2023-10-02T19:49:29.472453396Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\"" Oct 2 19:49:29.729615 env[1461]: time="2023-10-02T19:49:29.729336421Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:49:29.730603 env[1461]: time="2023-10-02T19:49:29.730467450Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:49:29.730961 kubelet[2613]: E1002 19:49:29.730905 2613 remote_image.go:171] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:49:29.731959 kubelet[2613]: E1002 19:49:29.730991 2613 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:49:29.731959 kubelet[2613]: E1002 19:49:29.731219 2613 kuberuntime_manager.go:872] container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.25.0,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-tz6nf,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/version,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:90,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/code/filecheck],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:5,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:5,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*false,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod calico-apiserver-6955b54ffb-9s99f_calico-apiserver(310b30f1-9833-4562-98cb-ec9154e42258): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:49:29.731959 kubelet[2613]: E1002 19:49:29.731336 2613 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-apiserver/calico-apiserver-6955b54ffb-9s99f" podUID=310b30f1-9833-4562-98cb-ec9154e42258 Oct 2 19:49:33.472532 env[1461]: time="2023-10-02T19:49:33.472406184Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\"" Oct 2 19:49:33.709186 env[1461]: time="2023-10-02T19:49:33.709030543Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:49:33.710378 env[1461]: time="2023-10-02T19:49:33.710230966Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:49:33.710778 kubelet[2613]: E1002 19:49:33.710734 2613 remote_image.go:171] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 19:49:33.711704 kubelet[2613]: E1002 19:49:33.710821 2613 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 19:49:33.711704 kubelet[2613]: E1002 19:49:33.711067 2613 kuberuntime_manager.go:872] container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.25.0,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:etccalico,ReadOnly:false,MountPath:/etc/calico,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,},VolumeMount{Name:kube-api-access-d9v5h,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod csi-node-driver-l8hvh_calico-system(ebb11106-5253-488c-9095-50c2b68f321c): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/csi:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/csi:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:49:33.712669 env[1461]: time="2023-10-02T19:49:33.712606252Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\"" Oct 2 19:49:33.949991 env[1461]: time="2023-10-02T19:49:33.949956764Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:49:33.950282 env[1461]: time="2023-10-02T19:49:33.950266696Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:49:33.950392 kubelet[2613]: E1002 19:49:33.950353 2613 remote_image.go:171] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 19:49:33.950392 kubelet[2613]: E1002 19:49:33.950372 2613 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 19:49:33.950483 kubelet[2613]: E1002 19:49:33.950424 2613 kuberuntime_manager.go:872] container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-d9v5h,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod csi-node-driver-l8hvh_calico-system(ebb11106-5253-488c-9095-50c2b68f321c): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:49:33.950483 kubelet[2613]: E1002 19:49:33.950455 2613 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/csi-node-driver-l8hvh" podUID=ebb11106-5253-488c-9095-50c2b68f321c Oct 2 19:49:38.473107 env[1461]: time="2023-10-02T19:49:38.473014139Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\"" Oct 2 19:49:38.721319 env[1461]: time="2023-10-02T19:49:38.721155673Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:49:38.722182 env[1461]: time="2023-10-02T19:49:38.722047589Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:49:38.722576 kubelet[2613]: E1002 19:49:38.722532 2613 remote_image.go:171] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:49:38.723552 kubelet[2613]: E1002 19:49:38.722619 2613 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:49:38.723552 kubelet[2613]: E1002 19:49:38.722881 2613 kuberuntime_manager.go:872] container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.25.0,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-26bxm,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/version,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:90,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/code/filecheck],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:5,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:5,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*false,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod calico-apiserver-6955b54ffb-xptd5_calico-apiserver(1c17f6ed-b372-41fa-b684-1123dfeeec16): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:49:38.723552 kubelet[2613]: E1002 19:49:38.722981 2613 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-apiserver/calico-apiserver-6955b54ffb-xptd5" podUID=1c17f6ed-b372-41fa-b684-1123dfeeec16 Oct 2 19:49:41.471082 kubelet[2613]: E1002 19:49:41.470986 2613 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-6955b54ffb-9s99f" podUID=310b30f1-9833-4562-98cb-ec9154e42258 Oct 2 19:49:44.472556 kubelet[2613]: E1002 19:49:44.472461 2613 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-l8hvh" podUID=ebb11106-5253-488c-9095-50c2b68f321c Oct 2 19:49:45.433259 systemd[1]: Started sshd@14-145.40.82.213:22-101.33.80.197:50640.service. Oct 2 19:49:45.432000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-145.40.82.213:22-101.33.80.197:50640 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:49:45.460823 kernel: kauditd_printk_skb: 26 callbacks suppressed Oct 2 19:49:45.460902 kernel: audit: type=1130 audit(1696276185.432:1406): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-145.40.82.213:22-101.33.80.197:50640 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:49:46.986684 sshd[6578]: Invalid user tstar from 101.33.80.197 port 50640 Oct 2 19:49:46.992685 sshd[6578]: pam_faillock(sshd:auth): User unknown Oct 2 19:49:46.993688 sshd[6578]: pam_unix(sshd:auth): check pass; user unknown Oct 2 19:49:46.993777 sshd[6578]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.33.80.197 Oct 2 19:49:46.994807 sshd[6578]: pam_faillock(sshd:auth): User unknown Oct 2 19:49:46.993000 audit[6578]: USER_AUTH pid=6578 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="tstar" exe="/usr/sbin/sshd" hostname=101.33.80.197 addr=101.33.80.197 terminal=ssh res=failed' Oct 2 19:49:47.086519 kernel: audit: type=1100 audit(1696276186.993:1407): pid=6578 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="tstar" exe="/usr/sbin/sshd" hostname=101.33.80.197 addr=101.33.80.197 terminal=ssh res=failed' Oct 2 19:49:48.848573 sshd[6578]: Failed password for invalid user tstar from 101.33.80.197 port 50640 ssh2 Oct 2 19:49:50.528413 sshd[6578]: Received disconnect from 101.33.80.197 port 50640:11: Bye Bye [preauth] Oct 2 19:49:50.528413 sshd[6578]: Disconnected from invalid user tstar 101.33.80.197 port 50640 [preauth] Oct 2 19:49:50.529898 systemd[1]: sshd@14-145.40.82.213:22-101.33.80.197:50640.service: Deactivated successfully. Oct 2 19:49:50.528000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-145.40.82.213:22-101.33.80.197:50640 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:49:50.627359 kernel: audit: type=1131 audit(1696276190.528:1408): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-145.40.82.213:22-101.33.80.197:50640 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:49:51.471769 kubelet[2613]: E1002 19:49:51.471664 2613 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-6955b54ffb-xptd5" podUID=1c17f6ed-b372-41fa-b684-1123dfeeec16 Oct 2 19:49:55.471236 kubelet[2613]: E1002 19:49:55.471136 2613 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-6955b54ffb-9s99f" podUID=310b30f1-9833-4562-98cb-ec9154e42258 Oct 2 19:49:59.472051 kubelet[2613]: E1002 19:49:59.471989 2613 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-l8hvh" podUID=ebb11106-5253-488c-9095-50c2b68f321c Oct 2 19:50:05.123000 audit[2432]: AVC avc: denied { watch } for pid=2432 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c275,c430 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:50:05.123000 audit[2432]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0023ac980 a2=fc6 a3=0 items=0 ppid=2271 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c275,c430 key=(null) Oct 2 19:50:05.337991 kernel: audit: type=1400 audit(1696276205.123:1409): avc: denied { watch } for pid=2432 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c275,c430 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:50:05.338035 kernel: audit: type=1300 audit(1696276205.123:1409): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0023ac980 a2=fc6 a3=0 items=0 ppid=2271 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c275,c430 key=(null) Oct 2 19:50:05.338051 kernel: audit: type=1327 audit(1696276205.123:1409): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:50:05.123000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:50:05.431671 kernel: audit: type=1400 audit(1696276205.123:1410): avc: denied { watch } for pid=2432 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c275,c430 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:50:05.123000 audit[2432]: AVC avc: denied { watch } for pid=2432 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c275,c430 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:50:05.522762 kernel: audit: type=1300 audit(1696276205.123:1410): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002c8d0e0 a2=fc6 a3=0 items=0 ppid=2271 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c275,c430 key=(null) Oct 2 19:50:05.123000 audit[2432]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002c8d0e0 a2=fc6 a3=0 items=0 ppid=2271 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c275,c430 key=(null) Oct 2 19:50:05.643302 kernel: audit: type=1327 audit(1696276205.123:1410): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:50:05.123000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:50:05.736458 kernel: audit: type=1400 audit(1696276205.226:1411): avc: denied { watch } for pid=2430 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c581,c935 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:50:05.226000 audit[2430]: AVC avc: denied { watch } for pid=2430 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c581,c935 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:50:05.226000 audit[2430]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c00cb27a40 a2=fc6 a3=0 items=0 ppid=2280 pid=2430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c581,c935 key=(null) Oct 2 19:50:05.925756 kernel: audit: type=1300 audit(1696276205.226:1411): arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c00cb27a40 a2=fc6 a3=0 items=0 ppid=2280 pid=2430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c581,c935 key=(null) Oct 2 19:50:05.925791 kernel: audit: type=1327 audit(1696276205.226:1411): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134352E34302E38322E323133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:50:05.226000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134352E34302E38322E323133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:50:06.018901 kernel: audit: type=1400 audit(1696276205.226:1412): avc: denied { watch } for pid=2430 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=521268 scontext=system_u:system_r:svirt_lxc_net_t:s0:c581,c935 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:50:05.226000 audit[2430]: AVC avc: denied { watch } for pid=2430 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=521268 scontext=system_u:system_r:svirt_lxc_net_t:s0:c581,c935 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:50:05.226000 audit[2430]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c00bcd2120 a2=fc6 a3=0 items=0 ppid=2280 pid=2430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c581,c935 key=(null) Oct 2 19:50:05.226000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134352E34302E38322E323133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:50:05.226000 audit[2430]: AVC avc: denied { watch } for pid=2430 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c581,c935 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:50:05.226000 audit[2430]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c0029d9f20 a2=fc6 a3=0 items=0 ppid=2280 pid=2430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c581,c935 key=(null) Oct 2 19:50:05.226000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134352E34302E38322E323133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:50:05.227000 audit[2430]: AVC avc: denied { watch } for pid=2430 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c581,c935 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:50:05.227000 audit[2430]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c003125e80 a2=fc6 a3=0 items=0 ppid=2280 pid=2430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c581,c935 key=(null) Oct 2 19:50:05.227000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134352E34302E38322E323133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:50:05.227000 audit[2430]: AVC avc: denied { watch } for pid=2430 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=521274 scontext=system_u:system_r:svirt_lxc_net_t:s0:c581,c935 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:50:05.227000 audit[2430]: AVC avc: denied { watch } for pid=2430 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c581,c935 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:50:05.227000 audit[2430]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c01486bbc0 a2=fc6 a3=0 items=0 ppid=2280 pid=2430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c581,c935 key=(null) Oct 2 19:50:05.227000 audit[2430]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=66 a1=c00cc624e0 a2=fc6 a3=0 items=0 ppid=2280 pid=2430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c581,c935 key=(null) Oct 2 19:50:05.227000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134352E34302E38322E323133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:50:05.227000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134352E34302E38322E323133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:50:06.472005 kubelet[2613]: E1002 19:50:06.471947 2613 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-6955b54ffb-xptd5" podUID=1c17f6ed-b372-41fa-b684-1123dfeeec16 Oct 2 19:50:09.654000 audit[2432]: AVC avc: denied { watch } for pid=2432 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c275,c430 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:50:09.654000 audit[2432]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002aa7da0 a2=fc6 a3=0 items=0 ppid=2271 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c275,c430 key=(null) Oct 2 19:50:09.654000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:50:09.654000 audit[2432]: AVC avc: denied { watch } for pid=2432 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c275,c430 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:50:09.654000 audit[2432]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c002a657e0 a2=fc6 a3=0 items=0 ppid=2271 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c275,c430 key=(null) Oct 2 19:50:09.654000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:50:09.656000 audit[2432]: AVC avc: denied { watch } for pid=2432 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c275,c430 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:50:09.656000 audit[2432]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0023ace80 a2=fc6 a3=0 items=0 ppid=2271 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c275,c430 key=(null) Oct 2 19:50:09.656000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:50:09.656000 audit[2432]: AVC avc: denied { watch } for pid=2432 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c275,c430 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:50:09.656000 audit[2432]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c002a65800 a2=fc6 a3=0 items=0 ppid=2271 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c275,c430 key=(null) Oct 2 19:50:09.656000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:50:10.471849 kubelet[2613]: E1002 19:50:10.471786 2613 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-6955b54ffb-9s99f" podUID=310b30f1-9833-4562-98cb-ec9154e42258 Oct 2 19:50:13.473044 kubelet[2613]: E1002 19:50:13.472982 2613 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-l8hvh" podUID=ebb11106-5253-488c-9095-50c2b68f321c Oct 2 19:50:17.471088 kubelet[2613]: E1002 19:50:17.470972 2613 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-6955b54ffb-xptd5" podUID=1c17f6ed-b372-41fa-b684-1123dfeeec16 Oct 2 19:50:22.322213 systemd[1]: Started sshd@15-145.40.82.213:22-27.154.63.190:2075.service. Oct 2 19:50:22.322000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-145.40.82.213:22-27.154.63.190:2075 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:50:22.349282 kernel: kauditd_printk_skb: 26 callbacks suppressed Oct 2 19:50:22.349380 kernel: audit: type=1130 audit(1696276222.322:1421): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-145.40.82.213:22-27.154.63.190:2075 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:50:22.469697 kubelet[2613]: E1002 19:50:22.469635 2613 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-6955b54ffb-9s99f" podUID=310b30f1-9833-4562-98cb-ec9154e42258 Oct 2 19:50:24.473086 kubelet[2613]: E1002 19:50:24.473011 2613 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-l8hvh" podUID=ebb11106-5253-488c-9095-50c2b68f321c Oct 2 19:50:30.471320 kubelet[2613]: E1002 19:50:30.471191 2613 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-6955b54ffb-xptd5" podUID=1c17f6ed-b372-41fa-b684-1123dfeeec16 Oct 2 19:50:35.471644 kubelet[2613]: E1002 19:50:35.471568 2613 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-6955b54ffb-9s99f" podUID=310b30f1-9833-4562-98cb-ec9154e42258 Oct 2 19:50:37.472547 kubelet[2613]: E1002 19:50:37.472473 2613 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-l8hvh" podUID=ebb11106-5253-488c-9095-50c2b68f321c Oct 2 19:50:42.471197 kubelet[2613]: E1002 19:50:42.471101 2613 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-6955b54ffb-xptd5" podUID=1c17f6ed-b372-41fa-b684-1123dfeeec16 Oct 2 19:50:50.472665 env[1461]: time="2023-10-02T19:50:50.472500968Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\"" Oct 2 19:50:50.722147 env[1461]: time="2023-10-02T19:50:50.721995815Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:50:50.723490 env[1461]: time="2023-10-02T19:50:50.723246938Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:50:50.723828 kubelet[2613]: E1002 19:50:50.723743 2613 remote_image.go:171] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:50:50.723828 kubelet[2613]: E1002 19:50:50.723830 2613 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:50:50.724784 kubelet[2613]: E1002 19:50:50.724061 2613 kuberuntime_manager.go:872] container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.25.0,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-tz6nf,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/version,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:90,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/code/filecheck],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:5,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:5,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*false,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod calico-apiserver-6955b54ffb-9s99f_calico-apiserver(310b30f1-9833-4562-98cb-ec9154e42258): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:50:50.724784 kubelet[2613]: E1002 19:50:50.724157 2613 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-apiserver/calico-apiserver-6955b54ffb-9s99f" podUID=310b30f1-9833-4562-98cb-ec9154e42258 Oct 2 19:50:52.472168 kubelet[2613]: E1002 19:50:52.472075 2613 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-l8hvh" podUID=ebb11106-5253-488c-9095-50c2b68f321c Oct 2 19:50:57.471718 kubelet[2613]: E1002 19:50:57.471621 2613 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-6955b54ffb-xptd5" podUID=1c17f6ed-b372-41fa-b684-1123dfeeec16 Oct 2 19:51:02.471932 kubelet[2613]: E1002 19:51:02.471826 2613 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-6955b54ffb-9s99f" podUID=310b30f1-9833-4562-98cb-ec9154e42258 Oct 2 19:51:05.123000 audit[2432]: AVC avc: denied { watch } for pid=2432 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c275,c430 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:51:05.123000 audit[2432]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0010d9e60 a2=fc6 a3=0 items=0 ppid=2271 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c275,c430 key=(null) Oct 2 19:51:05.335989 kernel: audit: type=1400 audit(1696276265.123:1422): avc: denied { watch } for pid=2432 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c275,c430 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:51:05.336052 kernel: audit: type=1300 audit(1696276265.123:1422): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0010d9e60 a2=fc6 a3=0 items=0 ppid=2271 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c275,c430 key=(null) Oct 2 19:51:05.336069 kernel: audit: type=1327 audit(1696276265.123:1422): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:51:05.123000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:51:05.429168 kernel: audit: type=1400 audit(1696276265.123:1423): avc: denied { watch } for pid=2432 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c275,c430 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:51:05.123000 audit[2432]: AVC avc: denied { watch } for pid=2432 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c275,c430 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:51:05.520274 kernel: audit: type=1300 audit(1696276265.123:1423): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001b7dcb0 a2=fc6 a3=0 items=0 ppid=2271 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c275,c430 key=(null) Oct 2 19:51:05.123000 audit[2432]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001b7dcb0 a2=fc6 a3=0 items=0 ppid=2271 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c275,c430 key=(null) Oct 2 19:51:05.640368 kernel: audit: type=1327 audit(1696276265.123:1423): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:51:05.123000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:51:05.733276 kernel: audit: type=1400 audit(1696276265.225:1424): avc: denied { watch } for pid=2430 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=521268 scontext=system_u:system_r:svirt_lxc_net_t:s0:c581,c935 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:51:05.225000 audit[2430]: AVC avc: denied { watch } for pid=2430 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=521268 scontext=system_u:system_r:svirt_lxc_net_t:s0:c581,c935 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:51:05.823739 kernel: audit: type=1300 audit(1696276265.225:1424): arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c0125366f0 a2=fc6 a3=0 items=0 ppid=2280 pid=2430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c581,c935 key=(null) Oct 2 19:51:05.225000 audit[2430]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c0125366f0 a2=fc6 a3=0 items=0 ppid=2280 pid=2430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c581,c935 key=(null) Oct 2 19:51:05.921867 kernel: audit: type=1327 audit(1696276265.225:1424): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134352E34302E38322E323133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:51:05.225000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134352E34302E38322E323133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:51:06.014702 kernel: audit: type=1400 audit(1696276265.225:1425): avc: denied { watch } for pid=2430 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c581,c935 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:51:05.225000 audit[2430]: AVC avc: denied { watch } for pid=2430 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c581,c935 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:51:05.225000 audit[2430]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c00516fb60 a2=fc6 a3=0 items=0 ppid=2280 pid=2430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c581,c935 key=(null) Oct 2 19:51:05.225000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134352E34302E38322E323133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:51:05.225000 audit[2430]: AVC avc: denied { watch } for pid=2430 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c581,c935 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:51:05.225000 audit[2430]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c0024f1200 a2=fc6 a3=0 items=0 ppid=2280 pid=2430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c581,c935 key=(null) Oct 2 19:51:05.225000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134352E34302E38322E323133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:51:05.227000 audit[2430]: AVC avc: denied { watch } for pid=2430 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c581,c935 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:51:05.227000 audit[2430]: AVC avc: denied { watch } for pid=2430 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c581,c935 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:51:05.227000 audit[2430]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c00f4d99a0 a2=fc6 a3=0 items=0 ppid=2280 pid=2430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c581,c935 key=(null) Oct 2 19:51:05.227000 audit[2430]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c00fe99d70 a2=fc6 a3=0 items=0 ppid=2280 pid=2430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c581,c935 key=(null) Oct 2 19:51:05.227000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134352E34302E38322E323133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:51:05.227000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134352E34302E38322E323133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:51:05.227000 audit[2430]: AVC avc: denied { watch } for pid=2430 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=521274 scontext=system_u:system_r:svirt_lxc_net_t:s0:c581,c935 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:51:05.227000 audit[2430]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c00fe99dd0 a2=fc6 a3=0 items=0 ppid=2280 pid=2430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c581,c935 key=(null) Oct 2 19:51:05.227000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134352E34302E38322E323133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:51:07.472378 env[1461]: time="2023-10-02T19:51:07.472208585Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\"" Oct 2 19:51:07.741646 env[1461]: time="2023-10-02T19:51:07.741348922Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:51:07.742348 env[1461]: time="2023-10-02T19:51:07.742184039Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:51:07.742745 kubelet[2613]: E1002 19:51:07.742645 2613 remote_image.go:171] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 19:51:07.742745 kubelet[2613]: E1002 19:51:07.742750 2613 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 19:51:07.743710 kubelet[2613]: E1002 19:51:07.742960 2613 kuberuntime_manager.go:872] container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.25.0,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:etccalico,ReadOnly:false,MountPath:/etc/calico,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,},VolumeMount{Name:kube-api-access-d9v5h,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod csi-node-driver-l8hvh_calico-system(ebb11106-5253-488c-9095-50c2b68f321c): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/csi:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/csi:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:51:07.744703 env[1461]: time="2023-10-02T19:51:07.744628860Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\"" Oct 2 19:51:07.992793 env[1461]: time="2023-10-02T19:51:07.992553223Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:51:07.993669 env[1461]: time="2023-10-02T19:51:07.993566692Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:51:07.994047 kubelet[2613]: E1002 19:51:07.994001 2613 remote_image.go:171] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 19:51:07.994208 kubelet[2613]: E1002 19:51:07.994093 2613 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 19:51:07.994413 kubelet[2613]: E1002 19:51:07.994295 2613 kuberuntime_manager.go:872] container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-d9v5h,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod csi-node-driver-l8hvh_calico-system(ebb11106-5253-488c-9095-50c2b68f321c): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:51:07.994736 kubelet[2613]: E1002 19:51:07.994467 2613 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/csi-node-driver-l8hvh" podUID=ebb11106-5253-488c-9095-50c2b68f321c Oct 2 19:51:09.654000 audit[2432]: AVC avc: denied { watch } for pid=2432 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c275,c430 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:51:09.654000 audit[2432]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0027c5f80 a2=fc6 a3=0 items=0 ppid=2271 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c275,c430 key=(null) Oct 2 19:51:09.654000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:51:09.654000 audit[2432]: AVC avc: denied { watch } for pid=2432 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c275,c430 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:51:09.654000 audit[2432]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c000d09f80 a2=fc6 a3=0 items=0 ppid=2271 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c275,c430 key=(null) Oct 2 19:51:09.654000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:51:09.655000 audit[2432]: AVC avc: denied { watch } for pid=2432 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c275,c430 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:51:09.655000 audit[2432]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0001cd900 a2=fc6 a3=0 items=0 ppid=2271 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c275,c430 key=(null) Oct 2 19:51:09.655000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:51:09.655000 audit[2432]: AVC avc: denied { watch } for pid=2432 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c275,c430 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:51:09.655000 audit[2432]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=d a1=c001011da0 a2=fc6 a3=0 items=0 ppid=2271 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c275,c430 key=(null) Oct 2 19:51:09.655000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:51:10.472576 env[1461]: time="2023-10-02T19:51:10.472473585Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\"" Oct 2 19:51:10.695357 env[1461]: time="2023-10-02T19:51:10.695223798Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:51:10.696319 env[1461]: time="2023-10-02T19:51:10.696193839Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:51:10.696621 kubelet[2613]: E1002 19:51:10.696584 2613 remote_image.go:171] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:51:10.697204 kubelet[2613]: E1002 19:51:10.696653 2613 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:51:10.697204 kubelet[2613]: E1002 19:51:10.696842 2613 kuberuntime_manager.go:872] container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.25.0,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-26bxm,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/version,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:90,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/code/filecheck],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:5,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:5,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*false,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod calico-apiserver-6955b54ffb-xptd5_calico-apiserver(1c17f6ed-b372-41fa-b684-1123dfeeec16): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:51:10.697204 kubelet[2613]: E1002 19:51:10.696937 2613 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-apiserver/calico-apiserver-6955b54ffb-xptd5" podUID=1c17f6ed-b372-41fa-b684-1123dfeeec16 Oct 2 19:51:12.801370 systemd[1]: Started sshd@16-145.40.82.213:22-182.43.83.179:60592.service. Oct 2 19:51:12.800000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-145.40.82.213:22-182.43.83.179:60592 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:51:12.828515 kernel: kauditd_printk_skb: 26 callbacks suppressed Oct 2 19:51:12.828564 kernel: audit: type=1130 audit(1696276272.800:1434): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-145.40.82.213:22-182.43.83.179:60592 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:51:13.471946 kubelet[2613]: E1002 19:51:13.471886 2613 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-6955b54ffb-9s99f" podUID=310b30f1-9833-4562-98cb-ec9154e42258 Oct 2 19:51:14.898019 sshd[7240]: Invalid user teo from 182.43.83.179 port 60592 Oct 2 19:51:14.904195 sshd[7240]: pam_faillock(sshd:auth): User unknown Oct 2 19:51:14.905356 sshd[7240]: pam_unix(sshd:auth): check pass; user unknown Oct 2 19:51:14.905444 sshd[7240]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.43.83.179 Oct 2 19:51:14.905880 sshd[7240]: pam_faillock(sshd:auth): User unknown Oct 2 19:51:14.904000 audit[7240]: USER_AUTH pid=7240 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="teo" exe="/usr/sbin/sshd" hostname=182.43.83.179 addr=182.43.83.179 terminal=ssh res=failed' Oct 2 19:51:14.995360 kernel: audit: type=1100 audit(1696276274.904:1435): pid=7240 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="teo" exe="/usr/sbin/sshd" hostname=182.43.83.179 addr=182.43.83.179 terminal=ssh res=failed' Oct 2 19:51:16.840488 sshd[7240]: Failed password for invalid user teo from 182.43.83.179 port 60592 ssh2 Oct 2 19:51:17.452553 sshd[7240]: Received disconnect from 182.43.83.179 port 60592:11: Bye Bye [preauth] Oct 2 19:51:17.452553 sshd[7240]: Disconnected from invalid user teo 182.43.83.179 port 60592 [preauth] Oct 2 19:51:17.455113 systemd[1]: sshd@16-145.40.82.213:22-182.43.83.179:60592.service: Deactivated successfully. Oct 2 19:51:17.454000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-145.40.82.213:22-182.43.83.179:60592 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:51:17.546511 kernel: audit: type=1131 audit(1696276277.454:1436): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-145.40.82.213:22-182.43.83.179:60592 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:51:18.473133 kubelet[2613]: E1002 19:51:18.473038 2613 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-l8hvh" podUID=ebb11106-5253-488c-9095-50c2b68f321c Oct 2 19:51:25.471814 kubelet[2613]: E1002 19:51:25.471717 2613 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-6955b54ffb-xptd5" podUID=1c17f6ed-b372-41fa-b684-1123dfeeec16 Oct 2 19:51:25.471814 kubelet[2613]: E1002 19:51:25.471735 2613 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-6955b54ffb-9s99f" podUID=310b30f1-9833-4562-98cb-ec9154e42258 Oct 2 19:51:32.472550 kubelet[2613]: E1002 19:51:32.472480 2613 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-l8hvh" podUID=ebb11106-5253-488c-9095-50c2b68f321c Oct 2 19:51:36.471530 kubelet[2613]: E1002 19:51:36.471461 2613 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-6955b54ffb-xptd5" podUID=1c17f6ed-b372-41fa-b684-1123dfeeec16 Oct 2 19:51:38.472558 kubelet[2613]: E1002 19:51:38.472482 2613 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-6955b54ffb-9s99f" podUID=310b30f1-9833-4562-98cb-ec9154e42258 Oct 2 19:51:43.472112 kubelet[2613]: E1002 19:51:43.472041 2613 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-l8hvh" podUID=ebb11106-5253-488c-9095-50c2b68f321c Oct 2 19:51:49.471983 kubelet[2613]: E1002 19:51:49.471902 2613 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-6955b54ffb-9s99f" podUID=310b30f1-9833-4562-98cb-ec9154e42258 Oct 2 19:51:51.471584 kubelet[2613]: E1002 19:51:51.471481 2613 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-6955b54ffb-xptd5" podUID=1c17f6ed-b372-41fa-b684-1123dfeeec16 Oct 2 19:51:58.473250 kubelet[2613]: E1002 19:51:58.473146 2613 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-l8hvh" podUID=ebb11106-5253-488c-9095-50c2b68f321c Oct 2 19:52:04.471745 kubelet[2613]: E1002 19:52:04.471682 2613 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-6955b54ffb-9s99f" podUID=310b30f1-9833-4562-98cb-ec9154e42258 Oct 2 19:52:04.471745 kubelet[2613]: E1002 19:52:04.471725 2613 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-6955b54ffb-xptd5" podUID=1c17f6ed-b372-41fa-b684-1123dfeeec16 Oct 2 19:52:05.124000 audit[2432]: AVC avc: denied { watch } for pid=2432 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c275,c430 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:52:05.124000 audit[2432]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00051ba00 a2=fc6 a3=0 items=0 ppid=2271 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c275,c430 key=(null) Oct 2 19:52:05.339363 kernel: audit: type=1400 audit(1696276325.124:1437): avc: denied { watch } for pid=2432 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c275,c430 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:52:05.339456 kernel: audit: type=1300 audit(1696276325.124:1437): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00051ba00 a2=fc6 a3=0 items=0 ppid=2271 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c275,c430 key=(null) Oct 2 19:52:05.339475 kernel: audit: type=1327 audit(1696276325.124:1437): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:52:05.124000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:52:05.124000 audit[2432]: AVC avc: denied { watch } for pid=2432 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c275,c430 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:52:05.523863 kernel: audit: type=1400 audit(1696276325.124:1438): avc: denied { watch } for pid=2432 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c275,c430 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:52:05.523917 kernel: audit: type=1300 audit(1696276325.124:1438): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002937b30 a2=fc6 a3=0 items=0 ppid=2271 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c275,c430 key=(null) Oct 2 19:52:05.124000 audit[2432]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002937b30 a2=fc6 a3=0 items=0 ppid=2271 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c275,c430 key=(null) Oct 2 19:52:05.644305 kernel: audit: type=1327 audit(1696276325.124:1438): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:52:05.124000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:52:05.225000 audit[2430]: AVC avc: denied { watch } for pid=2430 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c581,c935 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:52:05.827336 kernel: audit: type=1400 audit(1696276325.225:1439): avc: denied { watch } for pid=2430 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c581,c935 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:52:05.827373 kernel: audit: type=1400 audit(1696276325.225:1440): avc: denied { watch } for pid=2430 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c581,c935 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:52:05.225000 audit[2430]: AVC avc: denied { watch } for pid=2430 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c581,c935 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:52:05.918377 kernel: audit: type=1300 audit(1696276325.225:1439): arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c0026e73a0 a2=fc6 a3=0 items=0 ppid=2280 pid=2430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c581,c935 key=(null) Oct 2 19:52:05.225000 audit[2430]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c0026e73a0 a2=fc6 a3=0 items=0 ppid=2280 pid=2430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c581,c935 key=(null) Oct 2 19:52:05.225000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134352E34302E38322E323133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:52:06.109697 kernel: audit: type=1327 audit(1696276325.225:1439): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134352E34302E38322E323133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:52:05.225000 audit[2430]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c00b9b5d10 a2=fc6 a3=0 items=0 ppid=2280 pid=2430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c581,c935 key=(null) Oct 2 19:52:05.225000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134352E34302E38322E323133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:52:05.225000 audit[2430]: AVC avc: denied { watch } for pid=2430 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=521268 scontext=system_u:system_r:svirt_lxc_net_t:s0:c581,c935 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:52:05.225000 audit[2430]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c013fd2840 a2=fc6 a3=0 items=0 ppid=2280 pid=2430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c581,c935 key=(null) Oct 2 19:52:05.225000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134352E34302E38322E323133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:52:05.228000 audit[2430]: AVC avc: denied { watch } for pid=2430 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=521274 scontext=system_u:system_r:svirt_lxc_net_t:s0:c581,c935 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:52:05.228000 audit[2430]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c011a482d0 a2=fc6 a3=0 items=0 ppid=2280 pid=2430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c581,c935 key=(null) Oct 2 19:52:05.228000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134352E34302E38322E323133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:52:05.228000 audit[2430]: AVC avc: denied { watch } for pid=2430 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c581,c935 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:52:05.228000 audit[2430]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c002449a00 a2=fc6 a3=0 items=0 ppid=2280 pid=2430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c581,c935 key=(null) Oct 2 19:52:05.228000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134352E34302E38322E323133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:52:05.228000 audit[2430]: AVC avc: denied { watch } for pid=2430 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c581,c935 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:52:05.228000 audit[2430]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c00b9b5ec0 a2=fc6 a3=0 items=0 ppid=2280 pid=2430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c581,c935 key=(null) Oct 2 19:52:05.228000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134352E34302E38322E323133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:52:09.472600 kubelet[2613]: E1002 19:52:09.472531 2613 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-l8hvh" podUID=ebb11106-5253-488c-9095-50c2b68f321c Oct 2 19:52:09.654000 audit[2432]: AVC avc: denied { watch } for pid=2432 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c275,c430 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:52:09.654000 audit[2432]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0013e29e0 a2=fc6 a3=0 items=0 ppid=2271 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c275,c430 key=(null) Oct 2 19:52:09.654000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:52:09.655000 audit[2432]: AVC avc: denied { watch } for pid=2432 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c275,c430 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:52:09.655000 audit[2432]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00051ba60 a2=fc6 a3=0 items=0 ppid=2271 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c275,c430 key=(null) Oct 2 19:52:09.655000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:52:09.656000 audit[2432]: AVC avc: denied { watch } for pid=2432 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c275,c430 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:52:09.656000 audit[2432]: AVC avc: denied { watch } for pid=2432 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c275,c430 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:52:09.656000 audit[2432]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001ead5a0 a2=fc6 a3=0 items=0 ppid=2271 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c275,c430 key=(null) Oct 2 19:52:09.656000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:52:09.656000 audit[2432]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c00051ba80 a2=fc6 a3=0 items=0 ppid=2271 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c275,c430 key=(null) Oct 2 19:52:09.656000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:52:15.471819 kubelet[2613]: E1002 19:52:15.471747 2613 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-6955b54ffb-9s99f" podUID=310b30f1-9833-4562-98cb-ec9154e42258 Oct 2 19:52:18.475282 kubelet[2613]: E1002 19:52:18.475266 2613 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-6955b54ffb-xptd5" podUID=1c17f6ed-b372-41fa-b684-1123dfeeec16 Oct 2 19:52:22.327420 sshd[6860]: Timeout before authentication for 27.154.63.190 port 2075 Oct 2 19:52:22.329005 systemd[1]: sshd@15-145.40.82.213:22-27.154.63.190:2075.service: Deactivated successfully. Oct 2 19:52:22.328000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-145.40.82.213:22-27.154.63.190:2075 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:52:22.356827 kernel: kauditd_printk_skb: 26 callbacks suppressed Oct 2 19:52:22.356927 kernel: audit: type=1131 audit(1696276342.328:1449): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-145.40.82.213:22-27.154.63.190:2075 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:52:23.472210 kubelet[2613]: E1002 19:52:23.472120 2613 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-l8hvh" podUID=ebb11106-5253-488c-9095-50c2b68f321c Oct 2 19:52:29.471744 kubelet[2613]: E1002 19:52:29.471549 2613 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-6955b54ffb-xptd5" podUID=1c17f6ed-b372-41fa-b684-1123dfeeec16 Oct 2 19:52:30.471654 kubelet[2613]: E1002 19:52:30.471549 2613 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-6955b54ffb-9s99f" podUID=310b30f1-9833-4562-98cb-ec9154e42258 Oct 2 19:52:33.248691 systemd[1]: Started sshd@17-145.40.82.213:22-27.154.63.190:2076.service. Oct 2 19:52:33.248000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-145.40.82.213:22-27.154.63.190:2076 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:52:33.339541 kernel: audit: type=1130 audit(1696276353.248:1450): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-145.40.82.213:22-27.154.63.190:2076 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:52:35.539609 sshd[7848]: Invalid user sysadmin from 27.154.63.190 port 2076 Oct 2 19:52:35.545148 sshd[7848]: pam_faillock(sshd:auth): User unknown Oct 2 19:52:35.546291 sshd[7848]: pam_unix(sshd:auth): check pass; user unknown Oct 2 19:52:35.546439 sshd[7848]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.154.63.190 Oct 2 19:52:35.547401 sshd[7848]: pam_faillock(sshd:auth): User unknown Oct 2 19:52:35.547000 audit[7848]: USER_AUTH pid=7848 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="sysadmin" exe="/usr/sbin/sshd" hostname=27.154.63.190 addr=27.154.63.190 terminal=ssh res=failed' Oct 2 19:52:35.639311 kernel: audit: type=1100 audit(1696276355.547:1451): pid=7848 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="sysadmin" exe="/usr/sbin/sshd" hostname=27.154.63.190 addr=27.154.63.190 terminal=ssh res=failed' Oct 2 19:52:37.602626 sshd[7848]: Failed password for invalid user sysadmin from 27.154.63.190 port 2076 ssh2 Oct 2 19:52:37.943719 sshd[7848]: Received disconnect from 27.154.63.190 port 2076:11: Bye Bye [preauth] Oct 2 19:52:37.943719 sshd[7848]: Disconnected from invalid user sysadmin 27.154.63.190 port 2076 [preauth] Oct 2 19:52:37.946130 systemd[1]: sshd@17-145.40.82.213:22-27.154.63.190:2076.service: Deactivated successfully. Oct 2 19:52:37.946000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-145.40.82.213:22-27.154.63.190:2076 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:52:38.038374 kernel: audit: type=1131 audit(1696276357.946:1452): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-145.40.82.213:22-27.154.63.190:2076 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:52:38.473172 kubelet[2613]: E1002 19:52:38.473096 2613 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-l8hvh" podUID=ebb11106-5253-488c-9095-50c2b68f321c Oct 2 19:52:41.471746 kubelet[2613]: E1002 19:52:41.471677 2613 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-6955b54ffb-xptd5" podUID=1c17f6ed-b372-41fa-b684-1123dfeeec16 Oct 2 19:52:44.473761 kubelet[2613]: E1002 19:52:44.473681 2613 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-6955b54ffb-9s99f" podUID=310b30f1-9833-4562-98cb-ec9154e42258 Oct 2 19:52:51.472423 kubelet[2613]: E1002 19:52:51.472352 2613 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-l8hvh" podUID=ebb11106-5253-488c-9095-50c2b68f321c Oct 2 19:52:55.471387 kubelet[2613]: E1002 19:52:55.471291 2613 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-6955b54ffb-xptd5" podUID=1c17f6ed-b372-41fa-b684-1123dfeeec16 Oct 2 19:52:55.471387 kubelet[2613]: E1002 19:52:55.471366 2613 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-6955b54ffb-9s99f" podUID=310b30f1-9833-4562-98cb-ec9154e42258 Oct 2 19:53:03.470198 kubelet[2613]: E1002 19:53:03.470182 2613 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-l8hvh" podUID=ebb11106-5253-488c-9095-50c2b68f321c Oct 2 19:53:05.124000 audit[2432]: AVC avc: denied { watch } for pid=2432 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c275,c430 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:53:05.124000 audit[2432]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0014bdb00 a2=fc6 a3=0 items=0 ppid=2271 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c275,c430 key=(null) Oct 2 19:53:05.344231 kernel: audit: type=1400 audit(1696276385.124:1453): avc: denied { watch } for pid=2432 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c275,c430 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:53:05.344280 kernel: audit: type=1300 audit(1696276385.124:1453): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0014bdb00 a2=fc6 a3=0 items=0 ppid=2271 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c275,c430 key=(null) Oct 2 19:53:05.344305 kernel: audit: type=1327 audit(1696276385.124:1453): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:53:05.124000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:53:05.437384 kernel: audit: type=1400 audit(1696276385.124:1454): avc: denied { watch } for pid=2432 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c275,c430 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:53:05.124000 audit[2432]: AVC avc: denied { watch } for pid=2432 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c275,c430 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:53:05.528673 kernel: audit: type=1300 audit(1696276385.124:1454): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001e97350 a2=fc6 a3=0 items=0 ppid=2271 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c275,c430 key=(null) Oct 2 19:53:05.124000 audit[2432]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001e97350 a2=fc6 a3=0 items=0 ppid=2271 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c275,c430 key=(null) Oct 2 19:53:05.650932 kernel: audit: type=1327 audit(1696276385.124:1454): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:53:05.124000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:53:05.226000 audit[2430]: AVC avc: denied { watch } for pid=2430 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=521268 scontext=system_u:system_r:svirt_lxc_net_t:s0:c581,c935 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:53:05.834983 kernel: audit: type=1400 audit(1696276385.226:1455): avc: denied { watch } for pid=2430 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=521268 scontext=system_u:system_r:svirt_lxc_net_t:s0:c581,c935 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:53:05.835036 kernel: audit: type=1300 audit(1696276385.226:1455): arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c00b8f2660 a2=fc6 a3=0 items=0 ppid=2280 pid=2430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c581,c935 key=(null) Oct 2 19:53:05.226000 audit[2430]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c00b8f2660 a2=fc6 a3=0 items=0 ppid=2280 pid=2430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c581,c935 key=(null) Oct 2 19:53:05.933576 kernel: audit: type=1327 audit(1696276385.226:1455): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134352E34302E38322E323133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:53:05.226000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134352E34302E38322E323133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:53:05.226000 audit[2430]: AVC avc: denied { watch } for pid=2430 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c581,c935 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:53:06.117147 kernel: audit: type=1400 audit(1696276385.226:1456): avc: denied { watch } for pid=2430 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c581,c935 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:53:05.226000 audit[2430]: AVC avc: denied { watch } for pid=2430 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c581,c935 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:53:05.226000 audit[2430]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c001e622a0 a2=fc6 a3=0 items=0 ppid=2280 pid=2430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c581,c935 key=(null) Oct 2 19:53:05.226000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134352E34302E38322E323133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:53:05.226000 audit[2430]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c00be207b0 a2=fc6 a3=0 items=0 ppid=2280 pid=2430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c581,c935 key=(null) Oct 2 19:53:05.226000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134352E34302E38322E323133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:53:05.229000 audit[2430]: AVC avc: denied { watch } for pid=2430 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c581,c935 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:53:05.229000 audit[2430]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c01096c120 a2=fc6 a3=0 items=0 ppid=2280 pid=2430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c581,c935 key=(null) Oct 2 19:53:05.229000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134352E34302E38322E323133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:53:05.229000 audit[2430]: AVC avc: denied { watch } for pid=2430 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=521274 scontext=system_u:system_r:svirt_lxc_net_t:s0:c581,c935 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:53:05.229000 audit[2430]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c01096c180 a2=fc6 a3=0 items=0 ppid=2280 pid=2430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c581,c935 key=(null) Oct 2 19:53:05.229000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134352E34302E38322E323133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:53:05.229000 audit[2430]: AVC avc: denied { watch } for pid=2430 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c581,c935 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:53:05.229000 audit[2430]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c002ce82c0 a2=fc6 a3=0 items=0 ppid=2280 pid=2430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c581,c935 key=(null) Oct 2 19:53:05.229000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134352E34302E38322E323133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:53:06.472339 kubelet[2613]: E1002 19:53:06.472143 2613 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-6955b54ffb-9s99f" podUID=310b30f1-9833-4562-98cb-ec9154e42258 Oct 2 19:53:09.471623 kubelet[2613]: E1002 19:53:09.471560 2613 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-6955b54ffb-xptd5" podUID=1c17f6ed-b372-41fa-b684-1123dfeeec16 Oct 2 19:53:09.655000 audit[2432]: AVC avc: denied { watch } for pid=2432 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c275,c430 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:53:09.655000 audit[2432]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0014bdd00 a2=fc6 a3=0 items=0 ppid=2271 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c275,c430 key=(null) Oct 2 19:53:09.655000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:53:09.656000 audit[2432]: AVC avc: denied { watch } for pid=2432 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c275,c430 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:53:09.656000 audit[2432]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c0012ab880 a2=fc6 a3=0 items=0 ppid=2271 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c275,c430 key=(null) Oct 2 19:53:09.656000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:53:09.657000 audit[2432]: AVC avc: denied { watch } for pid=2432 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c275,c430 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:53:09.657000 audit[2432]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0027aba00 a2=fc6 a3=0 items=0 ppid=2271 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c275,c430 key=(null) Oct 2 19:53:09.657000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:53:09.657000 audit[2432]: AVC avc: denied { watch } for pid=2432 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c275,c430 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:53:09.657000 audit[2432]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0014bdd20 a2=fc6 a3=0 items=0 ppid=2271 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c275,c430 key=(null) Oct 2 19:53:09.657000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:53:15.473098 kubelet[2613]: E1002 19:53:15.473033 2613 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-l8hvh" podUID=ebb11106-5253-488c-9095-50c2b68f321c Oct 2 19:53:16.609509 systemd[1]: Started sshd@18-145.40.82.213:22-182.43.83.179:44802.service. Oct 2 19:53:16.608000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-145.40.82.213:22-182.43.83.179:44802 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:53:16.637037 kernel: kauditd_printk_skb: 26 callbacks suppressed Oct 2 19:53:16.637139 kernel: audit: type=1130 audit(1696276396.608:1465): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-145.40.82.213:22-182.43.83.179:44802 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:53:17.742965 sshd[8197]: Invalid user danny from 182.43.83.179 port 44802 Oct 2 19:53:17.749071 sshd[8197]: pam_faillock(sshd:auth): User unknown Oct 2 19:53:17.750098 sshd[8197]: pam_unix(sshd:auth): check pass; user unknown Oct 2 19:53:17.750189 sshd[8197]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.43.83.179 Oct 2 19:53:17.751183 sshd[8197]: pam_faillock(sshd:auth): User unknown Oct 2 19:53:17.750000 audit[8197]: USER_AUTH pid=8197 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="danny" exe="/usr/sbin/sshd" hostname=182.43.83.179 addr=182.43.83.179 terminal=ssh res=failed' Oct 2 19:53:17.843377 kernel: audit: type=1100 audit(1696276397.750:1466): pid=8197 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="danny" exe="/usr/sbin/sshd" hostname=182.43.83.179 addr=182.43.83.179 terminal=ssh res=failed' Oct 2 19:53:19.471090 kubelet[2613]: E1002 19:53:19.470981 2613 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-6955b54ffb-9s99f" podUID=310b30f1-9833-4562-98cb-ec9154e42258 Oct 2 19:53:19.906673 sshd[8197]: Failed password for invalid user danny from 182.43.83.179 port 44802 ssh2 Oct 2 19:53:20.645152 sshd[8197]: Received disconnect from 182.43.83.179 port 44802:11: Bye Bye [preauth] Oct 2 19:53:20.645152 sshd[8197]: Disconnected from invalid user danny 182.43.83.179 port 44802 [preauth] Oct 2 19:53:20.647858 systemd[1]: sshd@18-145.40.82.213:22-182.43.83.179:44802.service: Deactivated successfully. Oct 2 19:53:20.647000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-145.40.82.213:22-182.43.83.179:44802 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:53:20.740383 kernel: audit: type=1131 audit(1696276400.647:1467): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-145.40.82.213:22-182.43.83.179:44802 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:53:21.471013 kubelet[2613]: E1002 19:53:21.470914 2613 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-6955b54ffb-xptd5" podUID=1c17f6ed-b372-41fa-b684-1123dfeeec16 Oct 2 19:53:27.472502 kubelet[2613]: E1002 19:53:27.472440 2613 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-l8hvh" podUID=ebb11106-5253-488c-9095-50c2b68f321c Oct 2 19:53:30.471997 kubelet[2613]: E1002 19:53:30.471938 2613 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-6955b54ffb-9s99f" podUID=310b30f1-9833-4562-98cb-ec9154e42258 Oct 2 19:53:34.471410 kubelet[2613]: E1002 19:53:34.471350 2613 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-6955b54ffb-xptd5" podUID=1c17f6ed-b372-41fa-b684-1123dfeeec16 Oct 2 19:53:38.473904 kubelet[2613]: E1002 19:53:38.473850 2613 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-l8hvh" podUID=ebb11106-5253-488c-9095-50c2b68f321c Oct 2 19:53:41.471616 env[1461]: time="2023-10-02T19:53:41.471518004Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\"" Oct 2 19:53:41.737392 env[1461]: time="2023-10-02T19:53:41.737138021Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:53:41.738358 env[1461]: time="2023-10-02T19:53:41.738230226Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:53:41.738804 kubelet[2613]: E1002 19:53:41.738716 2613 remote_image.go:171] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:53:41.738804 kubelet[2613]: E1002 19:53:41.738805 2613 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:53:41.739651 kubelet[2613]: E1002 19:53:41.739037 2613 kuberuntime_manager.go:872] container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.25.0,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-tz6nf,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/version,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:90,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/code/filecheck],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:5,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:5,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*false,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod calico-apiserver-6955b54ffb-9s99f_calico-apiserver(310b30f1-9833-4562-98cb-ec9154e42258): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:53:41.739651 kubelet[2613]: E1002 19:53:41.739133 2613 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-apiserver/calico-apiserver-6955b54ffb-9s99f" podUID=310b30f1-9833-4562-98cb-ec9154e42258 Oct 2 19:53:45.471357 kubelet[2613]: E1002 19:53:45.471275 2613 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-6955b54ffb-xptd5" podUID=1c17f6ed-b372-41fa-b684-1123dfeeec16 Oct 2 19:53:50.472439 env[1461]: time="2023-10-02T19:53:50.472344646Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\"" Oct 2 19:53:50.709192 env[1461]: time="2023-10-02T19:53:50.709033229Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:53:50.710248 env[1461]: time="2023-10-02T19:53:50.710149173Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:53:50.710664 kubelet[2613]: E1002 19:53:50.710610 2613 remote_image.go:171] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 19:53:50.711529 kubelet[2613]: E1002 19:53:50.710702 2613 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 19:53:50.711529 kubelet[2613]: E1002 19:53:50.710918 2613 kuberuntime_manager.go:872] container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.25.0,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:etccalico,ReadOnly:false,MountPath:/etc/calico,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,},VolumeMount{Name:kube-api-access-d9v5h,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod csi-node-driver-l8hvh_calico-system(ebb11106-5253-488c-9095-50c2b68f321c): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/csi:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/csi:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:53:50.712714 env[1461]: time="2023-10-02T19:53:50.712603761Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\"" Oct 2 19:53:50.938827 env[1461]: time="2023-10-02T19:53:50.938673751Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:53:50.939967 env[1461]: time="2023-10-02T19:53:50.939829390Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:53:50.940390 kubelet[2613]: E1002 19:53:50.940274 2613 remote_image.go:171] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 19:53:50.940390 kubelet[2613]: E1002 19:53:50.940399 2613 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 19:53:50.940776 kubelet[2613]: E1002 19:53:50.940635 2613 kuberuntime_manager.go:872] container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-d9v5h,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod csi-node-driver-l8hvh_calico-system(ebb11106-5253-488c-9095-50c2b68f321c): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:53:50.941095 kubelet[2613]: E1002 19:53:50.940785 2613 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/csi-node-driver-l8hvh" podUID=ebb11106-5253-488c-9095-50c2b68f321c Oct 2 19:53:53.194187 systemd[1]: Started sshd@19-145.40.82.213:22-139.178.89.65:58444.service. Oct 2 19:53:53.193000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-145.40.82.213:22-139.178.89.65:58444 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:53:53.287314 kernel: audit: type=1130 audit(1696276433.193:1468): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-145.40.82.213:22-139.178.89.65:58444 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:53:53.310701 sshd[8453]: Accepted publickey for core from 139.178.89.65 port 58444 ssh2: RSA SHA256:M4fPbwtaE29dxMxiSyaa1yIvxglYsCEa+0scmSZWaB4 Oct 2 19:53:53.309000 audit[8453]: USER_ACCT pid=8453 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:53:53.311645 sshd[8453]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:53:53.313861 systemd-logind[1451]: New session 12 of user core. Oct 2 19:53:53.314451 systemd[1]: Started session-12.scope. Oct 2 19:53:53.402768 sshd[8453]: pam_unix(sshd:session): session closed for user core Oct 2 19:53:53.310000 audit[8453]: CRED_ACQ pid=8453 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:53:53.404214 systemd[1]: sshd@19-145.40.82.213:22-139.178.89.65:58444.service: Deactivated successfully. Oct 2 19:53:53.404674 systemd[1]: session-12.scope: Deactivated successfully. Oct 2 19:53:53.405011 systemd-logind[1451]: Session 12 logged out. Waiting for processes to exit. Oct 2 19:53:53.405438 systemd-logind[1451]: Removed session 12. Oct 2 19:53:53.494378 kernel: audit: type=1101 audit(1696276433.309:1469): pid=8453 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:53:53.494433 kernel: audit: type=1103 audit(1696276433.310:1470): pid=8453 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:53:53.494451 kernel: audit: type=1006 audit(1696276433.310:1471): pid=8453 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=12 res=1 Oct 2 19:53:53.310000 audit[8453]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe51a80cb0 a2=3 a3=0 items=0 ppid=1 pid=8453 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:53:53.646275 kernel: audit: type=1300 audit(1696276433.310:1471): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe51a80cb0 a2=3 a3=0 items=0 ppid=1 pid=8453 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:53:53.646356 kernel: audit: type=1327 audit(1696276433.310:1471): proctitle=737368643A20636F7265205B707269765D Oct 2 19:53:53.310000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:53:53.315000 audit[8453]: USER_START pid=8453 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:53:53.772588 kernel: audit: type=1105 audit(1696276433.315:1472): pid=8453 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:53:53.772663 kernel: audit: type=1103 audit(1696276433.316:1473): pid=8455 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:53:53.316000 audit[8455]: CRED_ACQ pid=8455 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:53:53.861836 kernel: audit: type=1106 audit(1696276433.402:1474): pid=8453 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:53:53.402000 audit[8453]: USER_END pid=8453 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:53:53.402000 audit[8453]: CRED_DISP pid=8453 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:53:53.403000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-145.40.82.213:22-139.178.89.65:58444 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:53:54.047343 kernel: audit: type=1104 audit(1696276433.402:1475): pid=8453 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:53:56.471019 kubelet[2613]: E1002 19:53:56.470948 2613 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-6955b54ffb-9s99f" podUID=310b30f1-9833-4562-98cb-ec9154e42258 Oct 2 19:53:58.473428 env[1461]: time="2023-10-02T19:53:58.473285184Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\"" Oct 2 19:53:58.705903 env[1461]: time="2023-10-02T19:53:58.705798981Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 19:53:58.707678 env[1461]: time="2023-10-02T19:53:58.707584577Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 19:53:58.708087 kubelet[2613]: E1002 19:53:58.708043 2613 remote_image.go:171] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:53:58.708853 kubelet[2613]: E1002 19:53:58.708149 2613 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 19:53:58.708853 kubelet[2613]: E1002 19:53:58.708450 2613 kuberuntime_manager.go:872] container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.25.0,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-26bxm,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/version,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:90,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/code/filecheck],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:5,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:5,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*false,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod calico-apiserver-6955b54ffb-xptd5_calico-apiserver(1c17f6ed-b372-41fa-b684-1123dfeeec16): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 19:53:58.708853 kubelet[2613]: E1002 19:53:58.708555 2613 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-apiserver/calico-apiserver-6955b54ffb-xptd5" podUID=1c17f6ed-b372-41fa-b684-1123dfeeec16 Oct 2 19:54:02.473040 kubelet[2613]: E1002 19:54:02.472972 2613 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-l8hvh" podUID=ebb11106-5253-488c-9095-50c2b68f321c Oct 2 19:54:03.414799 systemd[1]: Started sshd@20-145.40.82.213:22-139.178.89.65:54330.service. Oct 2 19:54:03.413000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-145.40.82.213:22-139.178.89.65:54330 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:54:03.530750 kernel: kauditd_printk_skb: 1 callbacks suppressed Oct 2 19:54:03.530787 kernel: audit: type=1130 audit(1696276443.413:1477): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-145.40.82.213:22-139.178.89.65:54330 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:54:03.554000 audit[8560]: USER_ACCT pid=8560 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:54:03.555099 sshd[8560]: Accepted publickey for core from 139.178.89.65 port 54330 ssh2: RSA SHA256:M4fPbwtaE29dxMxiSyaa1yIvxglYsCEa+0scmSZWaB4 Oct 2 19:54:03.556189 sshd[8560]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:54:03.558537 systemd-logind[1451]: New session 13 of user core. Oct 2 19:54:03.559019 systemd[1]: Started session-13.scope. Oct 2 19:54:03.554000 audit[8560]: CRED_ACQ pid=8560 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:54:03.647188 sshd[8560]: pam_unix(sshd:session): session closed for user core Oct 2 19:54:03.647386 kernel: audit: type=1101 audit(1696276443.554:1478): pid=8560 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:54:03.647426 kernel: audit: type=1103 audit(1696276443.554:1479): pid=8560 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:54:03.648656 systemd[1]: sshd@20-145.40.82.213:22-139.178.89.65:54330.service: Deactivated successfully. Oct 2 19:54:03.649086 systemd[1]: session-13.scope: Deactivated successfully. Oct 2 19:54:03.649408 systemd-logind[1451]: Session 13 logged out. Waiting for processes to exit. Oct 2 19:54:03.649836 systemd-logind[1451]: Removed session 13. Oct 2 19:54:03.795808 kernel: audit: type=1006 audit(1696276443.554:1480): pid=8560 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=13 res=1 Oct 2 19:54:03.795860 kernel: audit: type=1300 audit(1696276443.554:1480): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffce35eb650 a2=3 a3=0 items=0 ppid=1 pid=8560 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:54:03.554000 audit[8560]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffce35eb650 a2=3 a3=0 items=0 ppid=1 pid=8560 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:54:03.888515 kernel: audit: type=1327 audit(1696276443.554:1480): proctitle=737368643A20636F7265205B707269765D Oct 2 19:54:03.554000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:54:03.560000 audit[8560]: USER_START pid=8560 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:54:03.919342 kernel: audit: type=1105 audit(1696276443.560:1481): pid=8560 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:54:03.560000 audit[8562]: CRED_ACQ pid=8562 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:54:04.103363 kernel: audit: type=1103 audit(1696276443.560:1482): pid=8562 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:54:04.103408 kernel: audit: type=1106 audit(1696276443.646:1483): pid=8560 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:54:03.646000 audit[8560]: USER_END pid=8560 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:54:04.198627 kernel: audit: type=1104 audit(1696276443.646:1484): pid=8560 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:54:03.646000 audit[8560]: CRED_DISP pid=8560 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:54:03.647000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-145.40.82.213:22-139.178.89.65:54330 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:54:05.125000 audit[2432]: AVC avc: denied { watch } for pid=2432 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c275,c430 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:54:05.125000 audit[2432]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002d03aa0 a2=fc6 a3=0 items=0 ppid=2271 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c275,c430 key=(null) Oct 2 19:54:05.125000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:54:05.125000 audit[2432]: AVC avc: denied { watch } for pid=2432 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c275,c430 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:54:05.125000 audit[2432]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c002c53650 a2=fc6 a3=0 items=0 ppid=2271 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c275,c430 key=(null) Oct 2 19:54:05.125000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:54:05.226000 audit[2430]: AVC avc: denied { watch } for pid=2430 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c581,c935 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:54:05.226000 audit[2430]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c00bc13f20 a2=fc6 a3=0 items=0 ppid=2280 pid=2430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c581,c935 key=(null) Oct 2 19:54:05.226000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134352E34302E38322E323133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:54:05.226000 audit[2430]: AVC avc: denied { watch } for pid=2430 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c581,c935 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:54:05.226000 audit[2430]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c0097c7c20 a2=fc6 a3=0 items=0 ppid=2280 pid=2430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c581,c935 key=(null) Oct 2 19:54:05.226000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134352E34302E38322E323133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:54:05.226000 audit[2430]: AVC avc: denied { watch } for pid=2430 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=521268 scontext=system_u:system_r:svirt_lxc_net_t:s0:c581,c935 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:54:05.226000 audit[2430]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=67 a1=c00fa815f0 a2=fc6 a3=0 items=0 ppid=2280 pid=2430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c581,c935 key=(null) Oct 2 19:54:05.226000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134352E34302E38322E323133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:54:05.229000 audit[2430]: AVC avc: denied { watch } for pid=2430 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=521274 scontext=system_u:system_r:svirt_lxc_net_t:s0:c581,c935 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:54:05.229000 audit[2430]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c012c7d980 a2=fc6 a3=0 items=0 ppid=2280 pid=2430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c581,c935 key=(null) Oct 2 19:54:05.229000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134352E34302E38322E323133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:54:05.229000 audit[2430]: AVC avc: denied { watch } for pid=2430 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c581,c935 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:54:05.229000 audit[2430]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c015134810 a2=fc6 a3=0 items=0 ppid=2280 pid=2430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c581,c935 key=(null) Oct 2 19:54:05.229000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134352E34302E38322E323133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:54:05.229000 audit[2430]: AVC avc: denied { watch } for pid=2430 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c581,c935 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:54:05.229000 audit[2430]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=67 a1=c00440ffa0 a2=fc6 a3=0 items=0 ppid=2280 pid=2430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c581,c935 key=(null) Oct 2 19:54:05.229000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134352E34302E38322E323133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 19:54:08.470384 kubelet[2613]: E1002 19:54:08.470339 2613 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-6955b54ffb-9s99f" podUID=310b30f1-9833-4562-98cb-ec9154e42258 Oct 2 19:54:09.657000 audit[2432]: AVC avc: denied { watch } for pid=2432 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c275,c430 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:54:09.703648 kernel: kauditd_printk_skb: 25 callbacks suppressed Oct 2 19:54:09.703726 kernel: audit: type=1400 audit(1696276449.657:1494): avc: denied { watch } for pid=2432 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c275,c430 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:54:09.657000 audit[2432]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001a5cc00 a2=fc6 a3=0 items=0 ppid=2271 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c275,c430 key=(null) Oct 2 19:54:09.912696 kernel: audit: type=1300 audit(1696276449.657:1494): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001a5cc00 a2=fc6 a3=0 items=0 ppid=2271 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c275,c430 key=(null) Oct 2 19:54:09.912741 kernel: audit: type=1327 audit(1696276449.657:1494): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:54:09.657000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:54:09.657000 audit[2432]: AVC avc: denied { watch } for pid=2432 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c275,c430 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:54:10.094676 kernel: audit: type=1400 audit(1696276449.657:1495): avc: denied { watch } for pid=2432 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c275,c430 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:54:10.094721 kernel: audit: type=1300 audit(1696276449.657:1495): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001a5cc20 a2=fc6 a3=0 items=0 ppid=2271 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c275,c430 key=(null) Oct 2 19:54:09.657000 audit[2432]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001a5cc20 a2=fc6 a3=0 items=0 ppid=2271 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c275,c430 key=(null) Oct 2 19:54:10.213870 kernel: audit: type=1327 audit(1696276449.657:1495): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:54:09.657000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:54:10.306690 kernel: audit: type=1400 audit(1696276449.657:1496): avc: denied { watch } for pid=2432 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c275,c430 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:54:09.657000 audit[2432]: AVC avc: denied { watch } for pid=2432 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c275,c430 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:54:10.396666 kernel: audit: type=1300 audit(1696276449.657:1496): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001a5cc40 a2=fc6 a3=0 items=0 ppid=2271 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c275,c430 key=(null) Oct 2 19:54:09.657000 audit[2432]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001a5cc40 a2=fc6 a3=0 items=0 ppid=2271 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c275,c430 key=(null) Oct 2 19:54:10.469580 kubelet[2613]: E1002 19:54:10.469525 2613 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-6955b54ffb-xptd5" podUID=1c17f6ed-b372-41fa-b684-1123dfeeec16 Oct 2 19:54:10.516737 kernel: audit: type=1327 audit(1696276449.657:1496): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:54:09.657000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:54:10.609659 kernel: audit: type=1400 audit(1696276449.658:1497): avc: denied { watch } for pid=2432 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c275,c430 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:54:09.658000 audit[2432]: AVC avc: denied { watch } for pid=2432 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c275,c430 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 19:54:09.658000 audit[2432]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00051a200 a2=fc6 a3=0 items=0 ppid=2271 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c275,c430 key=(null) Oct 2 19:54:09.658000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 19:54:13.658788 systemd[1]: Started sshd@21-145.40.82.213:22-139.178.89.65:36370.service. Oct 2 19:54:13.658000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-145.40.82.213:22-139.178.89.65:36370 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:54:13.753000 audit[8678]: USER_ACCT pid=8678 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:54:13.753896 sshd[8678]: Accepted publickey for core from 139.178.89.65 port 36370 ssh2: RSA SHA256:M4fPbwtaE29dxMxiSyaa1yIvxglYsCEa+0scmSZWaB4 Oct 2 19:54:13.754000 audit[8678]: CRED_ACQ pid=8678 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:54:13.754000 audit[8678]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe9e5e9da0 a2=3 a3=0 items=0 ppid=1 pid=8678 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:54:13.754000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:54:13.755186 sshd[8678]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:54:13.759901 systemd-logind[1451]: New session 14 of user core. Oct 2 19:54:13.760906 systemd[1]: Started session-14.scope. Oct 2 19:54:13.766000 audit[8678]: USER_START pid=8678 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:54:13.767000 audit[8680]: CRED_ACQ pid=8680 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:54:13.860449 sshd[8678]: pam_unix(sshd:session): session closed for user core Oct 2 19:54:13.860000 audit[8678]: USER_END pid=8678 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:54:13.861000 audit[8678]: CRED_DISP pid=8678 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:54:13.862012 systemd[1]: sshd@21-145.40.82.213:22-139.178.89.65:36370.service: Deactivated successfully. Oct 2 19:54:13.861000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-145.40.82.213:22-139.178.89.65:36370 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:54:13.862475 systemd[1]: session-14.scope: Deactivated successfully. Oct 2 19:54:13.862937 systemd-logind[1451]: Session 14 logged out. Waiting for processes to exit. Oct 2 19:54:13.863515 systemd-logind[1451]: Removed session 14. Oct 2 19:54:15.472559 kubelet[2613]: E1002 19:54:15.472459 2613 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-l8hvh" podUID=ebb11106-5253-488c-9095-50c2b68f321c Oct 2 19:54:20.472031 kubelet[2613]: E1002 19:54:20.471964 2613 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-6955b54ffb-9s99f" podUID=310b30f1-9833-4562-98cb-ec9154e42258 Oct 2 19:54:23.471450 kubelet[2613]: E1002 19:54:23.471384 2613 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-6955b54ffb-xptd5" podUID=1c17f6ed-b372-41fa-b684-1123dfeeec16 Oct 2 19:54:23.867075 systemd[1]: Started sshd@22-145.40.82.213:22-139.178.89.65:38482.service. Oct 2 19:54:23.866000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-145.40.82.213:22-139.178.89.65:38482 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:54:23.898417 kernel: kauditd_printk_skb: 13 callbacks suppressed Oct 2 19:54:23.898542 kernel: audit: type=1130 audit(1696276463.866:1507): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-145.40.82.213:22-139.178.89.65:38482 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:54:24.012000 audit[8775]: USER_ACCT pid=8775 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:54:24.012831 sshd[8775]: Accepted publickey for core from 139.178.89.65 port 38482 ssh2: RSA SHA256:M4fPbwtaE29dxMxiSyaa1yIvxglYsCEa+0scmSZWaB4 Oct 2 19:54:24.013872 sshd[8775]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:54:24.016187 systemd-logind[1451]: New session 15 of user core. Oct 2 19:54:24.016755 systemd[1]: Started session-15.scope. Oct 2 19:54:24.013000 audit[8775]: CRED_ACQ pid=8775 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:54:24.194568 kernel: audit: type=1101 audit(1696276464.012:1508): pid=8775 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:54:24.194638 kernel: audit: type=1103 audit(1696276464.013:1509): pid=8775 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:54:24.194658 kernel: audit: type=1006 audit(1696276464.013:1510): pid=8775 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 Oct 2 19:54:24.013000 audit[8775]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc267bb0c0 a2=3 a3=0 items=0 ppid=1 pid=8775 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:54:24.345650 kernel: audit: type=1300 audit(1696276464.013:1510): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc267bb0c0 a2=3 a3=0 items=0 ppid=1 pid=8775 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:54:24.345720 kernel: audit: type=1327 audit(1696276464.013:1510): proctitle=737368643A20636F7265205B707269765D Oct 2 19:54:24.013000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:54:24.345914 sshd[8775]: pam_unix(sshd:session): session closed for user core Oct 2 19:54:24.347391 systemd[1]: sshd@22-145.40.82.213:22-139.178.89.65:38482.service: Deactivated successfully. Oct 2 19:54:24.347820 systemd[1]: session-15.scope: Deactivated successfully. Oct 2 19:54:24.348176 systemd-logind[1451]: Session 15 logged out. Waiting for processes to exit. Oct 2 19:54:24.348818 systemd-logind[1451]: Removed session 15. Oct 2 19:54:24.376471 kernel: audit: type=1105 audit(1696276464.018:1511): pid=8775 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:54:24.018000 audit[8775]: USER_START pid=8775 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:54:24.018000 audit[8805]: CRED_ACQ pid=8805 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:54:24.560558 kernel: audit: type=1103 audit(1696276464.018:1512): pid=8805 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:54:24.560597 kernel: audit: type=1106 audit(1696276464.346:1513): pid=8775 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:54:24.346000 audit[8775]: USER_END pid=8775 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:54:24.656043 kernel: audit: type=1104 audit(1696276464.346:1514): pid=8775 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:54:24.346000 audit[8775]: CRED_DISP pid=8775 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:54:24.347000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-145.40.82.213:22-139.178.89.65:38482 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:54:28.470061 kubelet[2613]: E1002 19:54:28.470014 2613 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-l8hvh" podUID=ebb11106-5253-488c-9095-50c2b68f321c Oct 2 19:54:32.472237 kubelet[2613]: E1002 19:54:32.472167 2613 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-6955b54ffb-9s99f" podUID=310b30f1-9833-4562-98cb-ec9154e42258 Oct 2 19:54:34.311793 systemd[1]: Started sshd@23-145.40.82.213:22-139.178.89.65:34040.service. Oct 2 19:54:34.311000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-145.40.82.213:22-139.178.89.65:34040 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:54:34.338681 kernel: kauditd_printk_skb: 1 callbacks suppressed Oct 2 19:54:34.338752 kernel: audit: type=1130 audit(1696276474.311:1516): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-145.40.82.213:22-139.178.89.65:34040 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:54:34.451000 audit[8914]: USER_ACCT pid=8914 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:54:34.451827 sshd[8914]: Accepted publickey for core from 139.178.89.65 port 34040 ssh2: RSA SHA256:M4fPbwtaE29dxMxiSyaa1yIvxglYsCEa+0scmSZWaB4 Oct 2 19:54:34.452591 sshd[8914]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:54:34.454863 systemd-logind[1451]: New session 16 of user core. Oct 2 19:54:34.455433 systemd[1]: Started session-16.scope. Oct 2 19:54:34.452000 audit[8914]: CRED_ACQ pid=8914 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:54:34.547873 sshd[8914]: pam_unix(sshd:session): session closed for user core Oct 2 19:54:34.549318 systemd[1]: sshd@23-145.40.82.213:22-139.178.89.65:34040.service: Deactivated successfully. Oct 2 19:54:34.549781 systemd[1]: session-16.scope: Deactivated successfully. Oct 2 19:54:34.550137 systemd-logind[1451]: Session 16 logged out. Waiting for processes to exit. Oct 2 19:54:34.550620 systemd-logind[1451]: Removed session 16. Oct 2 19:54:34.633331 kernel: audit: type=1101 audit(1696276474.451:1517): pid=8914 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:54:34.633367 kernel: audit: type=1103 audit(1696276474.452:1518): pid=8914 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:54:34.633385 kernel: audit: type=1006 audit(1696276474.452:1519): pid=8914 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 Oct 2 19:54:34.452000 audit[8914]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe9d137a00 a2=3 a3=0 items=0 ppid=1 pid=8914 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:54:34.783268 kernel: audit: type=1300 audit(1696276474.452:1519): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe9d137a00 a2=3 a3=0 items=0 ppid=1 pid=8914 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:54:34.783302 kernel: audit: type=1327 audit(1696276474.452:1519): proctitle=737368643A20636F7265205B707269765D Oct 2 19:54:34.452000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:54:34.813739 kernel: audit: type=1105 audit(1696276474.457:1520): pid=8914 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:54:34.457000 audit[8914]: USER_START pid=8914 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:54:34.457000 audit[8916]: CRED_ACQ pid=8916 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:54:34.908390 kernel: audit: type=1103 audit(1696276474.457:1521): pid=8916 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:54:34.548000 audit[8914]: USER_END pid=8914 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:54:35.092254 kernel: audit: type=1106 audit(1696276474.548:1522): pid=8914 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:54:35.092293 kernel: audit: type=1104 audit(1696276474.548:1523): pid=8914 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:54:34.548000 audit[8914]: CRED_DISP pid=8914 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:54:34.549000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-145.40.82.213:22-139.178.89.65:34040 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:54:37.471217 kubelet[2613]: E1002 19:54:37.471118 2613 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-6955b54ffb-xptd5" podUID=1c17f6ed-b372-41fa-b684-1123dfeeec16 Oct 2 19:54:42.472969 kubelet[2613]: E1002 19:54:42.472905 2613 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-l8hvh" podUID=ebb11106-5253-488c-9095-50c2b68f321c Oct 2 19:54:44.557087 systemd[1]: Started sshd@24-145.40.82.213:22-139.178.89.65:34510.service. Oct 2 19:54:44.555000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-145.40.82.213:22-139.178.89.65:34510 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:54:44.583883 kernel: kauditd_printk_skb: 1 callbacks suppressed Oct 2 19:54:44.583934 kernel: audit: type=1130 audit(1696276484.555:1525): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-145.40.82.213:22-139.178.89.65:34510 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:54:44.697000 audit[9015]: USER_ACCT pid=9015 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:54:44.698832 sshd[9015]: Accepted publickey for core from 139.178.89.65 port 34510 ssh2: RSA SHA256:M4fPbwtaE29dxMxiSyaa1yIvxglYsCEa+0scmSZWaB4 Oct 2 19:54:44.700609 sshd[9015]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:54:44.702934 systemd-logind[1451]: New session 17 of user core. Oct 2 19:54:44.703496 systemd[1]: Started session-17.scope. Oct 2 19:54:44.699000 audit[9015]: CRED_ACQ pid=9015 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:54:44.793808 sshd[9015]: pam_unix(sshd:session): session closed for user core Oct 2 19:54:44.795578 systemd[1]: sshd@24-145.40.82.213:22-139.178.89.65:34510.service: Deactivated successfully. Oct 2 19:54:44.795905 systemd[1]: session-17.scope: Deactivated successfully. Oct 2 19:54:44.796206 systemd-logind[1451]: Session 17 logged out. Waiting for processes to exit. Oct 2 19:54:44.796761 systemd[1]: Started sshd@25-145.40.82.213:22-139.178.89.65:34518.service. Oct 2 19:54:44.797116 systemd-logind[1451]: Removed session 17. Oct 2 19:54:44.881746 kernel: audit: type=1101 audit(1696276484.697:1526): pid=9015 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:54:44.881795 kernel: audit: type=1103 audit(1696276484.699:1527): pid=9015 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:54:44.881813 kernel: audit: type=1006 audit(1696276484.699:1528): pid=9015 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=17 res=1 Oct 2 19:54:44.699000 audit[9015]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff7f21dd30 a2=3 a3=0 items=0 ppid=1 pid=9015 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:54:44.964365 sshd[9041]: Accepted publickey for core from 139.178.89.65 port 34518 ssh2: RSA SHA256:M4fPbwtaE29dxMxiSyaa1yIvxglYsCEa+0scmSZWaB4 Oct 2 19:54:44.966311 sshd[9041]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:54:44.968605 systemd-logind[1451]: New session 18 of user core. Oct 2 19:54:44.969080 systemd[1]: Started session-18.scope. Oct 2 19:54:45.032196 kernel: audit: type=1300 audit(1696276484.699:1528): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff7f21dd30 a2=3 a3=0 items=0 ppid=1 pid=9015 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:54:45.032273 kernel: audit: type=1327 audit(1696276484.699:1528): proctitle=737368643A20636F7265205B707269765D Oct 2 19:54:44.699000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:54:45.062715 kernel: audit: type=1105 audit(1696276484.704:1529): pid=9015 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:54:44.704000 audit[9015]: USER_START pid=9015 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:54:45.156952 kernel: audit: type=1103 audit(1696276484.705:1530): pid=9017 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:54:44.705000 audit[9017]: CRED_ACQ pid=9017 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:54:44.793000 audit[9015]: USER_END pid=9015 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:54:45.341324 kernel: audit: type=1106 audit(1696276484.793:1531): pid=9015 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:54:45.341396 kernel: audit: type=1104 audit(1696276484.793:1532): pid=9015 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:54:44.793000 audit[9015]: CRED_DISP pid=9015 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:54:44.794000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-145.40.82.213:22-139.178.89.65:34510 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:54:44.795000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-145.40.82.213:22-139.178.89.65:34518 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:54:44.963000 audit[9041]: USER_ACCT pid=9041 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:54:44.964000 audit[9041]: CRED_ACQ pid=9041 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:54:44.964000 audit[9041]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffee5e2b170 a2=3 a3=0 items=0 ppid=1 pid=9041 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:54:44.964000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:54:44.969000 audit[9041]: USER_START pid=9041 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:54:44.970000 audit[9043]: CRED_ACQ pid=9043 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:54:45.492075 sshd[9041]: pam_unix(sshd:session): session closed for user core Oct 2 19:54:45.491000 audit[9041]: USER_END pid=9041 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:54:45.491000 audit[9041]: CRED_DISP pid=9041 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:54:45.493858 systemd[1]: sshd@25-145.40.82.213:22-139.178.89.65:34518.service: Deactivated successfully. Oct 2 19:54:45.492000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-145.40.82.213:22-139.178.89.65:34518 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:54:45.494228 systemd[1]: session-18.scope: Deactivated successfully. Oct 2 19:54:45.494559 systemd-logind[1451]: Session 18 logged out. Waiting for processes to exit. Oct 2 19:54:45.495209 systemd[1]: Started sshd@26-145.40.82.213:22-139.178.89.65:34520.service. Oct 2 19:54:45.493000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-145.40.82.213:22-139.178.89.65:34520 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:54:45.497168 systemd-logind[1451]: Removed session 18. Oct 2 19:54:45.524000 audit[9066]: USER_ACCT pid=9066 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:54:45.525703 sshd[9066]: Accepted publickey for core from 139.178.89.65 port 34520 ssh2: RSA SHA256:M4fPbwtaE29dxMxiSyaa1yIvxglYsCEa+0scmSZWaB4 Oct 2 19:54:45.524000 audit[9066]: CRED_ACQ pid=9066 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:54:45.524000 audit[9066]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffcf2a7d90 a2=3 a3=0 items=0 ppid=1 pid=9066 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:54:45.524000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:54:45.526433 sshd[9066]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:54:45.528992 systemd-logind[1451]: New session 19 of user core. Oct 2 19:54:45.529465 systemd[1]: Started session-19.scope. Oct 2 19:54:45.530000 audit[9066]: USER_START pid=9066 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:54:45.530000 audit[9070]: CRED_ACQ pid=9070 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:54:45.685272 sshd[9066]: pam_unix(sshd:session): session closed for user core Oct 2 19:54:45.684000 audit[9066]: USER_END pid=9066 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:54:45.685000 audit[9066]: CRED_DISP pid=9066 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:54:45.687489 systemd[1]: sshd@26-145.40.82.213:22-139.178.89.65:34520.service: Deactivated successfully. Oct 2 19:54:45.686000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-145.40.82.213:22-139.178.89.65:34520 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:54:45.688173 systemd[1]: session-19.scope: Deactivated successfully. Oct 2 19:54:45.688796 systemd-logind[1451]: Session 19 logged out. Waiting for processes to exit. Oct 2 19:54:45.689637 systemd-logind[1451]: Removed session 19. Oct 2 19:54:47.471123 kubelet[2613]: E1002 19:54:47.471012 2613 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-6955b54ffb-9s99f" podUID=310b30f1-9833-4562-98cb-ec9154e42258 Oct 2 19:54:50.471466 kubelet[2613]: E1002 19:54:50.471401 2613 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-6955b54ffb-xptd5" podUID=1c17f6ed-b372-41fa-b684-1123dfeeec16 Oct 2 19:54:53.472558 kubelet[2613]: E1002 19:54:53.472496 2613 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-l8hvh" podUID=ebb11106-5253-488c-9095-50c2b68f321c Oct 2 19:54:55.691081 systemd[1]: Started sshd@27-145.40.82.213:22-139.178.89.65:46654.service. Oct 2 19:54:55.690000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-145.40.82.213:22-139.178.89.65:46654 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:54:55.718201 kernel: kauditd_printk_skb: 23 callbacks suppressed Oct 2 19:54:55.718259 kernel: audit: type=1130 audit(1696276495.690:1552): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-145.40.82.213:22-139.178.89.65:46654 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 19:54:55.830000 audit[9169]: USER_ACCT pid=9169 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:54:55.831766 sshd[9169]: Accepted publickey for core from 139.178.89.65 port 46654 ssh2: RSA SHA256:M4fPbwtaE29dxMxiSyaa1yIvxglYsCEa+0scmSZWaB4 Oct 2 19:54:55.833507 sshd[9169]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 19:54:55.835974 systemd-logind[1451]: New session 20 of user core. Oct 2 19:54:55.836507 systemd[1]: Started session-20.scope. Oct 2 19:54:55.832000 audit[9169]: CRED_ACQ pid=9169 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:54:55.929811 sshd[9169]: pam_unix(sshd:session): session closed for user core Oct 2 19:54:55.931286 systemd[1]: sshd@27-145.40.82.213:22-139.178.89.65:46654.service: Deactivated successfully. Oct 2 19:54:55.931801 systemd[1]: session-20.scope: Deactivated successfully. Oct 2 19:54:55.932199 systemd-logind[1451]: Session 20 logged out. Waiting for processes to exit. Oct 2 19:54:55.932862 systemd-logind[1451]: Removed session 20. Oct 2 19:54:56.015860 kernel: audit: type=1101 audit(1696276495.830:1553): pid=9169 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:54:56.015900 kernel: audit: type=1103 audit(1696276495.832:1554): pid=9169 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:54:56.015916 kernel: audit: type=1006 audit(1696276495.832:1555): pid=9169 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=20 res=1 Oct 2 19:54:55.832000 audit[9169]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc6a7fb210 a2=3 a3=0 items=0 ppid=1 pid=9169 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:54:56.166332 kernel: audit: type=1300 audit(1696276495.832:1555): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc6a7fb210 a2=3 a3=0 items=0 ppid=1 pid=9169 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 19:54:56.166362 kernel: audit: type=1327 audit(1696276495.832:1555): proctitle=737368643A20636F7265205B707269765D Oct 2 19:54:55.832000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 19:54:56.196810 kernel: audit: type=1105 audit(1696276495.837:1556): pid=9169 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:54:55.837000 audit[9169]: USER_START pid=9169 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:54:56.291033 kernel: audit: type=1103 audit(1696276495.838:1557): pid=9171 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:54:55.838000 audit[9171]: CRED_ACQ pid=9171 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:54:56.380163 kernel: audit: type=1106 audit(1696276495.929:1558): pid=9169 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:54:55.929000 audit[9169]: USER_END pid=9169 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:54:56.475516 kernel: audit: type=1104 audit(1696276495.929:1559): pid=9169 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:54:55.929000 audit[9169]: CRED_DISP pid=9169 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 19:54:55.930000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-145.40.82.213:22-139.178.89.65:46654 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'