Oct 2 20:40:51.549639 kernel: microcode: microcode updated early to revision 0xf4, date = 2022-07-31 Oct 2 20:40:51.549651 kernel: Linux version 5.15.132-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Mon Oct 2 17:52:37 -00 2023 Oct 2 20:40:51.549657 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.first_boot=detected flatcar.oem.id=packet flatcar.autologin verity.usrhash=96b0fdb9f11bf1422adc9955c78c8182df387766badfd0b94e08fb9688739ee1 Oct 2 20:40:51.549661 kernel: BIOS-provided physical RAM map: Oct 2 20:40:51.549666 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000008f7ff] usable Oct 2 20:40:51.549670 kernel: BIOS-e820: [mem 0x000000000008f800-0x000000000009ffff] reserved Oct 2 20:40:51.549674 kernel: BIOS-e820: [mem 0x00000000000e0000-0x00000000000fffff] reserved Oct 2 20:40:51.549678 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000003fffffff] usable Oct 2 20:40:51.549682 kernel: BIOS-e820: [mem 0x0000000040000000-0x00000000403fffff] reserved Oct 2 20:40:51.549685 kernel: BIOS-e820: [mem 0x0000000040400000-0x0000000077f2efff] usable Oct 2 20:40:51.549689 kernel: BIOS-e820: [mem 0x0000000077f2f000-0x0000000077f2ffff] ACPI NVS Oct 2 20:40:51.549693 kernel: BIOS-e820: [mem 0x0000000077f30000-0x0000000077f30fff] reserved Oct 2 20:40:51.549697 kernel: BIOS-e820: [mem 0x0000000077f31000-0x0000000077ffffff] usable Oct 2 20:40:51.549701 kernel: BIOS-e820: [mem 0x0000000078000000-0x000000007fffffff] reserved Oct 2 20:40:51.549706 kernel: BIOS-e820: [mem 0x0000000080000000-0x000000008afc4fff] usable Oct 2 20:40:51.549710 kernel: BIOS-e820: [mem 0x000000008afc5000-0x000000008c0a7fff] reserved Oct 2 20:40:51.549714 kernel: BIOS-e820: [mem 0x000000008c0a8000-0x000000008c230fff] usable Oct 2 20:40:51.549719 kernel: BIOS-e820: [mem 0x000000008c231000-0x000000008c662fff] ACPI NVS Oct 2 20:40:51.549723 kernel: BIOS-e820: [mem 0x000000008c663000-0x000000008eefefff] reserved Oct 2 20:40:51.549727 kernel: BIOS-e820: [mem 0x000000008eeff000-0x000000008eefffff] usable Oct 2 20:40:51.549731 kernel: BIOS-e820: [mem 0x000000008ef00000-0x000000008fffffff] reserved Oct 2 20:40:51.549735 kernel: BIOS-e820: [mem 0x00000000e0000000-0x00000000efffffff] reserved Oct 2 20:40:51.549739 kernel: BIOS-e820: [mem 0x00000000fe000000-0x00000000fe010fff] reserved Oct 2 20:40:51.549744 kernel: BIOS-e820: [mem 0x00000000fec00000-0x00000000fec00fff] reserved Oct 2 20:40:51.549748 kernel: BIOS-e820: [mem 0x00000000fee00000-0x00000000fee00fff] reserved Oct 2 20:40:51.549752 kernel: BIOS-e820: [mem 0x00000000ff000000-0x00000000ffffffff] reserved Oct 2 20:40:51.549756 kernel: BIOS-e820: [mem 0x0000000100000000-0x000000086effffff] usable Oct 2 20:40:51.549760 kernel: NX (Execute Disable) protection: active Oct 2 20:40:51.549764 kernel: SMBIOS 3.2.1 present. Oct 2 20:40:51.549769 kernel: DMI: Supermicro PIO-519C-MR-PH004/X11SCH-F, BIOS 1.5.V1 04/14/2021 Oct 2 20:40:51.549773 kernel: tsc: Detected 3400.000 MHz processor Oct 2 20:40:51.549777 kernel: tsc: Detected 3399.906 MHz TSC Oct 2 20:40:51.549781 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Oct 2 20:40:51.549786 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Oct 2 20:40:51.549790 kernel: last_pfn = 0x86f000 max_arch_pfn = 0x400000000 Oct 2 20:40:51.549795 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Oct 2 20:40:51.549799 kernel: last_pfn = 0x8ef00 max_arch_pfn = 0x400000000 Oct 2 20:40:51.549803 kernel: Using GB pages for direct mapping Oct 2 20:40:51.549807 kernel: ACPI: Early table checksum verification disabled Oct 2 20:40:51.549813 kernel: ACPI: RSDP 0x00000000000F05B0 000024 (v02 SUPERM) Oct 2 20:40:51.549819 kernel: ACPI: XSDT 0x000000008C5440C8 00010C (v01 SUPERM SUPERM 01072009 AMI 00010013) Oct 2 20:40:51.549823 kernel: ACPI: FACP 0x000000008C580620 000114 (v06 01072009 AMI 00010013) Oct 2 20:40:51.549828 kernel: ACPI: DSDT 0x000000008C544268 03C3B7 (v02 SUPERM SMCI--MB 01072009 INTL 20160527) Oct 2 20:40:51.549833 kernel: ACPI: FACS 0x000000008C662F80 000040 Oct 2 20:40:51.549838 kernel: ACPI: APIC 0x000000008C580738 00012C (v04 01072009 AMI 00010013) Oct 2 20:40:51.549843 kernel: ACPI: FPDT 0x000000008C580868 000044 (v01 01072009 AMI 00010013) Oct 2 20:40:51.549847 kernel: ACPI: FIDT 0x000000008C5808B0 00009C (v01 SUPERM SMCI--MB 01072009 AMI 00010013) Oct 2 20:40:51.549852 kernel: ACPI: MCFG 0x000000008C580950 00003C (v01 SUPERM SMCI--MB 01072009 MSFT 00000097) Oct 2 20:40:51.549856 kernel: ACPI: SPMI 0x000000008C580990 000041 (v05 SUPERM SMCI--MB 00000000 AMI. 00000000) Oct 2 20:40:51.549861 kernel: ACPI: SSDT 0x000000008C5809D8 001B1C (v02 CpuRef CpuSsdt 00003000 INTL 20160527) Oct 2 20:40:51.549865 kernel: ACPI: SSDT 0x000000008C5824F8 0031C6 (v02 SaSsdt SaSsdt 00003000 INTL 20160527) Oct 2 20:40:51.549870 kernel: ACPI: SSDT 0x000000008C5856C0 00232B (v02 PegSsd PegSsdt 00001000 INTL 20160527) Oct 2 20:40:51.549876 kernel: ACPI: HPET 0x000000008C5879F0 000038 (v01 SUPERM SMCI--MB 00000002 01000013) Oct 2 20:40:51.549880 kernel: ACPI: SSDT 0x000000008C587A28 000FAE (v02 SUPERM Ther_Rvp 00001000 INTL 20160527) Oct 2 20:40:51.549885 kernel: ACPI: SSDT 0x000000008C5889D8 0008F7 (v02 INTEL xh_mossb 00000000 INTL 20160527) Oct 2 20:40:51.549890 kernel: ACPI: UEFI 0x000000008C5892D0 000042 (v01 SUPERM SMCI--MB 00000002 01000013) Oct 2 20:40:51.549894 kernel: ACPI: LPIT 0x000000008C589318 000094 (v01 SUPERM SMCI--MB 00000002 01000013) Oct 2 20:40:51.549899 kernel: ACPI: SSDT 0x000000008C5893B0 0027DE (v02 SUPERM PtidDevc 00001000 INTL 20160527) Oct 2 20:40:51.549903 kernel: ACPI: SSDT 0x000000008C58BB90 0014E2 (v02 SUPERM TbtTypeC 00000000 INTL 20160527) Oct 2 20:40:51.549908 kernel: ACPI: DBGP 0x000000008C58D078 000034 (v01 SUPERM SMCI--MB 00000002 01000013) Oct 2 20:40:51.549913 kernel: ACPI: DBG2 0x000000008C58D0B0 000054 (v00 SUPERM SMCI--MB 00000002 01000013) Oct 2 20:40:51.549918 kernel: ACPI: SSDT 0x000000008C58D108 001B67 (v02 SUPERM UsbCTabl 00001000 INTL 20160527) Oct 2 20:40:51.549923 kernel: ACPI: DMAR 0x000000008C58EC70 000070 (v01 INTEL EDK2 00000002 01000013) Oct 2 20:40:51.549927 kernel: ACPI: SSDT 0x000000008C58ECE0 000144 (v02 Intel ADebTabl 00001000 INTL 20160527) Oct 2 20:40:51.549932 kernel: ACPI: TPM2 0x000000008C58EE28 000034 (v04 SUPERM SMCI--MB 00000001 AMI 00000000) Oct 2 20:40:51.549937 kernel: ACPI: SSDT 0x000000008C58EE60 000D8F (v02 INTEL SpsNm 00000002 INTL 20160527) Oct 2 20:40:51.549942 kernel: ACPI: WSMT 0x000000008C58FBF0 000028 (v01 \xecw 01072009 AMI 00010013) Oct 2 20:40:51.549946 kernel: ACPI: EINJ 0x000000008C58FC18 000130 (v01 AMI AMI.EINJ 00000000 AMI. 00000000) Oct 2 20:40:51.549951 kernel: ACPI: ERST 0x000000008C58FD48 000230 (v01 AMIER AMI.ERST 00000000 AMI. 00000000) Oct 2 20:40:51.549957 kernel: ACPI: BERT 0x000000008C58FF78 000030 (v01 AMI AMI.BERT 00000000 AMI. 00000000) Oct 2 20:40:51.549961 kernel: ACPI: HEST 0x000000008C58FFA8 00027C (v01 AMI AMI.HEST 00000000 AMI. 00000000) Oct 2 20:40:51.549966 kernel: ACPI: SSDT 0x000000008C590228 000162 (v01 SUPERM SMCCDN 00000000 INTL 20181221) Oct 2 20:40:51.549970 kernel: ACPI: Reserving FACP table memory at [mem 0x8c580620-0x8c580733] Oct 2 20:40:51.549975 kernel: ACPI: Reserving DSDT table memory at [mem 0x8c544268-0x8c58061e] Oct 2 20:40:51.549980 kernel: ACPI: Reserving FACS table memory at [mem 0x8c662f80-0x8c662fbf] Oct 2 20:40:51.549984 kernel: ACPI: Reserving APIC table memory at [mem 0x8c580738-0x8c580863] Oct 2 20:40:51.549989 kernel: ACPI: Reserving FPDT table memory at [mem 0x8c580868-0x8c5808ab] Oct 2 20:40:51.549993 kernel: ACPI: Reserving FIDT table memory at [mem 0x8c5808b0-0x8c58094b] Oct 2 20:40:51.549999 kernel: ACPI: Reserving MCFG table memory at [mem 0x8c580950-0x8c58098b] Oct 2 20:40:51.550003 kernel: ACPI: Reserving SPMI table memory at [mem 0x8c580990-0x8c5809d0] Oct 2 20:40:51.550008 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c5809d8-0x8c5824f3] Oct 2 20:40:51.550012 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c5824f8-0x8c5856bd] Oct 2 20:40:51.550017 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c5856c0-0x8c5879ea] Oct 2 20:40:51.550022 kernel: ACPI: Reserving HPET table memory at [mem 0x8c5879f0-0x8c587a27] Oct 2 20:40:51.550026 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c587a28-0x8c5889d5] Oct 2 20:40:51.550031 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c5889d8-0x8c5892ce] Oct 2 20:40:51.550035 kernel: ACPI: Reserving UEFI table memory at [mem 0x8c5892d0-0x8c589311] Oct 2 20:40:51.550041 kernel: ACPI: Reserving LPIT table memory at [mem 0x8c589318-0x8c5893ab] Oct 2 20:40:51.550045 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c5893b0-0x8c58bb8d] Oct 2 20:40:51.550050 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c58bb90-0x8c58d071] Oct 2 20:40:51.550054 kernel: ACPI: Reserving DBGP table memory at [mem 0x8c58d078-0x8c58d0ab] Oct 2 20:40:51.550059 kernel: ACPI: Reserving DBG2 table memory at [mem 0x8c58d0b0-0x8c58d103] Oct 2 20:40:51.550063 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c58d108-0x8c58ec6e] Oct 2 20:40:51.550068 kernel: ACPI: Reserving DMAR table memory at [mem 0x8c58ec70-0x8c58ecdf] Oct 2 20:40:51.550072 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c58ece0-0x8c58ee23] Oct 2 20:40:51.550077 kernel: ACPI: Reserving TPM2 table memory at [mem 0x8c58ee28-0x8c58ee5b] Oct 2 20:40:51.550082 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c58ee60-0x8c58fbee] Oct 2 20:40:51.550087 kernel: ACPI: Reserving WSMT table memory at [mem 0x8c58fbf0-0x8c58fc17] Oct 2 20:40:51.550091 kernel: ACPI: Reserving EINJ table memory at [mem 0x8c58fc18-0x8c58fd47] Oct 2 20:40:51.550096 kernel: ACPI: Reserving ERST table memory at [mem 0x8c58fd48-0x8c58ff77] Oct 2 20:40:51.550101 kernel: ACPI: Reserving BERT table memory at [mem 0x8c58ff78-0x8c58ffa7] Oct 2 20:40:51.550105 kernel: ACPI: Reserving HEST table memory at [mem 0x8c58ffa8-0x8c590223] Oct 2 20:40:51.550110 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c590228-0x8c590389] Oct 2 20:40:51.550114 kernel: No NUMA configuration found Oct 2 20:40:51.550119 kernel: Faking a node at [mem 0x0000000000000000-0x000000086effffff] Oct 2 20:40:51.550124 kernel: NODE_DATA(0) allocated [mem 0x86effa000-0x86effffff] Oct 2 20:40:51.550129 kernel: Zone ranges: Oct 2 20:40:51.550134 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Oct 2 20:40:51.550138 kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] Oct 2 20:40:51.550143 kernel: Normal [mem 0x0000000100000000-0x000000086effffff] Oct 2 20:40:51.550147 kernel: Movable zone start for each node Oct 2 20:40:51.550152 kernel: Early memory node ranges Oct 2 20:40:51.550157 kernel: node 0: [mem 0x0000000000001000-0x000000000008efff] Oct 2 20:40:51.550161 kernel: node 0: [mem 0x0000000000100000-0x000000003fffffff] Oct 2 20:40:51.550166 kernel: node 0: [mem 0x0000000040400000-0x0000000077f2efff] Oct 2 20:40:51.550171 kernel: node 0: [mem 0x0000000077f31000-0x0000000077ffffff] Oct 2 20:40:51.550176 kernel: node 0: [mem 0x0000000080000000-0x000000008afc4fff] Oct 2 20:40:51.550181 kernel: node 0: [mem 0x000000008c0a8000-0x000000008c230fff] Oct 2 20:40:51.550188 kernel: node 0: [mem 0x000000008eeff000-0x000000008eefffff] Oct 2 20:40:51.550194 kernel: node 0: [mem 0x0000000100000000-0x000000086effffff] Oct 2 20:40:51.550199 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000086effffff] Oct 2 20:40:51.550204 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Oct 2 20:40:51.550209 kernel: On node 0, zone DMA: 113 pages in unavailable ranges Oct 2 20:40:51.550214 kernel: On node 0, zone DMA32: 1024 pages in unavailable ranges Oct 2 20:40:51.550219 kernel: On node 0, zone DMA32: 2 pages in unavailable ranges Oct 2 20:40:51.550224 kernel: On node 0, zone DMA32: 4323 pages in unavailable ranges Oct 2 20:40:51.550229 kernel: On node 0, zone DMA32: 11470 pages in unavailable ranges Oct 2 20:40:51.550234 kernel: On node 0, zone Normal: 4352 pages in unavailable ranges Oct 2 20:40:51.550239 kernel: On node 0, zone Normal: 4096 pages in unavailable ranges Oct 2 20:40:51.550244 kernel: ACPI: PM-Timer IO Port: 0x1808 Oct 2 20:40:51.550249 kernel: ACPI: LAPIC_NMI (acpi_id[0x01] high edge lint[0x1]) Oct 2 20:40:51.550254 kernel: ACPI: LAPIC_NMI (acpi_id[0x02] high edge lint[0x1]) Oct 2 20:40:51.550260 kernel: ACPI: LAPIC_NMI (acpi_id[0x03] high edge lint[0x1]) Oct 2 20:40:51.550264 kernel: ACPI: LAPIC_NMI (acpi_id[0x04] high edge lint[0x1]) Oct 2 20:40:51.550269 kernel: ACPI: LAPIC_NMI (acpi_id[0x05] high edge lint[0x1]) Oct 2 20:40:51.550274 kernel: ACPI: LAPIC_NMI (acpi_id[0x06] high edge lint[0x1]) Oct 2 20:40:51.550279 kernel: ACPI: LAPIC_NMI (acpi_id[0x07] high edge lint[0x1]) Oct 2 20:40:51.550284 kernel: ACPI: LAPIC_NMI (acpi_id[0x08] high edge lint[0x1]) Oct 2 20:40:51.550289 kernel: ACPI: LAPIC_NMI (acpi_id[0x09] high edge lint[0x1]) Oct 2 20:40:51.550294 kernel: ACPI: LAPIC_NMI (acpi_id[0x0a] high edge lint[0x1]) Oct 2 20:40:51.550298 kernel: ACPI: LAPIC_NMI (acpi_id[0x0b] high edge lint[0x1]) Oct 2 20:40:51.550304 kernel: ACPI: LAPIC_NMI (acpi_id[0x0c] high edge lint[0x1]) Oct 2 20:40:51.550328 kernel: ACPI: LAPIC_NMI (acpi_id[0x0d] high edge lint[0x1]) Oct 2 20:40:51.550333 kernel: ACPI: LAPIC_NMI (acpi_id[0x0e] high edge lint[0x1]) Oct 2 20:40:51.550354 kernel: ACPI: LAPIC_NMI (acpi_id[0x0f] high edge lint[0x1]) Oct 2 20:40:51.550359 kernel: ACPI: LAPIC_NMI (acpi_id[0x10] high edge lint[0x1]) Oct 2 20:40:51.550364 kernel: IOAPIC[0]: apic_id 2, version 32, address 0xfec00000, GSI 0-119 Oct 2 20:40:51.550369 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Oct 2 20:40:51.550374 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Oct 2 20:40:51.550379 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Oct 2 20:40:51.550384 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 Oct 2 20:40:51.550389 kernel: TSC deadline timer available Oct 2 20:40:51.550394 kernel: smpboot: Allowing 16 CPUs, 0 hotplug CPUs Oct 2 20:40:51.550399 kernel: [mem 0x90000000-0xdfffffff] available for PCI devices Oct 2 20:40:51.550404 kernel: Booting paravirtualized kernel on bare hardware Oct 2 20:40:51.550409 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Oct 2 20:40:51.550414 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:16 nr_node_ids:1 Oct 2 20:40:51.550419 kernel: percpu: Embedded 55 pages/cpu s185624 r8192 d31464 u262144 Oct 2 20:40:51.550424 kernel: pcpu-alloc: s185624 r8192 d31464 u262144 alloc=1*2097152 Oct 2 20:40:51.550430 kernel: pcpu-alloc: [0] 00 01 02 03 04 05 06 07 [0] 08 09 10 11 12 13 14 15 Oct 2 20:40:51.550435 kernel: Built 1 zonelists, mobility grouping on. Total pages: 8200151 Oct 2 20:40:51.550440 kernel: Policy zone: Normal Oct 2 20:40:51.550445 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.first_boot=detected flatcar.oem.id=packet flatcar.autologin verity.usrhash=96b0fdb9f11bf1422adc9955c78c8182df387766badfd0b94e08fb9688739ee1 Oct 2 20:40:51.550450 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Oct 2 20:40:51.550455 kernel: Dentry cache hash table entries: 4194304 (order: 13, 33554432 bytes, linear) Oct 2 20:40:51.550460 kernel: Inode-cache hash table entries: 2097152 (order: 12, 16777216 bytes, linear) Oct 2 20:40:51.550466 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Oct 2 20:40:51.550471 kernel: Memory: 32595664K/33321836K available (12294K kernel code, 2274K rwdata, 13692K rodata, 45372K init, 4176K bss, 725912K reserved, 0K cma-reserved) Oct 2 20:40:51.550476 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=16, Nodes=1 Oct 2 20:40:51.550481 kernel: ftrace: allocating 34453 entries in 135 pages Oct 2 20:40:51.550486 kernel: ftrace: allocated 135 pages with 4 groups Oct 2 20:40:51.550491 kernel: rcu: Hierarchical RCU implementation. Oct 2 20:40:51.550496 kernel: rcu: RCU event tracing is enabled. Oct 2 20:40:51.550501 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=16. Oct 2 20:40:51.550506 kernel: Rude variant of Tasks RCU enabled. Oct 2 20:40:51.550512 kernel: Tracing variant of Tasks RCU enabled. Oct 2 20:40:51.550517 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Oct 2 20:40:51.550522 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=16 Oct 2 20:40:51.550527 kernel: NR_IRQS: 33024, nr_irqs: 2184, preallocated irqs: 16 Oct 2 20:40:51.550532 kernel: random: crng init done Oct 2 20:40:51.550537 kernel: Console: colour dummy device 80x25 Oct 2 20:40:51.550541 kernel: printk: console [tty0] enabled Oct 2 20:40:51.550546 kernel: printk: console [ttyS1] enabled Oct 2 20:40:51.550551 kernel: ACPI: Core revision 20210730 Oct 2 20:40:51.550556 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 79635855245 ns Oct 2 20:40:51.550562 kernel: APIC: Switch to symmetric I/O mode setup Oct 2 20:40:51.550567 kernel: DMAR: Host address width 39 Oct 2 20:40:51.550572 kernel: DMAR: DRHD base: 0x000000fed91000 flags: 0x1 Oct 2 20:40:51.550577 kernel: DMAR: dmar0: reg_base_addr fed91000 ver 1:0 cap d2008c40660462 ecap f050da Oct 2 20:40:51.550582 kernel: DMAR: RMRR base: 0x0000008cf11000 end: 0x0000008d15afff Oct 2 20:40:51.550587 kernel: DMAR-IR: IOAPIC id 2 under DRHD base 0xfed91000 IOMMU 0 Oct 2 20:40:51.550592 kernel: DMAR-IR: HPET id 0 under DRHD base 0xfed91000 Oct 2 20:40:51.550597 kernel: DMAR-IR: Queued invalidation will be enabled to support x2apic and Intr-remapping. Oct 2 20:40:51.550602 kernel: DMAR-IR: Enabled IRQ remapping in x2apic mode Oct 2 20:40:51.550608 kernel: x2apic enabled Oct 2 20:40:51.550613 kernel: Switched APIC routing to cluster x2apic. Oct 2 20:40:51.550617 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 Oct 2 20:40:51.550622 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x3101f59f5e6, max_idle_ns: 440795259996 ns Oct 2 20:40:51.550627 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 6799.81 BogoMIPS (lpj=3399906) Oct 2 20:40:51.550632 kernel: CPU0: Thermal monitoring enabled (TM1) Oct 2 20:40:51.550637 kernel: process: using mwait in idle threads Oct 2 20:40:51.550642 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 Oct 2 20:40:51.550647 kernel: Last level dTLB entries: 4KB 64, 2MB 0, 4MB 0, 1GB 4 Oct 2 20:40:51.550653 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Oct 2 20:40:51.550658 kernel: Spectre V2 : WARNING: Unprivileged eBPF is enabled with eIBRS on, data leaks possible via Spectre v2 BHB attacks! Oct 2 20:40:51.550663 kernel: Spectre V2 : Mitigation: Enhanced IBRS Oct 2 20:40:51.550668 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Oct 2 20:40:51.550673 kernel: Spectre V2 : Spectre v2 / PBRSB-eIBRS: Retire a single CALL on VMEXIT Oct 2 20:40:51.550678 kernel: RETBleed: Mitigation: Enhanced IBRS Oct 2 20:40:51.550683 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Oct 2 20:40:51.550688 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Oct 2 20:40:51.550694 kernel: TAA: Mitigation: TSX disabled Oct 2 20:40:51.550699 kernel: MMIO Stale Data: Mitigation: Clear CPU buffers Oct 2 20:40:51.550704 kernel: SRBDS: Mitigation: Microcode Oct 2 20:40:51.550708 kernel: GDS: Vulnerable: No microcode Oct 2 20:40:51.550713 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Oct 2 20:40:51.550718 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Oct 2 20:40:51.550723 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Oct 2 20:40:51.550728 kernel: x86/fpu: Supporting XSAVE feature 0x008: 'MPX bounds registers' Oct 2 20:40:51.550733 kernel: x86/fpu: Supporting XSAVE feature 0x010: 'MPX CSR' Oct 2 20:40:51.550739 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Oct 2 20:40:51.550744 kernel: x86/fpu: xstate_offset[3]: 832, xstate_sizes[3]: 64 Oct 2 20:40:51.550749 kernel: x86/fpu: xstate_offset[4]: 896, xstate_sizes[4]: 64 Oct 2 20:40:51.550754 kernel: x86/fpu: Enabled xstate features 0x1f, context size is 960 bytes, using 'compacted' format. Oct 2 20:40:51.550759 kernel: Freeing SMP alternatives memory: 32K Oct 2 20:40:51.550764 kernel: pid_max: default: 32768 minimum: 301 Oct 2 20:40:51.550768 kernel: LSM: Security Framework initializing Oct 2 20:40:51.550773 kernel: SELinux: Initializing. Oct 2 20:40:51.550778 kernel: Mount-cache hash table entries: 65536 (order: 7, 524288 bytes, linear) Oct 2 20:40:51.550784 kernel: Mountpoint-cache hash table entries: 65536 (order: 7, 524288 bytes, linear) Oct 2 20:40:51.550789 kernel: smpboot: Estimated ratio of average max frequency by base frequency (times 1024): 1445 Oct 2 20:40:51.550794 kernel: smpboot: CPU0: Intel(R) Xeon(R) E-2278G CPU @ 3.40GHz (family: 0x6, model: 0x9e, stepping: 0xd) Oct 2 20:40:51.550799 kernel: Performance Events: PEBS fmt3+, Skylake events, 32-deep LBR, full-width counters, Intel PMU driver. Oct 2 20:40:51.550804 kernel: ... version: 4 Oct 2 20:40:51.550809 kernel: ... bit width: 48 Oct 2 20:40:51.550814 kernel: ... generic registers: 4 Oct 2 20:40:51.550819 kernel: ... value mask: 0000ffffffffffff Oct 2 20:40:51.550824 kernel: ... max period: 00007fffffffffff Oct 2 20:40:51.550829 kernel: ... fixed-purpose events: 3 Oct 2 20:40:51.550834 kernel: ... event mask: 000000070000000f Oct 2 20:40:51.550839 kernel: signal: max sigframe size: 2032 Oct 2 20:40:51.550844 kernel: rcu: Hierarchical SRCU implementation. Oct 2 20:40:51.550849 kernel: NMI watchdog: Enabled. Permanently consumes one hw-PMU counter. Oct 2 20:40:51.550854 kernel: smp: Bringing up secondary CPUs ... Oct 2 20:40:51.550859 kernel: x86: Booting SMP configuration: Oct 2 20:40:51.550864 kernel: .... node #0, CPUs: #1 #2 #3 #4 #5 #6 #7 #8 Oct 2 20:40:51.550869 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Oct 2 20:40:51.550875 kernel: #9 #10 #11 #12 #13 #14 #15 Oct 2 20:40:51.550879 kernel: smp: Brought up 1 node, 16 CPUs Oct 2 20:40:51.550884 kernel: smpboot: Max logical packages: 1 Oct 2 20:40:51.550889 kernel: smpboot: Total of 16 processors activated (108796.99 BogoMIPS) Oct 2 20:40:51.550894 kernel: devtmpfs: initialized Oct 2 20:40:51.550899 kernel: x86/mm: Memory block size: 128MB Oct 2 20:40:51.550904 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x77f2f000-0x77f2ffff] (4096 bytes) Oct 2 20:40:51.550909 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x8c231000-0x8c662fff] (4399104 bytes) Oct 2 20:40:51.550914 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Oct 2 20:40:51.550920 kernel: futex hash table entries: 4096 (order: 6, 262144 bytes, linear) Oct 2 20:40:51.550925 kernel: pinctrl core: initialized pinctrl subsystem Oct 2 20:40:51.550930 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Oct 2 20:40:51.550935 kernel: audit: initializing netlink subsys (disabled) Oct 2 20:40:51.550940 kernel: audit: type=2000 audit(1696279246.117:1): state=initialized audit_enabled=0 res=1 Oct 2 20:40:51.550945 kernel: thermal_sys: Registered thermal governor 'step_wise' Oct 2 20:40:51.550949 kernel: thermal_sys: Registered thermal governor 'user_space' Oct 2 20:40:51.550954 kernel: cpuidle: using governor menu Oct 2 20:40:51.550959 kernel: ACPI: bus type PCI registered Oct 2 20:40:51.550965 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Oct 2 20:40:51.550970 kernel: dca service started, version 1.12.1 Oct 2 20:40:51.550975 kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xe0000000-0xefffffff] (base 0xe0000000) Oct 2 20:40:51.550980 kernel: PCI: MMCONFIG at [mem 0xe0000000-0xefffffff] reserved in E820 Oct 2 20:40:51.550985 kernel: PCI: Using configuration type 1 for base access Oct 2 20:40:51.550990 kernel: ENERGY_PERF_BIAS: Set to 'normal', was 'performance' Oct 2 20:40:51.550995 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Oct 2 20:40:51.550999 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Oct 2 20:40:51.551005 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Oct 2 20:40:51.551010 kernel: ACPI: Added _OSI(Module Device) Oct 2 20:40:51.551015 kernel: ACPI: Added _OSI(Processor Device) Oct 2 20:40:51.551020 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Oct 2 20:40:51.551025 kernel: ACPI: Added _OSI(Processor Aggregator Device) Oct 2 20:40:51.551030 kernel: ACPI: Added _OSI(Linux-Dell-Video) Oct 2 20:40:51.551035 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Oct 2 20:40:51.551040 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Oct 2 20:40:51.551045 kernel: ACPI: 12 ACPI AML tables successfully acquired and loaded Oct 2 20:40:51.551049 kernel: ACPI: Dynamic OEM Table Load: Oct 2 20:40:51.551055 kernel: ACPI: SSDT 0xFFFF8C3D0020E400 0000F4 (v02 PmRef Cpu0Psd 00003000 INTL 20160527) Oct 2 20:40:51.551060 kernel: ACPI: \_SB_.PR00: _OSC native thermal LVT Acked Oct 2 20:40:51.551065 kernel: ACPI: Dynamic OEM Table Load: Oct 2 20:40:51.551070 kernel: ACPI: SSDT 0xFFFF8C3D01B23800 000400 (v02 PmRef Cpu0Cst 00003001 INTL 20160527) Oct 2 20:40:51.551075 kernel: ACPI: Dynamic OEM Table Load: Oct 2 20:40:51.551080 kernel: ACPI: SSDT 0xFFFF8C3D01A53000 000683 (v02 PmRef Cpu0Ist 00003000 INTL 20160527) Oct 2 20:40:51.551085 kernel: ACPI: Dynamic OEM Table Load: Oct 2 20:40:51.551089 kernel: ACPI: SSDT 0xFFFF8C3D01A52000 0005FC (v02 PmRef ApIst 00003000 INTL 20160527) Oct 2 20:40:51.551094 kernel: ACPI: Dynamic OEM Table Load: Oct 2 20:40:51.551100 kernel: ACPI: SSDT 0xFFFF8C3D00149000 000AB0 (v02 PmRef ApPsd 00003000 INTL 20160527) Oct 2 20:40:51.551105 kernel: ACPI: Dynamic OEM Table Load: Oct 2 20:40:51.551110 kernel: ACPI: SSDT 0xFFFF8C3D01B22C00 00030A (v02 PmRef ApCst 00003000 INTL 20160527) Oct 2 20:40:51.551115 kernel: ACPI: Interpreter enabled Oct 2 20:40:51.551119 kernel: ACPI: PM: (supports S0 S5) Oct 2 20:40:51.551124 kernel: ACPI: Using IOAPIC for interrupt routing Oct 2 20:40:51.551129 kernel: HEST: Enabling Firmware First mode for corrected errors. Oct 2 20:40:51.551134 kernel: mce: [Firmware Bug]: Ignoring request to disable invalid MCA bank 14. Oct 2 20:40:51.551139 kernel: HEST: Table parsing has been initialized. Oct 2 20:40:51.551144 kernel: GHES: APEI firmware first mode is enabled by APEI bit and WHEA _OSC. Oct 2 20:40:51.551150 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Oct 2 20:40:51.551155 kernel: ACPI: Enabled 9 GPEs in block 00 to 7F Oct 2 20:40:51.551160 kernel: ACPI: PM: Power Resource [USBC] Oct 2 20:40:51.551165 kernel: ACPI: PM: Power Resource [V0PR] Oct 2 20:40:51.551170 kernel: ACPI: PM: Power Resource [V1PR] Oct 2 20:40:51.551174 kernel: ACPI: PM: Power Resource [V2PR] Oct 2 20:40:51.551179 kernel: ACPI: PM: Power Resource [WRST] Oct 2 20:40:51.551184 kernel: ACPI: [Firmware Bug]: BIOS _OSI(Linux) query ignored Oct 2 20:40:51.551189 kernel: ACPI: PM: Power Resource [FN00] Oct 2 20:40:51.551195 kernel: ACPI: PM: Power Resource [FN01] Oct 2 20:40:51.551200 kernel: ACPI: PM: Power Resource [FN02] Oct 2 20:40:51.551204 kernel: ACPI: PM: Power Resource [FN03] Oct 2 20:40:51.551209 kernel: ACPI: PM: Power Resource [FN04] Oct 2 20:40:51.551214 kernel: ACPI: PM: Power Resource [PIN] Oct 2 20:40:51.551219 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-fe]) Oct 2 20:40:51.551283 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Oct 2 20:40:51.551347 kernel: acpi PNP0A08:00: _OSC: platform does not support [AER] Oct 2 20:40:51.551390 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME PCIeCapability LTR] Oct 2 20:40:51.551397 kernel: PCI host bridge to bus 0000:00 Oct 2 20:40:51.551440 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Oct 2 20:40:51.551478 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Oct 2 20:40:51.551513 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Oct 2 20:40:51.551549 kernel: pci_bus 0000:00: root bus resource [mem 0x90000000-0xdfffffff window] Oct 2 20:40:51.551585 kernel: pci_bus 0000:00: root bus resource [mem 0xfc800000-0xfe7fffff window] Oct 2 20:40:51.551623 kernel: pci_bus 0000:00: root bus resource [bus 00-fe] Oct 2 20:40:51.551672 kernel: pci 0000:00:00.0: [8086:3e31] type 00 class 0x060000 Oct 2 20:40:51.551721 kernel: pci 0000:00:01.0: [8086:1901] type 01 class 0x060400 Oct 2 20:40:51.551765 kernel: pci 0000:00:01.0: PME# supported from D0 D3hot D3cold Oct 2 20:40:51.551811 kernel: pci 0000:00:01.1: [8086:1905] type 01 class 0x060400 Oct 2 20:40:51.551856 kernel: pci 0000:00:01.1: PME# supported from D0 D3hot D3cold Oct 2 20:40:51.551904 kernel: pci 0000:00:12.0: [8086:a379] type 00 class 0x118000 Oct 2 20:40:51.551947 kernel: pci 0000:00:12.0: reg 0x10: [mem 0x9551e000-0x9551efff 64bit] Oct 2 20:40:51.551992 kernel: pci 0000:00:14.0: [8086:a36d] type 00 class 0x0c0330 Oct 2 20:40:51.552034 kernel: pci 0000:00:14.0: reg 0x10: [mem 0x95500000-0x9550ffff 64bit] Oct 2 20:40:51.552076 kernel: pci 0000:00:14.0: PME# supported from D3hot D3cold Oct 2 20:40:51.552121 kernel: pci 0000:00:14.2: [8086:a36f] type 00 class 0x050000 Oct 2 20:40:51.552164 kernel: pci 0000:00:14.2: reg 0x10: [mem 0x95512000-0x95513fff 64bit] Oct 2 20:40:51.552205 kernel: pci 0000:00:14.2: reg 0x18: [mem 0x9551d000-0x9551dfff 64bit] Oct 2 20:40:51.552250 kernel: pci 0000:00:15.0: [8086:a368] type 00 class 0x0c8000 Oct 2 20:40:51.552292 kernel: pci 0000:00:15.0: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Oct 2 20:40:51.552342 kernel: pci 0000:00:15.1: [8086:a369] type 00 class 0x0c8000 Oct 2 20:40:51.552384 kernel: pci 0000:00:15.1: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Oct 2 20:40:51.552431 kernel: pci 0000:00:16.0: [8086:a360] type 00 class 0x078000 Oct 2 20:40:51.552472 kernel: pci 0000:00:16.0: reg 0x10: [mem 0x9551a000-0x9551afff 64bit] Oct 2 20:40:51.552513 kernel: pci 0000:00:16.0: PME# supported from D3hot Oct 2 20:40:51.552558 kernel: pci 0000:00:16.1: [8086:a361] type 00 class 0x078000 Oct 2 20:40:51.552598 kernel: pci 0000:00:16.1: reg 0x10: [mem 0x95519000-0x95519fff 64bit] Oct 2 20:40:51.552639 kernel: pci 0000:00:16.1: PME# supported from D3hot Oct 2 20:40:51.552682 kernel: pci 0000:00:16.4: [8086:a364] type 00 class 0x078000 Oct 2 20:40:51.552726 kernel: pci 0000:00:16.4: reg 0x10: [mem 0x95518000-0x95518fff 64bit] Oct 2 20:40:51.552773 kernel: pci 0000:00:16.4: PME# supported from D3hot Oct 2 20:40:51.552817 kernel: pci 0000:00:17.0: [8086:2826] type 00 class 0x010400 Oct 2 20:40:51.552859 kernel: pci 0000:00:17.0: reg 0x10: [mem 0x95510000-0x95511fff] Oct 2 20:40:51.552899 kernel: pci 0000:00:17.0: reg 0x14: [mem 0x95517000-0x955170ff] Oct 2 20:40:51.552939 kernel: pci 0000:00:17.0: reg 0x18: [io 0x6050-0x6057] Oct 2 20:40:51.552980 kernel: pci 0000:00:17.0: reg 0x1c: [io 0x6040-0x6043] Oct 2 20:40:51.553023 kernel: pci 0000:00:17.0: reg 0x20: [io 0x6020-0x603f] Oct 2 20:40:51.553063 kernel: pci 0000:00:17.0: reg 0x24: [mem 0x95516000-0x955167ff] Oct 2 20:40:51.553104 kernel: pci 0000:00:17.0: PME# supported from D3hot Oct 2 20:40:51.553150 kernel: pci 0000:00:1b.0: [8086:a340] type 01 class 0x060400 Oct 2 20:40:51.553192 kernel: pci 0000:00:1b.0: PME# supported from D0 D3hot D3cold Oct 2 20:40:51.553237 kernel: pci 0000:00:1b.4: [8086:a32c] type 01 class 0x060400 Oct 2 20:40:51.553280 kernel: pci 0000:00:1b.4: PME# supported from D0 D3hot D3cold Oct 2 20:40:51.553331 kernel: pci 0000:00:1b.5: [8086:a32d] type 01 class 0x060400 Oct 2 20:40:51.553373 kernel: pci 0000:00:1b.5: PME# supported from D0 D3hot D3cold Oct 2 20:40:51.553422 kernel: pci 0000:00:1c.0: [8086:a338] type 01 class 0x060400 Oct 2 20:40:51.553463 kernel: pci 0000:00:1c.0: PME# supported from D0 D3hot D3cold Oct 2 20:40:51.553508 kernel: pci 0000:00:1c.1: [8086:a339] type 01 class 0x060400 Oct 2 20:40:51.553550 kernel: pci 0000:00:1c.1: PME# supported from D0 D3hot D3cold Oct 2 20:40:51.553594 kernel: pci 0000:00:1e.0: [8086:a328] type 00 class 0x078000 Oct 2 20:40:51.553636 kernel: pci 0000:00:1e.0: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Oct 2 20:40:51.553680 kernel: pci 0000:00:1f.0: [8086:a309] type 00 class 0x060100 Oct 2 20:40:51.553726 kernel: pci 0000:00:1f.4: [8086:a323] type 00 class 0x0c0500 Oct 2 20:40:51.553768 kernel: pci 0000:00:1f.4: reg 0x10: [mem 0x95514000-0x955140ff 64bit] Oct 2 20:40:51.553808 kernel: pci 0000:00:1f.4: reg 0x20: [io 0xefa0-0xefbf] Oct 2 20:40:51.553855 kernel: pci 0000:00:1f.5: [8086:a324] type 00 class 0x0c8000 Oct 2 20:40:51.553896 kernel: pci 0000:00:1f.5: reg 0x10: [mem 0xfe010000-0xfe010fff] Oct 2 20:40:51.553939 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Oct 2 20:40:51.553988 kernel: pci 0000:02:00.0: [15b3:1015] type 00 class 0x020000 Oct 2 20:40:51.554032 kernel: pci 0000:02:00.0: reg 0x10: [mem 0x92000000-0x93ffffff 64bit pref] Oct 2 20:40:51.554074 kernel: pci 0000:02:00.0: reg 0x30: [mem 0x95200000-0x952fffff pref] Oct 2 20:40:51.554118 kernel: pci 0000:02:00.0: PME# supported from D3cold Oct 2 20:40:51.554161 kernel: pci 0000:02:00.0: reg 0x1a4: [mem 0x00000000-0x000fffff 64bit pref] Oct 2 20:40:51.554204 kernel: pci 0000:02:00.0: VF(n) BAR0 space: [mem 0x00000000-0x007fffff 64bit pref] (contains BAR0 for 8 VFs) Oct 2 20:40:51.554250 kernel: pci 0000:02:00.1: [15b3:1015] type 00 class 0x020000 Oct 2 20:40:51.554296 kernel: pci 0000:02:00.1: reg 0x10: [mem 0x90000000-0x91ffffff 64bit pref] Oct 2 20:40:51.554341 kernel: pci 0000:02:00.1: reg 0x30: [mem 0x95100000-0x951fffff pref] Oct 2 20:40:51.554384 kernel: pci 0000:02:00.1: PME# supported from D3cold Oct 2 20:40:51.554425 kernel: pci 0000:02:00.1: reg 0x1a4: [mem 0x00000000-0x000fffff 64bit pref] Oct 2 20:40:51.554468 kernel: pci 0000:02:00.1: VF(n) BAR0 space: [mem 0x00000000-0x007fffff 64bit pref] (contains BAR0 for 8 VFs) Oct 2 20:40:51.554510 kernel: pci 0000:00:01.1: PCI bridge to [bus 02] Oct 2 20:40:51.554571 kernel: pci 0000:00:01.1: bridge window [mem 0x95100000-0x952fffff] Oct 2 20:40:51.554614 kernel: pci 0000:00:01.1: bridge window [mem 0x90000000-0x93ffffff 64bit pref] Oct 2 20:40:51.554656 kernel: pci 0000:00:1b.0: PCI bridge to [bus 03] Oct 2 20:40:51.554703 kernel: pci 0000:04:00.0: [8086:1533] type 00 class 0x020000 Oct 2 20:40:51.554745 kernel: pci 0000:04:00.0: reg 0x10: [mem 0x95400000-0x9547ffff] Oct 2 20:40:51.554787 kernel: pci 0000:04:00.0: reg 0x18: [io 0x5000-0x501f] Oct 2 20:40:51.554827 kernel: pci 0000:04:00.0: reg 0x1c: [mem 0x95480000-0x95483fff] Oct 2 20:40:51.554869 kernel: pci 0000:04:00.0: PME# supported from D0 D3hot D3cold Oct 2 20:40:51.554910 kernel: pci 0000:00:1b.4: PCI bridge to [bus 04] Oct 2 20:40:51.554951 kernel: pci 0000:00:1b.4: bridge window [io 0x5000-0x5fff] Oct 2 20:40:51.554993 kernel: pci 0000:00:1b.4: bridge window [mem 0x95400000-0x954fffff] Oct 2 20:40:51.555041 kernel: pci 0000:05:00.0: [8086:1533] type 00 class 0x020000 Oct 2 20:40:51.555135 kernel: pci 0000:05:00.0: reg 0x10: [mem 0x95300000-0x9537ffff] Oct 2 20:40:51.555177 kernel: pci 0000:05:00.0: reg 0x18: [io 0x4000-0x401f] Oct 2 20:40:51.555220 kernel: pci 0000:05:00.0: reg 0x1c: [mem 0x95380000-0x95383fff] Oct 2 20:40:51.555261 kernel: pci 0000:05:00.0: PME# supported from D0 D3hot D3cold Oct 2 20:40:51.555304 kernel: pci 0000:00:1b.5: PCI bridge to [bus 05] Oct 2 20:40:51.555383 kernel: pci 0000:00:1b.5: bridge window [io 0x4000-0x4fff] Oct 2 20:40:51.555424 kernel: pci 0000:00:1b.5: bridge window [mem 0x95300000-0x953fffff] Oct 2 20:40:51.555464 kernel: pci 0000:00:1c.0: PCI bridge to [bus 06] Oct 2 20:40:51.555510 kernel: pci 0000:07:00.0: [1a03:1150] type 01 class 0x060400 Oct 2 20:40:51.555553 kernel: pci 0000:07:00.0: enabling Extended Tags Oct 2 20:40:51.555594 kernel: pci 0000:07:00.0: supports D1 D2 Oct 2 20:40:51.555636 kernel: pci 0000:07:00.0: PME# supported from D0 D1 D2 D3hot D3cold Oct 2 20:40:51.555678 kernel: pci 0000:00:1c.1: PCI bridge to [bus 07-08] Oct 2 20:40:51.555718 kernel: pci 0000:00:1c.1: bridge window [io 0x3000-0x3fff] Oct 2 20:40:51.555758 kernel: pci 0000:00:1c.1: bridge window [mem 0x94000000-0x950fffff] Oct 2 20:40:51.555805 kernel: pci_bus 0000:08: extended config space not accessible Oct 2 20:40:51.555853 kernel: pci 0000:08:00.0: [1a03:2000] type 00 class 0x030000 Oct 2 20:40:51.555897 kernel: pci 0000:08:00.0: reg 0x10: [mem 0x94000000-0x94ffffff] Oct 2 20:40:51.555941 kernel: pci 0000:08:00.0: reg 0x14: [mem 0x95000000-0x9501ffff] Oct 2 20:40:51.555987 kernel: pci 0000:08:00.0: reg 0x18: [io 0x3000-0x307f] Oct 2 20:40:51.556030 kernel: pci 0000:08:00.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Oct 2 20:40:51.556074 kernel: pci 0000:08:00.0: supports D1 D2 Oct 2 20:40:51.556117 kernel: pci 0000:08:00.0: PME# supported from D0 D1 D2 D3hot D3cold Oct 2 20:40:51.556159 kernel: pci 0000:07:00.0: PCI bridge to [bus 08] Oct 2 20:40:51.556200 kernel: pci 0000:07:00.0: bridge window [io 0x3000-0x3fff] Oct 2 20:40:51.556241 kernel: pci 0000:07:00.0: bridge window [mem 0x94000000-0x950fffff] Oct 2 20:40:51.556249 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 0 Oct 2 20:40:51.556256 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 1 Oct 2 20:40:51.556261 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 0 Oct 2 20:40:51.556266 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 0 Oct 2 20:40:51.556272 kernel: ACPI: PCI: Interrupt link LNKE configured for IRQ 0 Oct 2 20:40:51.556277 kernel: ACPI: PCI: Interrupt link LNKF configured for IRQ 0 Oct 2 20:40:51.556282 kernel: ACPI: PCI: Interrupt link LNKG configured for IRQ 0 Oct 2 20:40:51.556287 kernel: ACPI: PCI: Interrupt link LNKH configured for IRQ 0 Oct 2 20:40:51.556293 kernel: iommu: Default domain type: Translated Oct 2 20:40:51.556298 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Oct 2 20:40:51.556385 kernel: pci 0000:08:00.0: vgaarb: setting as boot VGA device Oct 2 20:40:51.556429 kernel: pci 0000:08:00.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Oct 2 20:40:51.556472 kernel: pci 0000:08:00.0: vgaarb: bridge control possible Oct 2 20:40:51.556480 kernel: vgaarb: loaded Oct 2 20:40:51.556485 kernel: pps_core: LinuxPPS API ver. 1 registered Oct 2 20:40:51.556491 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Oct 2 20:40:51.556496 kernel: PTP clock support registered Oct 2 20:40:51.556501 kernel: PCI: Using ACPI for IRQ routing Oct 2 20:40:51.556508 kernel: PCI: pci_cache_line_size set to 64 bytes Oct 2 20:40:51.556513 kernel: e820: reserve RAM buffer [mem 0x0008f800-0x0008ffff] Oct 2 20:40:51.556518 kernel: e820: reserve RAM buffer [mem 0x77f2f000-0x77ffffff] Oct 2 20:40:51.556523 kernel: e820: reserve RAM buffer [mem 0x8afc5000-0x8bffffff] Oct 2 20:40:51.556528 kernel: e820: reserve RAM buffer [mem 0x8c231000-0x8fffffff] Oct 2 20:40:51.556533 kernel: e820: reserve RAM buffer [mem 0x8ef00000-0x8fffffff] Oct 2 20:40:51.556539 kernel: e820: reserve RAM buffer [mem 0x86f000000-0x86fffffff] Oct 2 20:40:51.556544 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0, 0, 0, 0, 0, 0 Oct 2 20:40:51.556549 kernel: hpet0: 8 comparators, 64-bit 24.000000 MHz counter Oct 2 20:40:51.556555 kernel: clocksource: Switched to clocksource tsc-early Oct 2 20:40:51.556560 kernel: VFS: Disk quotas dquot_6.6.0 Oct 2 20:40:51.556566 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Oct 2 20:40:51.556571 kernel: pnp: PnP ACPI init Oct 2 20:40:51.556613 kernel: system 00:00: [mem 0x40000000-0x403fffff] has been reserved Oct 2 20:40:51.556655 kernel: pnp 00:02: [dma 0 disabled] Oct 2 20:40:51.556694 kernel: pnp 00:03: [dma 0 disabled] Oct 2 20:40:51.556737 kernel: system 00:04: [io 0x0680-0x069f] has been reserved Oct 2 20:40:51.556775 kernel: system 00:04: [io 0x164e-0x164f] has been reserved Oct 2 20:40:51.556815 kernel: system 00:05: [io 0x1854-0x1857] has been reserved Oct 2 20:40:51.556854 kernel: system 00:06: [mem 0xfed10000-0xfed17fff] has been reserved Oct 2 20:40:51.556892 kernel: system 00:06: [mem 0xfed18000-0xfed18fff] has been reserved Oct 2 20:40:51.556928 kernel: system 00:06: [mem 0xfed19000-0xfed19fff] has been reserved Oct 2 20:40:51.556964 kernel: system 00:06: [mem 0xe0000000-0xefffffff] has been reserved Oct 2 20:40:51.557002 kernel: system 00:06: [mem 0xfed20000-0xfed3ffff] has been reserved Oct 2 20:40:51.557038 kernel: system 00:06: [mem 0xfed90000-0xfed93fff] could not be reserved Oct 2 20:40:51.557074 kernel: system 00:06: [mem 0xfed45000-0xfed8ffff] has been reserved Oct 2 20:40:51.557110 kernel: system 00:06: [mem 0xfee00000-0xfeefffff] could not be reserved Oct 2 20:40:51.557150 kernel: system 00:07: [io 0x1800-0x18fe] could not be reserved Oct 2 20:40:51.557186 kernel: system 00:07: [mem 0xfd000000-0xfd69ffff] has been reserved Oct 2 20:40:51.557222 kernel: system 00:07: [mem 0xfd6c0000-0xfd6cffff] has been reserved Oct 2 20:40:51.557260 kernel: system 00:07: [mem 0xfd6f0000-0xfdffffff] has been reserved Oct 2 20:40:51.557296 kernel: system 00:07: [mem 0xfe000000-0xfe01ffff] could not be reserved Oct 2 20:40:51.557378 kernel: system 00:07: [mem 0xfe200000-0xfe7fffff] has been reserved Oct 2 20:40:51.557414 kernel: system 00:07: [mem 0xff000000-0xffffffff] has been reserved Oct 2 20:40:51.557453 kernel: system 00:08: [io 0x2000-0x20fe] has been reserved Oct 2 20:40:51.557461 kernel: pnp: PnP ACPI: found 10 devices Oct 2 20:40:51.557466 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Oct 2 20:40:51.557473 kernel: NET: Registered PF_INET protocol family Oct 2 20:40:51.557478 kernel: IP idents hash table entries: 262144 (order: 9, 2097152 bytes, linear) Oct 2 20:40:51.557484 kernel: tcp_listen_portaddr_hash hash table entries: 16384 (order: 6, 262144 bytes, linear) Oct 2 20:40:51.557489 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Oct 2 20:40:51.557494 kernel: TCP established hash table entries: 262144 (order: 9, 2097152 bytes, linear) Oct 2 20:40:51.557500 kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) Oct 2 20:40:51.557505 kernel: TCP: Hash tables configured (established 262144 bind 65536) Oct 2 20:40:51.557510 kernel: UDP hash table entries: 16384 (order: 7, 524288 bytes, linear) Oct 2 20:40:51.557515 kernel: UDP-Lite hash table entries: 16384 (order: 7, 524288 bytes, linear) Oct 2 20:40:51.557521 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Oct 2 20:40:51.557527 kernel: NET: Registered PF_XDP protocol family Oct 2 20:40:51.557568 kernel: pci 0000:00:15.0: BAR 0: assigned [mem 0x95515000-0x95515fff 64bit] Oct 2 20:40:51.557609 kernel: pci 0000:00:15.1: BAR 0: assigned [mem 0x9551b000-0x9551bfff 64bit] Oct 2 20:40:51.557649 kernel: pci 0000:00:1e.0: BAR 0: assigned [mem 0x9551c000-0x9551cfff 64bit] Oct 2 20:40:51.557690 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Oct 2 20:40:51.557733 kernel: pci 0000:02:00.0: BAR 7: no space for [mem size 0x00800000 64bit pref] Oct 2 20:40:51.557774 kernel: pci 0000:02:00.0: BAR 7: failed to assign [mem size 0x00800000 64bit pref] Oct 2 20:40:51.557818 kernel: pci 0000:02:00.1: BAR 7: no space for [mem size 0x00800000 64bit pref] Oct 2 20:40:51.557858 kernel: pci 0000:02:00.1: BAR 7: failed to assign [mem size 0x00800000 64bit pref] Oct 2 20:40:51.557899 kernel: pci 0000:00:01.1: PCI bridge to [bus 02] Oct 2 20:40:51.557939 kernel: pci 0000:00:01.1: bridge window [mem 0x95100000-0x952fffff] Oct 2 20:40:51.557980 kernel: pci 0000:00:01.1: bridge window [mem 0x90000000-0x93ffffff 64bit pref] Oct 2 20:40:51.558019 kernel: pci 0000:00:1b.0: PCI bridge to [bus 03] Oct 2 20:40:51.558060 kernel: pci 0000:00:1b.4: PCI bridge to [bus 04] Oct 2 20:40:51.558101 kernel: pci 0000:00:1b.4: bridge window [io 0x5000-0x5fff] Oct 2 20:40:51.558140 kernel: pci 0000:00:1b.4: bridge window [mem 0x95400000-0x954fffff] Oct 2 20:40:51.558181 kernel: pci 0000:00:1b.5: PCI bridge to [bus 05] Oct 2 20:40:51.558220 kernel: pci 0000:00:1b.5: bridge window [io 0x4000-0x4fff] Oct 2 20:40:51.558261 kernel: pci 0000:00:1b.5: bridge window [mem 0x95300000-0x953fffff] Oct 2 20:40:51.558300 kernel: pci 0000:00:1c.0: PCI bridge to [bus 06] Oct 2 20:40:51.558369 kernel: pci 0000:07:00.0: PCI bridge to [bus 08] Oct 2 20:40:51.558411 kernel: pci 0000:07:00.0: bridge window [io 0x3000-0x3fff] Oct 2 20:40:51.558452 kernel: pci 0000:07:00.0: bridge window [mem 0x94000000-0x950fffff] Oct 2 20:40:51.558494 kernel: pci 0000:00:1c.1: PCI bridge to [bus 07-08] Oct 2 20:40:51.558535 kernel: pci 0000:00:1c.1: bridge window [io 0x3000-0x3fff] Oct 2 20:40:51.558575 kernel: pci 0000:00:1c.1: bridge window [mem 0x94000000-0x950fffff] Oct 2 20:40:51.558612 kernel: pci_bus 0000:00: Some PCI device resources are unassigned, try booting with pci=realloc Oct 2 20:40:51.558650 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Oct 2 20:40:51.558686 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Oct 2 20:40:51.558722 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Oct 2 20:40:51.558759 kernel: pci_bus 0000:00: resource 7 [mem 0x90000000-0xdfffffff window] Oct 2 20:40:51.558794 kernel: pci_bus 0000:00: resource 8 [mem 0xfc800000-0xfe7fffff window] Oct 2 20:40:51.558837 kernel: pci_bus 0000:02: resource 1 [mem 0x95100000-0x952fffff] Oct 2 20:40:51.558877 kernel: pci_bus 0000:02: resource 2 [mem 0x90000000-0x93ffffff 64bit pref] Oct 2 20:40:51.558921 kernel: pci_bus 0000:04: resource 0 [io 0x5000-0x5fff] Oct 2 20:40:51.558960 kernel: pci_bus 0000:04: resource 1 [mem 0x95400000-0x954fffff] Oct 2 20:40:51.559001 kernel: pci_bus 0000:05: resource 0 [io 0x4000-0x4fff] Oct 2 20:40:51.559040 kernel: pci_bus 0000:05: resource 1 [mem 0x95300000-0x953fffff] Oct 2 20:40:51.559080 kernel: pci_bus 0000:07: resource 0 [io 0x3000-0x3fff] Oct 2 20:40:51.559119 kernel: pci_bus 0000:07: resource 1 [mem 0x94000000-0x950fffff] Oct 2 20:40:51.559158 kernel: pci_bus 0000:08: resource 0 [io 0x3000-0x3fff] Oct 2 20:40:51.559199 kernel: pci_bus 0000:08: resource 1 [mem 0x94000000-0x950fffff] Oct 2 20:40:51.559208 kernel: PCI: CLS 64 bytes, default 64 Oct 2 20:40:51.559213 kernel: DMAR: No ATSR found Oct 2 20:40:51.559219 kernel: DMAR: No SATC found Oct 2 20:40:51.559224 kernel: DMAR: dmar0: Using Queued invalidation Oct 2 20:40:51.559265 kernel: pci 0000:00:00.0: Adding to iommu group 0 Oct 2 20:40:51.559310 kernel: pci 0000:00:01.0: Adding to iommu group 1 Oct 2 20:40:51.559351 kernel: pci 0000:00:01.1: Adding to iommu group 1 Oct 2 20:40:51.559391 kernel: pci 0000:00:12.0: Adding to iommu group 2 Oct 2 20:40:51.559434 kernel: pci 0000:00:14.0: Adding to iommu group 3 Oct 2 20:40:51.559474 kernel: pci 0000:00:14.2: Adding to iommu group 3 Oct 2 20:40:51.559515 kernel: pci 0000:00:15.0: Adding to iommu group 4 Oct 2 20:40:51.559575 kernel: pci 0000:00:15.1: Adding to iommu group 4 Oct 2 20:40:51.559615 kernel: pci 0000:00:16.0: Adding to iommu group 5 Oct 2 20:40:51.559653 kernel: pci 0000:00:16.1: Adding to iommu group 5 Oct 2 20:40:51.559692 kernel: pci 0000:00:16.4: Adding to iommu group 5 Oct 2 20:40:51.559733 kernel: pci 0000:00:17.0: Adding to iommu group 6 Oct 2 20:40:51.559773 kernel: pci 0000:00:1b.0: Adding to iommu group 7 Oct 2 20:40:51.559815 kernel: pci 0000:00:1b.4: Adding to iommu group 8 Oct 2 20:40:51.559855 kernel: pci 0000:00:1b.5: Adding to iommu group 9 Oct 2 20:40:51.559895 kernel: pci 0000:00:1c.0: Adding to iommu group 10 Oct 2 20:40:51.559935 kernel: pci 0000:00:1c.1: Adding to iommu group 11 Oct 2 20:40:51.559975 kernel: pci 0000:00:1e.0: Adding to iommu group 12 Oct 2 20:40:51.560015 kernel: pci 0000:00:1f.0: Adding to iommu group 13 Oct 2 20:40:51.560054 kernel: pci 0000:00:1f.4: Adding to iommu group 13 Oct 2 20:40:51.560094 kernel: pci 0000:00:1f.5: Adding to iommu group 13 Oct 2 20:40:51.560136 kernel: pci 0000:02:00.0: Adding to iommu group 1 Oct 2 20:40:51.560177 kernel: pci 0000:02:00.1: Adding to iommu group 1 Oct 2 20:40:51.560218 kernel: pci 0000:04:00.0: Adding to iommu group 14 Oct 2 20:40:51.560260 kernel: pci 0000:05:00.0: Adding to iommu group 15 Oct 2 20:40:51.560301 kernel: pci 0000:07:00.0: Adding to iommu group 16 Oct 2 20:40:51.560386 kernel: pci 0000:08:00.0: Adding to iommu group 16 Oct 2 20:40:51.560393 kernel: DMAR: Intel(R) Virtualization Technology for Directed I/O Oct 2 20:40:51.560400 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Oct 2 20:40:51.560405 kernel: software IO TLB: mapped [mem 0x0000000086fc5000-0x000000008afc5000] (64MB) Oct 2 20:40:51.560411 kernel: RAPL PMU: API unit is 2^-32 Joules, 3 fixed counters, 655360 ms ovfl timer Oct 2 20:40:51.560416 kernel: RAPL PMU: hw unit of domain pp0-core 2^-14 Joules Oct 2 20:40:51.560421 kernel: RAPL PMU: hw unit of domain package 2^-14 Joules Oct 2 20:40:51.560426 kernel: RAPL PMU: hw unit of domain dram 2^-14 Joules Oct 2 20:40:51.560469 kernel: platform rtc_cmos: registered platform RTC device (no PNP device found) Oct 2 20:40:51.560477 kernel: Initialise system trusted keyrings Oct 2 20:40:51.560482 kernel: workingset: timestamp_bits=39 max_order=23 bucket_order=0 Oct 2 20:40:51.560489 kernel: Key type asymmetric registered Oct 2 20:40:51.560494 kernel: Asymmetric key parser 'x509' registered Oct 2 20:40:51.560499 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Oct 2 20:40:51.560505 kernel: io scheduler mq-deadline registered Oct 2 20:40:51.560510 kernel: io scheduler kyber registered Oct 2 20:40:51.560515 kernel: io scheduler bfq registered Oct 2 20:40:51.560555 kernel: pcieport 0000:00:01.0: PME: Signaling with IRQ 121 Oct 2 20:40:51.560596 kernel: pcieport 0000:00:01.1: PME: Signaling with IRQ 122 Oct 2 20:40:51.560638 kernel: pcieport 0000:00:1b.0: PME: Signaling with IRQ 123 Oct 2 20:40:51.560679 kernel: pcieport 0000:00:1b.4: PME: Signaling with IRQ 124 Oct 2 20:40:51.560718 kernel: pcieport 0000:00:1b.5: PME: Signaling with IRQ 125 Oct 2 20:40:51.560759 kernel: pcieport 0000:00:1c.0: PME: Signaling with IRQ 126 Oct 2 20:40:51.560798 kernel: pcieport 0000:00:1c.1: PME: Signaling with IRQ 127 Oct 2 20:40:51.560844 kernel: thermal LNXTHERM:00: registered as thermal_zone0 Oct 2 20:40:51.560851 kernel: ACPI: thermal: Thermal Zone [TZ00] (28 C) Oct 2 20:40:51.560858 kernel: ERST: Error Record Serialization Table (ERST) support is initialized. Oct 2 20:40:51.560864 kernel: pstore: Registered erst as persistent store backend Oct 2 20:40:51.560869 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Oct 2 20:40:51.560874 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Oct 2 20:40:51.560880 kernel: 00:02: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Oct 2 20:40:51.560885 kernel: 00:03: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A Oct 2 20:40:51.560928 kernel: tpm_tis MSFT0101:00: 2.0 TPM (device-id 0x1B, rev-id 16) Oct 2 20:40:51.560935 kernel: i8042: PNP: No PS/2 controller found. Oct 2 20:40:51.560972 kernel: rtc_cmos rtc_cmos: RTC can wake from S4 Oct 2 20:40:51.561011 kernel: rtc_cmos rtc_cmos: registered as rtc0 Oct 2 20:40:51.561047 kernel: rtc_cmos rtc_cmos: setting system clock to 2023-10-02T20:40:50 UTC (1696279250) Oct 2 20:40:51.561084 kernel: rtc_cmos rtc_cmos: alarms up to one month, y3k, 114 bytes nvram Oct 2 20:40:51.561091 kernel: fail to initialize ptp_kvm Oct 2 20:40:51.561097 kernel: intel_pstate: Intel P-state driver initializing Oct 2 20:40:51.561102 kernel: intel_pstate: Disabling energy efficiency optimization Oct 2 20:40:51.561107 kernel: intel_pstate: HWP enabled Oct 2 20:40:51.561113 kernel: vesafb: mode is 1024x768x8, linelength=1024, pages=0 Oct 2 20:40:51.561119 kernel: vesafb: scrolling: redraw Oct 2 20:40:51.561125 kernel: vesafb: Pseudocolor: size=0:8:8:8, shift=0:0:0:0 Oct 2 20:40:51.561130 kernel: vesafb: framebuffer at 0x94000000, mapped to 0x00000000549ec775, using 768k, total 768k Oct 2 20:40:51.561135 kernel: Console: switching to colour frame buffer device 128x48 Oct 2 20:40:51.561141 kernel: fb0: VESA VGA frame buffer device Oct 2 20:40:51.561146 kernel: NET: Registered PF_INET6 protocol family Oct 2 20:40:51.561151 kernel: Segment Routing with IPv6 Oct 2 20:40:51.561157 kernel: In-situ OAM (IOAM) with IPv6 Oct 2 20:40:51.561162 kernel: NET: Registered PF_PACKET protocol family Oct 2 20:40:51.561168 kernel: Key type dns_resolver registered Oct 2 20:40:51.561173 kernel: microcode: sig=0x906ed, pf=0x2, revision=0xf4 Oct 2 20:40:51.561178 kernel: microcode: Microcode Update Driver: v2.2. Oct 2 20:40:51.561184 kernel: IPI shorthand broadcast: enabled Oct 2 20:40:51.561189 kernel: sched_clock: Marking stable (1768878923, 1363288386)->(4522782441, -1390615132) Oct 2 20:40:51.561194 kernel: registered taskstats version 1 Oct 2 20:40:51.561199 kernel: Loading compiled-in X.509 certificates Oct 2 20:40:51.561204 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.132-flatcar: 6f9e51af8b3ef67eb6e93ecfe77d55665ad3d861' Oct 2 20:40:51.561210 kernel: Key type .fscrypt registered Oct 2 20:40:51.561216 kernel: Key type fscrypt-provisioning registered Oct 2 20:40:51.561221 kernel: pstore: Using crash dump compression: deflate Oct 2 20:40:51.561226 kernel: ima: Allocated hash algorithm: sha1 Oct 2 20:40:51.561232 kernel: ima: No architecture policies found Oct 2 20:40:51.561237 kernel: Freeing unused kernel image (initmem) memory: 45372K Oct 2 20:40:51.561242 kernel: Write protecting the kernel read-only data: 28672k Oct 2 20:40:51.561247 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Oct 2 20:40:51.561253 kernel: Freeing unused kernel image (rodata/data gap) memory: 644K Oct 2 20:40:51.561259 kernel: Run /init as init process Oct 2 20:40:51.561264 kernel: with arguments: Oct 2 20:40:51.561269 kernel: /init Oct 2 20:40:51.561275 kernel: with environment: Oct 2 20:40:51.561280 kernel: HOME=/ Oct 2 20:40:51.561285 kernel: TERM=linux Oct 2 20:40:51.561290 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Oct 2 20:40:51.561297 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Oct 2 20:40:51.561304 systemd[1]: Detected architecture x86-64. Oct 2 20:40:51.561334 systemd[1]: Running in initrd. Oct 2 20:40:51.561339 systemd[1]: No hostname configured, using default hostname. Oct 2 20:40:51.561345 systemd[1]: Hostname set to . Oct 2 20:40:51.561366 systemd[1]: Initializing machine ID from random generator. Oct 2 20:40:51.561371 systemd[1]: Queued start job for default target initrd.target. Oct 2 20:40:51.561377 systemd[1]: Started systemd-ask-password-console.path. Oct 2 20:40:51.561382 systemd[1]: Reached target cryptsetup.target. Oct 2 20:40:51.561388 systemd[1]: Reached target paths.target. Oct 2 20:40:51.561394 systemd[1]: Reached target slices.target. Oct 2 20:40:51.561399 systemd[1]: Reached target swap.target. Oct 2 20:40:51.561404 systemd[1]: Reached target timers.target. Oct 2 20:40:51.561410 systemd[1]: Listening on iscsid.socket. Oct 2 20:40:51.561415 systemd[1]: Listening on iscsiuio.socket. Oct 2 20:40:51.561421 systemd[1]: Listening on systemd-journald-audit.socket. Oct 2 20:40:51.561426 systemd[1]: Listening on systemd-journald-dev-log.socket. Oct 2 20:40:51.561432 systemd[1]: Listening on systemd-journald.socket. Oct 2 20:40:51.561438 systemd[1]: Listening on systemd-networkd.socket. Oct 2 20:40:51.561443 systemd[1]: Listening on systemd-udevd-control.socket. Oct 2 20:40:51.561449 kernel: tsc: Refined TSC clocksource calibration: 3408.043 MHz Oct 2 20:40:51.561454 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x311ffc74570, max_idle_ns: 440795256509 ns Oct 2 20:40:51.561459 systemd[1]: Listening on systemd-udevd-kernel.socket. Oct 2 20:40:51.561465 kernel: clocksource: Switched to clocksource tsc Oct 2 20:40:51.561470 systemd[1]: Reached target sockets.target. Oct 2 20:40:51.561476 systemd[1]: Starting kmod-static-nodes.service... Oct 2 20:40:51.561482 systemd[1]: Finished network-cleanup.service. Oct 2 20:40:51.561487 systemd[1]: Starting systemd-fsck-usr.service... Oct 2 20:40:51.561493 systemd[1]: Starting systemd-journald.service... Oct 2 20:40:51.561498 systemd[1]: Starting systemd-modules-load.service... Oct 2 20:40:51.561506 systemd-journald[269]: Journal started Oct 2 20:40:51.561531 systemd-journald[269]: Runtime Journal (/run/log/journal/75164974ed8d48f58605fc49521e8613) is 8.0M, max 637.5M, 629.5M free. Oct 2 20:40:51.563898 systemd-modules-load[270]: Inserted module 'overlay' Oct 2 20:40:51.593715 kernel: audit: type=1334 audit(1696279251.569:2): prog-id=6 op=LOAD Oct 2 20:40:51.593725 systemd[1]: Starting systemd-resolved.service... Oct 2 20:40:51.569000 audit: BPF prog-id=6 op=LOAD Oct 2 20:40:51.637377 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Oct 2 20:40:51.637409 systemd[1]: Starting systemd-vconsole-setup.service... Oct 2 20:40:51.669357 kernel: Bridge firewalling registered Oct 2 20:40:51.669373 systemd[1]: Started systemd-journald.service. Oct 2 20:40:51.683791 systemd-modules-load[270]: Inserted module 'br_netfilter' Oct 2 20:40:51.731351 kernel: audit: type=1130 audit(1696279251.690:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:40:51.690000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:40:51.689735 systemd-resolved[272]: Positive Trust Anchors: Oct 2 20:40:51.794351 kernel: SCSI subsystem initialized Oct 2 20:40:51.794362 kernel: audit: type=1130 audit(1696279251.742:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:40:51.742000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:40:51.689740 systemd-resolved[272]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Oct 2 20:40:51.910393 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Oct 2 20:40:51.910404 kernel: audit: type=1130 audit(1696279251.813:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:40:51.910412 kernel: device-mapper: uevent: version 1.0.3 Oct 2 20:40:51.910418 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Oct 2 20:40:51.813000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:40:51.689760 systemd-resolved[272]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Oct 2 20:40:52.007526 kernel: audit: type=1130 audit(1696279251.917:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:40:51.917000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:40:51.691342 systemd-resolved[272]: Defaulting to hostname 'linux'. Oct 2 20:40:52.060316 kernel: audit: type=1130 audit(1696279252.014:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:40:52.014000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:40:51.691799 systemd[1]: Finished kmod-static-nodes.service. Oct 2 20:40:52.067000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:40:51.743447 systemd[1]: Started systemd-resolved.service. Oct 2 20:40:52.130526 kernel: audit: type=1130 audit(1696279252.067:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:40:51.814459 systemd[1]: Finished systemd-fsck-usr.service. Oct 2 20:40:51.911580 systemd-modules-load[270]: Inserted module 'dm_multipath' Oct 2 20:40:51.918564 systemd[1]: Finished systemd-modules-load.service. Oct 2 20:40:52.015685 systemd[1]: Finished systemd-vconsole-setup.service. Oct 2 20:40:52.068626 systemd[1]: Reached target nss-lookup.target. Oct 2 20:40:52.123987 systemd[1]: Starting dracut-cmdline-ask.service... Oct 2 20:40:52.130944 systemd[1]: Starting systemd-sysctl.service... Oct 2 20:40:52.144017 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Oct 2 20:40:52.144724 systemd[1]: Finished systemd-sysctl.service. Oct 2 20:40:52.143000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:40:52.146822 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Oct 2 20:40:52.191000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:40:52.243570 kernel: audit: type=1130 audit(1696279252.143:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:40:52.243585 kernel: audit: type=1130 audit(1696279252.191:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:40:52.253633 systemd[1]: Finished dracut-cmdline-ask.service. Oct 2 20:40:52.261000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:40:52.262952 systemd[1]: Starting dracut-cmdline.service... Oct 2 20:40:52.285415 dracut-cmdline[297]: dracut-dracut-053 Oct 2 20:40:52.285415 dracut-cmdline[297]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LA Oct 2 20:40:52.285415 dracut-cmdline[297]: BEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.first_boot=detected flatcar.oem.id=packet flatcar.autologin verity.usrhash=96b0fdb9f11bf1422adc9955c78c8182df387766badfd0b94e08fb9688739ee1 Oct 2 20:40:52.355387 kernel: Loading iSCSI transport class v2.0-870. Oct 2 20:40:52.355399 kernel: iscsi: registered transport (tcp) Oct 2 20:40:52.410596 kernel: iscsi: registered transport (qla4xxx) Oct 2 20:40:52.410612 kernel: QLogic iSCSI HBA Driver Oct 2 20:40:52.427123 systemd[1]: Finished dracut-cmdline.service. Oct 2 20:40:52.434000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:40:52.436013 systemd[1]: Starting dracut-pre-udev.service... Oct 2 20:40:52.492370 kernel: raid6: avx2x4 gen() 42314 MB/s Oct 2 20:40:52.527344 kernel: raid6: avx2x4 xor() 22056 MB/s Oct 2 20:40:52.562343 kernel: raid6: avx2x2 gen() 54864 MB/s Oct 2 20:40:52.597346 kernel: raid6: avx2x2 xor() 32719 MB/s Oct 2 20:40:52.632373 kernel: raid6: avx2x1 gen() 46072 MB/s Oct 2 20:40:52.667355 kernel: raid6: avx2x1 xor() 28384 MB/s Oct 2 20:40:52.702343 kernel: raid6: sse2x4 gen() 21752 MB/s Oct 2 20:40:52.736366 kernel: raid6: sse2x4 xor() 11838 MB/s Oct 2 20:40:52.770377 kernel: raid6: sse2x2 gen() 22069 MB/s Oct 2 20:40:52.804373 kernel: raid6: sse2x2 xor() 13688 MB/s Oct 2 20:40:52.838343 kernel: raid6: sse2x1 gen() 18635 MB/s Oct 2 20:40:52.890254 kernel: raid6: sse2x1 xor() 9081 MB/s Oct 2 20:40:52.890269 kernel: raid6: using algorithm avx2x2 gen() 54864 MB/s Oct 2 20:40:52.890277 kernel: raid6: .... xor() 32719 MB/s, rmw enabled Oct 2 20:40:52.908494 kernel: raid6: using avx2x2 recovery algorithm Oct 2 20:40:52.955311 kernel: xor: automatically using best checksumming function avx Oct 2 20:40:53.032340 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Oct 2 20:40:53.037658 systemd[1]: Finished dracut-pre-udev.service. Oct 2 20:40:53.046000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:40:53.046000 audit: BPF prog-id=7 op=LOAD Oct 2 20:40:53.046000 audit: BPF prog-id=8 op=LOAD Oct 2 20:40:53.048350 systemd[1]: Starting systemd-udevd.service... Oct 2 20:40:53.056542 systemd-udevd[476]: Using default interface naming scheme 'v252'. Oct 2 20:40:53.077000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:40:53.061609 systemd[1]: Started systemd-udevd.service. Oct 2 20:40:53.102452 dracut-pre-trigger[488]: rd.md=0: removing MD RAID activation Oct 2 20:40:53.078928 systemd[1]: Starting dracut-pre-trigger.service... Oct 2 20:40:53.117000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:40:53.105652 systemd[1]: Finished dracut-pre-trigger.service. Oct 2 20:40:53.119342 systemd[1]: Starting systemd-udev-trigger.service... Oct 2 20:40:53.167819 systemd[1]: Finished systemd-udev-trigger.service. Oct 2 20:40:53.166000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:40:53.203323 kernel: cryptd: max_cpu_qlen set to 1000 Oct 2 20:40:53.206313 kernel: ACPI: bus type USB registered Oct 2 20:40:53.206340 kernel: usbcore: registered new interface driver usbfs Oct 2 20:40:53.206354 kernel: usbcore: registered new interface driver hub Oct 2 20:40:53.206365 kernel: usbcore: registered new device driver usb Oct 2 20:40:53.213319 kernel: AVX2 version of gcm_enc/dec engaged. Oct 2 20:40:53.213364 kernel: AES CTR mode by8 optimization enabled Oct 2 20:40:53.318315 kernel: libata version 3.00 loaded. Oct 2 20:40:53.352666 kernel: igb: Intel(R) Gigabit Ethernet Network Driver Oct 2 20:40:53.352686 kernel: igb: Copyright (c) 2007-2014 Intel Corporation. Oct 2 20:40:53.388710 kernel: xhci_hcd 0000:00:14.0: xHCI Host Controller Oct 2 20:40:53.388794 kernel: mlx5_core 0000:02:00.0: firmware version: 14.28.2006 Oct 2 20:40:53.388851 kernel: xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 1 Oct 2 20:40:53.388900 kernel: mlx5_core 0000:02:00.0: 63.008 Gb/s available PCIe bandwidth (8.0 GT/s PCIe x8 link) Oct 2 20:40:53.393357 kernel: pps pps0: new PPS source ptp0 Oct 2 20:40:53.393432 kernel: igb 0000:04:00.0: added PHC on eth0 Oct 2 20:40:53.393491 kernel: igb 0000:04:00.0: Intel(R) Gigabit Ethernet Network Connection Oct 2 20:40:53.393544 kernel: igb 0000:04:00.0: eth0: (PCIe:2.5Gb/s:Width x1) 3c:ec:ef:70:c8:96 Oct 2 20:40:53.393593 kernel: igb 0000:04:00.0: eth0: PBA No: 010000-000 Oct 2 20:40:53.393641 kernel: igb 0000:04:00.0: Using MSI-X interrupts. 4 rx queue(s), 4 tx queue(s) Oct 2 20:40:53.427369 kernel: xhci_hcd 0000:00:14.0: hcc params 0x200077c1 hci version 0x110 quirks 0x0000000000009810 Oct 2 20:40:53.427437 kernel: ahci 0000:00:17.0: version 3.0 Oct 2 20:40:53.432359 kernel: pps pps1: new PPS source ptp1 Oct 2 20:40:53.432429 kernel: igb 0000:05:00.0: added PHC on eth1 Oct 2 20:40:53.432502 kernel: igb 0000:05:00.0: Intel(R) Gigabit Ethernet Network Connection Oct 2 20:40:53.432584 kernel: igb 0000:05:00.0: eth1: (PCIe:2.5Gb/s:Width x1) 3c:ec:ef:70:c8:97 Oct 2 20:40:53.432646 kernel: igb 0000:05:00.0: eth1: PBA No: 010000-000 Oct 2 20:40:53.432697 kernel: igb 0000:05:00.0: Using MSI-X interrupts. 4 rx queue(s), 4 tx queue(s) Oct 2 20:40:53.455436 kernel: xhci_hcd 0000:00:14.0: xHCI Host Controller Oct 2 20:40:53.456370 kernel: ahci 0000:00:17.0: AHCI 0001.0301 32 slots 8 ports 6 Gbps 0xff impl RAID mode Oct 2 20:40:53.456439 kernel: igb 0000:04:00.0 eno1: renamed from eth0 Oct 2 20:40:53.472376 kernel: xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 2 Oct 2 20:40:53.489374 kernel: ahci 0000:00:17.0: flags: 64bit ncq sntf clo only pio slum part ems deso sadm sds apst Oct 2 20:40:53.503993 kernel: xhci_hcd 0000:00:14.0: Host supports USB 3.1 Enhanced SuperSpeed Oct 2 20:40:53.565085 kernel: scsi host0: ahci Oct 2 20:40:53.565156 kernel: hub 1-0:1.0: USB hub found Oct 2 20:40:53.565220 kernel: scsi host1: ahci Oct 2 20:40:53.580340 kernel: hub 1-0:1.0: 16 ports detected Oct 2 20:40:53.608296 kernel: scsi host2: ahci Oct 2 20:40:53.635821 kernel: hub 2-0:1.0: USB hub found Oct 2 20:40:53.635902 kernel: scsi host3: ahci Oct 2 20:40:53.651466 kernel: hub 2-0:1.0: 10 ports detected Oct 2 20:40:53.663957 kernel: scsi host4: ahci Oct 2 20:40:53.679079 kernel: usb: port power management may be unreliable Oct 2 20:40:53.680359 kernel: scsi host5: ahci Oct 2 20:40:53.680381 kernel: igb 0000:05:00.0 eno2: renamed from eth1 Oct 2 20:40:53.687342 kernel: mlx5_core 0000:02:00.0: E-Switch: Total vports 10, per vport: max uc(1024) max mc(16384) Oct 2 20:40:53.876377 kernel: usb 1-14: new high-speed USB device number 2 using xhci_hcd Oct 2 20:40:53.876403 kernel: scsi host6: ahci Oct 2 20:40:53.879355 kernel: mlx5_core 0000:02:00.0: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0) Oct 2 20:40:53.933460 kernel: scsi host7: ahci Oct 2 20:40:53.933537 kernel: ata1: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516100 irq 139 Oct 2 20:40:53.950555 kernel: ata2: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516180 irq 139 Oct 2 20:40:53.967622 kernel: ata3: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516200 irq 139 Oct 2 20:40:53.984647 kernel: ata4: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516280 irq 139 Oct 2 20:40:54.001515 kernel: ata5: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516300 irq 139 Oct 2 20:40:54.034891 kernel: ata6: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516380 irq 139 Oct 2 20:40:54.034906 kernel: hub 1-14:1.0: USB hub found Oct 2 20:40:54.034978 kernel: ata7: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516400 irq 139 Oct 2 20:40:54.064579 kernel: hub 1-14:1.0: 4 ports detected Oct 2 20:40:54.064659 kernel: ata8: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516480 irq 139 Oct 2 20:40:54.095377 kernel: mlx5_core 0000:02:00.0: Supported tc offload range - chains: 4294967294, prios: 4294967295 Oct 2 20:40:54.158958 kernel: mlx5_core 0000:02:00.1: firmware version: 14.28.2006 Oct 2 20:40:54.159035 kernel: mlx5_core 0000:02:00.1: 63.008 Gb/s available PCIe bandwidth (8.0 GT/s PCIe x8 link) Oct 2 20:40:54.389351 kernel: ata1: SATA link up 6.0 Gbps (SStatus 133 SControl 300) Oct 2 20:40:54.389368 kernel: usb 1-14.1: new low-speed USB device number 3 using xhci_hcd Oct 2 20:40:54.389385 kernel: ata3: SATA link down (SStatus 0 SControl 300) Oct 2 20:40:54.421366 kernel: ata7: SATA link down (SStatus 0 SControl 300) Oct 2 20:40:54.437367 kernel: ata4: SATA link down (SStatus 0 SControl 300) Oct 2 20:40:54.451353 kernel: mlx5_core 0000:02:00.1: E-Switch: Total vports 10, per vport: max uc(1024) max mc(16384) Oct 2 20:40:54.451425 kernel: ata5: SATA link down (SStatus 0 SControl 300) Oct 2 20:40:54.485339 kernel: port_module: 9 callbacks suppressed Oct 2 20:40:54.485355 kernel: mlx5_core 0000:02:00.1: Port module event: module 1, Cable plugged Oct 2 20:40:54.485419 kernel: ata6: SATA link down (SStatus 0 SControl 300) Oct 2 20:40:54.516342 kernel: mlx5_core 0000:02:00.1: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0) Oct 2 20:40:54.516413 kernel: ata8: SATA link down (SStatus 0 SControl 300) Oct 2 20:40:54.564334 kernel: ata2: SATA link up 6.0 Gbps (SStatus 133 SControl 300) Oct 2 20:40:54.580310 kernel: ata1.00: ATA-11: Micron_5300_MTFDDAK480TDT, D3MU001, max UDMA/133 Oct 2 20:40:54.580326 kernel: hid: raw HID events driver (C) Jiri Kosina Oct 2 20:40:54.597373 kernel: ata2.00: ATA-11: Micron_5300_MTFDDAK480TDT, D3MU001, max UDMA/133 Oct 2 20:40:54.661717 kernel: ata1.00: 937703088 sectors, multi 16: LBA48 NCQ (depth 32), AA Oct 2 20:40:54.661746 kernel: ata1.00: Features: NCQ-prio Oct 2 20:40:54.661753 kernel: ata2.00: 937703088 sectors, multi 16: LBA48 NCQ (depth 32), AA Oct 2 20:40:54.691632 kernel: ata2.00: Features: NCQ-prio Oct 2 20:40:54.710347 kernel: ata1.00: configured for UDMA/133 Oct 2 20:40:54.710389 kernel: ata2.00: configured for UDMA/133 Oct 2 20:40:54.710402 kernel: scsi 0:0:0:0: Direct-Access ATA Micron_5300_MTFD U001 PQ: 0 ANSI: 5 Oct 2 20:40:54.719386 kernel: mlx5_core 0000:02:00.1: Supported tc offload range - chains: 4294967294, prios: 4294967295 Oct 2 20:40:54.780314 kernel: scsi 1:0:0:0: Direct-Access ATA Micron_5300_MTFD U001 PQ: 0 ANSI: 5 Oct 2 20:40:54.799313 kernel: mlx5_core 0000:02:00.0 enp2s0f0np0: renamed from eth0 Oct 2 20:40:54.831378 kernel: usbcore: registered new interface driver usbhid Oct 2 20:40:54.831408 kernel: usbhid: USB HID core driver Oct 2 20:40:54.867360 kernel: input: HID 0557:2419 as /devices/pci0000:00/0000:00:14.0/usb1/1-14/1-14.1/1-14.1:1.0/0003:0557:2419.0001/input/input0 Oct 2 20:40:54.867384 kernel: mlx5_core 0000:02:00.1 enp2s0f1np1: renamed from eth1 Oct 2 20:40:54.899380 kernel: ata1.00: Enabling discard_zeroes_data Oct 2 20:40:54.899395 kernel: ata2.00: Enabling discard_zeroes_data Oct 2 20:40:54.919350 kernel: sd 0:0:0:0: [sda] 937703088 512-byte logical blocks: (480 GB/447 GiB) Oct 2 20:40:54.919435 kernel: sd 1:0:0:0: [sdb] 937703088 512-byte logical blocks: (480 GB/447 GiB) Oct 2 20:40:54.919495 kernel: hid-generic 0003:0557:2419.0001: input,hidraw0: USB HID v1.00 Keyboard [HID 0557:2419] on usb-0000:00:14.0-14.1/input0 Oct 2 20:40:54.919561 kernel: input: HID 0557:2419 as /devices/pci0000:00/0000:00:14.0/usb1/1-14/1-14.1/1-14.1:1.1/0003:0557:2419.0002/input/input1 Oct 2 20:40:54.919568 kernel: hid-generic 0003:0557:2419.0002: input,hidraw1: USB HID v1.00 Mouse [HID 0557:2419] on usb-0000:00:14.0-14.1/input1 Oct 2 20:40:54.949994 kernel: sd 0:0:0:0: [sda] 4096-byte physical blocks Oct 2 20:40:54.950069 kernel: sd 1:0:0:0: [sdb] 4096-byte physical blocks Oct 2 20:40:54.984877 kernel: sd 0:0:0:0: [sda] Write Protect is off Oct 2 20:40:55.020362 kernel: sd 1:0:0:0: [sdb] Write Protect is off Oct 2 20:40:55.073237 kernel: sd 0:0:0:0: [sda] Mode Sense: 00 3a 00 00 Oct 2 20:40:55.073320 kernel: sd 0:0:0:0: [sda] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Oct 2 20:40:55.073382 kernel: sd 1:0:0:0: [sdb] Mode Sense: 00 3a 00 00 Oct 2 20:40:55.160490 kernel: ata1.00: Enabling discard_zeroes_data Oct 2 20:40:55.160506 kernel: sd 1:0:0:0: [sdb] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Oct 2 20:40:55.197902 kernel: ata2.00: Enabling discard_zeroes_data Oct 2 20:40:55.214381 kernel: ata2.00: Enabling discard_zeroes_data Oct 2 20:40:55.214396 kernel: sd 1:0:0:0: [sdb] Attached SCSI disk Oct 2 20:40:55.266763 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Oct 2 20:40:55.266779 kernel: GPT:9289727 != 937703087 Oct 2 20:40:55.266786 kernel: GPT:Alternate GPT header not at the end of the disk. Oct 2 20:40:55.284373 kernel: GPT:9289727 != 937703087 Oct 2 20:40:55.299428 kernel: GPT: Use GNU Parted to correct GPT errors. Oct 2 20:40:55.316044 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Oct 2 20:40:55.348839 kernel: ata1.00: Enabling discard_zeroes_data Oct 2 20:40:55.348854 kernel: sd 0:0:0:0: [sda] Attached SCSI disk Oct 2 20:40:55.399041 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Oct 2 20:40:55.443513 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/sda6 scanned by (udev-worker) (557) Oct 2 20:40:55.424519 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Oct 2 20:40:55.429320 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Oct 2 20:40:55.459976 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Oct 2 20:40:55.483708 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Oct 2 20:40:55.534429 kernel: ata1.00: Enabling discard_zeroes_data Oct 2 20:40:55.534443 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Oct 2 20:40:55.494982 systemd[1]: Starting disk-uuid.service... Oct 2 20:40:55.551408 kernel: ata1.00: Enabling discard_zeroes_data Oct 2 20:40:55.551458 disk-uuid[686]: Primary Header is updated. Oct 2 20:40:55.551458 disk-uuid[686]: Secondary Entries is updated. Oct 2 20:40:55.551458 disk-uuid[686]: Secondary Header is updated. Oct 2 20:40:55.609428 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Oct 2 20:40:55.609438 kernel: ata1.00: Enabling discard_zeroes_data Oct 2 20:40:55.609445 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Oct 2 20:40:56.595058 kernel: ata1.00: Enabling discard_zeroes_data Oct 2 20:40:56.613995 disk-uuid[687]: The operation has completed successfully. Oct 2 20:40:56.622522 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Oct 2 20:40:56.650508 systemd[1]: disk-uuid.service: Deactivated successfully. Oct 2 20:40:56.745128 kernel: audit: type=1130 audit(1696279256.657:19): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:40:56.745144 kernel: audit: type=1131 audit(1696279256.657:20): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:40:56.657000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:40:56.657000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:40:56.650565 systemd[1]: Finished disk-uuid.service. Oct 2 20:40:56.775347 kernel: device-mapper: verity: sha256 using implementation "sha256-generic" Oct 2 20:40:56.661749 systemd[1]: Starting verity-setup.service... Oct 2 20:40:56.809780 systemd[1]: Found device dev-mapper-usr.device. Oct 2 20:40:56.820950 systemd[1]: Mounting sysusr-usr.mount... Oct 2 20:40:56.833761 systemd[1]: Finished verity-setup.service. Oct 2 20:40:56.848000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:40:56.900314 kernel: audit: type=1130 audit(1696279256.848:21): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:40:56.957066 systemd[1]: Mounted sysusr-usr.mount. Oct 2 20:40:56.971411 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Oct 2 20:40:56.964599 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Oct 2 20:40:57.049453 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Oct 2 20:40:57.049470 kernel: BTRFS info (device sda6): using free space tree Oct 2 20:40:57.049478 kernel: BTRFS info (device sda6): has skinny extents Oct 2 20:40:57.049485 kernel: BTRFS info (device sda6): enabling ssd optimizations Oct 2 20:40:56.964981 systemd[1]: Starting ignition-setup.service... Oct 2 20:40:56.986795 systemd[1]: Starting parse-ip-for-networkd.service... Oct 2 20:40:57.075000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:40:57.060749 systemd[1]: Finished parse-ip-for-networkd.service. Oct 2 20:40:57.185427 kernel: audit: type=1130 audit(1696279257.075:22): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:40:57.185443 kernel: audit: type=1130 audit(1696279257.130:23): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:40:57.130000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:40:57.076664 systemd[1]: Finished ignition-setup.service. Oct 2 20:40:57.192000 audit: BPF prog-id=9 op=LOAD Oct 2 20:40:57.132007 systemd[1]: Starting ignition-fetch-offline.service... Oct 2 20:40:57.230392 kernel: audit: type=1334 audit(1696279257.192:24): prog-id=9 op=LOAD Oct 2 20:40:57.194221 systemd[1]: Starting systemd-networkd.service... Oct 2 20:40:57.237000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:40:57.229965 systemd-networkd[872]: lo: Link UP Oct 2 20:40:57.300422 kernel: audit: type=1130 audit(1696279257.237:25): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:40:57.297059 ignition[862]: Ignition 2.14.0 Oct 2 20:40:57.229967 systemd-networkd[872]: lo: Gained carrier Oct 2 20:40:57.320000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:40:57.297064 ignition[862]: Stage: fetch-offline Oct 2 20:40:57.442939 kernel: audit: type=1130 audit(1696279257.320:26): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:40:57.443031 kernel: audit: type=1130 audit(1696279257.374:27): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:40:57.443039 kernel: mlx5_core 0000:02:00.1 enp2s0f1np1: Link up Oct 2 20:40:57.374000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:40:57.230248 systemd-networkd[872]: Enumeration completed Oct 2 20:40:57.473540 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): enp2s0f1np1: link becomes ready Oct 2 20:40:57.297094 ignition[862]: reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 20:40:57.230320 systemd[1]: Started systemd-networkd.service. Oct 2 20:40:57.496000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:40:57.297108 ignition[862]: parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Oct 2 20:40:57.231004 systemd-networkd[872]: enp2s0f1np1: Configuring with /usr/lib/systemd/network/zz-default.network. Oct 2 20:40:57.523430 iscsid[895]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Oct 2 20:40:57.523430 iscsid[895]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Oct 2 20:40:57.523430 iscsid[895]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Oct 2 20:40:57.523430 iscsid[895]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Oct 2 20:40:57.523430 iscsid[895]: If using hardware iscsi like qla4xxx this message can be ignored. Oct 2 20:40:57.523430 iscsid[895]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Oct 2 20:40:57.523430 iscsid[895]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Oct 2 20:40:57.677516 kernel: mlx5_core 0000:02:00.0 enp2s0f0np0: Link up Oct 2 20:40:57.530000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:40:57.665000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:40:57.305362 ignition[862]: no config dir at "/usr/lib/ignition/base.platform.d/packet" Oct 2 20:40:57.238798 systemd[1]: Reached target network.target. Oct 2 20:40:57.305425 ignition[862]: parsed url from cmdline: "" Oct 2 20:40:57.293858 systemd[1]: Starting iscsiuio.service... Oct 2 20:40:57.305427 ignition[862]: no config URL provided Oct 2 20:40:57.308451 systemd[1]: Started iscsiuio.service. Oct 2 20:40:57.305430 ignition[862]: reading system config file "/usr/lib/ignition/user.ign" Oct 2 20:40:57.318304 unknown[862]: fetched base config from "system" Oct 2 20:40:57.305454 ignition[862]: parsing config with SHA512: 678c71fc4232dbca476e24d980aabdab8920756230a03cd909b81ef83bf0c41f777a74d54177faf1b0da5bd531cc5294ba3090f84673c904de3c79d32f44974f Oct 2 20:40:57.318312 unknown[862]: fetched user config from "system" Oct 2 20:40:57.318585 ignition[862]: fetch-offline: fetch-offline passed Oct 2 20:40:57.321679 systemd[1]: Finished ignition-fetch-offline.service. Oct 2 20:40:57.318588 ignition[862]: POST message to Packet Timeline Oct 2 20:40:57.375574 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). Oct 2 20:40:57.318592 ignition[862]: POST Status error: resource requires networking Oct 2 20:40:57.376006 systemd[1]: Starting ignition-kargs.service... Oct 2 20:40:57.318620 ignition[862]: Ignition finished successfully Oct 2 20:40:57.444362 systemd-networkd[872]: enp2s0f0np0: Configuring with /usr/lib/systemd/network/zz-default.network. Oct 2 20:40:57.447103 ignition[884]: Ignition 2.14.0 Oct 2 20:40:57.457879 systemd[1]: Starting iscsid.service... Oct 2 20:40:57.447106 ignition[884]: Stage: kargs Oct 2 20:40:57.480953 systemd[1]: Started iscsid.service. Oct 2 20:40:57.447161 ignition[884]: reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 20:40:57.497873 systemd[1]: Starting dracut-initqueue.service... Oct 2 20:40:57.447170 ignition[884]: parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Oct 2 20:40:57.511525 systemd[1]: Finished dracut-initqueue.service. Oct 2 20:40:57.448472 ignition[884]: no config dir at "/usr/lib/ignition/base.platform.d/packet" Oct 2 20:40:57.531477 systemd[1]: Reached target remote-fs-pre.target. Oct 2 20:40:57.450042 ignition[884]: kargs: kargs passed Oct 2 20:40:57.575508 systemd[1]: Reached target remote-cryptsetup.target. Oct 2 20:40:57.450045 ignition[884]: POST message to Packet Timeline Oct 2 20:40:57.596715 systemd[1]: Reached target remote-fs.target. Oct 2 20:40:57.450055 ignition[884]: GET https://metadata.packet.net/metadata: attempt #1 Oct 2 20:40:57.613815 systemd[1]: Starting dracut-pre-mount.service... Oct 2 20:40:57.453184 ignition[884]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:40852->[::1]:53: read: connection refused Oct 2 20:40:57.629741 systemd[1]: Finished dracut-pre-mount.service. Oct 2 20:40:57.653492 ignition[884]: GET https://metadata.packet.net/metadata: attempt #2 Oct 2 20:40:57.660019 systemd-networkd[872]: eno2: Configuring with /usr/lib/systemd/network/zz-default.network. Oct 2 20:40:57.653880 ignition[884]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:35966->[::1]:53: read: connection refused Oct 2 20:40:57.688942 systemd-networkd[872]: eno1: Configuring with /usr/lib/systemd/network/zz-default.network. Oct 2 20:40:57.719615 systemd-networkd[872]: enp2s0f1np1: Link UP Oct 2 20:40:57.720028 systemd-networkd[872]: enp2s0f1np1: Gained carrier Oct 2 20:40:57.727838 systemd-networkd[872]: enp2s0f0np0: Link UP Oct 2 20:40:57.728193 systemd-networkd[872]: eno2: Link UP Oct 2 20:40:57.728550 systemd-networkd[872]: eno1: Link UP Oct 2 20:40:58.053994 ignition[884]: GET https://metadata.packet.net/metadata: attempt #3 Oct 2 20:40:58.055267 ignition[884]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:45266->[::1]:53: read: connection refused Oct 2 20:40:58.476701 systemd-networkd[872]: enp2s0f0np0: Gained carrier Oct 2 20:40:58.486553 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): enp2s0f0np0: link becomes ready Oct 2 20:40:58.501488 systemd-networkd[872]: enp2s0f0np0: DHCPv4 address 139.178.89.131/31, gateway 139.178.89.130 acquired from 145.40.83.140 Oct 2 20:40:58.855666 ignition[884]: GET https://metadata.packet.net/metadata: attempt #4 Oct 2 20:40:58.856434 ignition[884]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:48562->[::1]:53: read: connection refused Oct 2 20:40:58.967795 systemd-networkd[872]: enp2s0f1np1: Gained IPv6LL Oct 2 20:41:00.311789 systemd-networkd[872]: enp2s0f0np0: Gained IPv6LL Oct 2 20:41:00.457462 ignition[884]: GET https://metadata.packet.net/metadata: attempt #5 Oct 2 20:41:00.458752 ignition[884]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:55328->[::1]:53: read: connection refused Oct 2 20:41:03.662242 ignition[884]: GET https://metadata.packet.net/metadata: attempt #6 Oct 2 20:41:03.700273 ignition[884]: GET result: OK Oct 2 20:41:03.996942 ignition[884]: Ignition finished successfully Oct 2 20:41:03.998595 systemd[1]: Finished ignition-kargs.service. Oct 2 20:41:04.083718 kernel: kauditd_printk_skb: 3 callbacks suppressed Oct 2 20:41:04.083737 kernel: audit: type=1130 audit(1696279264.011:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:41:04.011000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:41:04.020238 ignition[912]: Ignition 2.14.0 Oct 2 20:41:04.013603 systemd[1]: Starting ignition-disks.service... Oct 2 20:41:04.020242 ignition[912]: Stage: disks Oct 2 20:41:04.020319 ignition[912]: reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 20:41:04.020357 ignition[912]: parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Oct 2 20:41:04.021837 ignition[912]: no config dir at "/usr/lib/ignition/base.platform.d/packet" Oct 2 20:41:04.023258 ignition[912]: disks: disks passed Oct 2 20:41:04.023262 ignition[912]: POST message to Packet Timeline Oct 2 20:41:04.023272 ignition[912]: GET https://metadata.packet.net/metadata: attempt #1 Oct 2 20:41:04.054019 ignition[912]: GET result: OK Oct 2 20:41:04.211680 ignition[912]: Ignition finished successfully Oct 2 20:41:04.214744 systemd[1]: Finished ignition-disks.service. Oct 2 20:41:04.288394 kernel: audit: type=1130 audit(1696279264.226:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:41:04.226000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:41:04.228073 systemd[1]: Reached target initrd-root-device.target. Oct 2 20:41:04.296483 systemd[1]: Reached target local-fs-pre.target. Oct 2 20:41:04.296600 systemd[1]: Reached target local-fs.target. Oct 2 20:41:04.310591 systemd[1]: Reached target sysinit.target. Oct 2 20:41:04.324606 systemd[1]: Reached target basic.target. Oct 2 20:41:04.345482 systemd[1]: Starting systemd-fsck-root.service... Oct 2 20:41:04.368366 systemd-fsck[928]: ROOT: clean, 603/553520 files, 56012/553472 blocks Oct 2 20:41:04.379869 systemd[1]: Finished systemd-fsck-root.service. Oct 2 20:41:04.468570 kernel: audit: type=1130 audit(1696279264.387:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:41:04.468587 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Oct 2 20:41:04.387000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:41:04.390384 systemd[1]: Mounting sysroot.mount... Oct 2 20:41:04.477029 systemd[1]: Mounted sysroot.mount. Oct 2 20:41:04.492638 systemd[1]: Reached target initrd-root-fs.target. Oct 2 20:41:04.499284 systemd[1]: Mounting sysroot-usr.mount... Oct 2 20:41:04.514216 systemd[1]: Starting flatcar-metadata-hostname.service... Oct 2 20:41:04.524925 systemd[1]: Starting flatcar-static-network.service... Oct 2 20:41:04.546545 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Oct 2 20:41:04.546628 systemd[1]: Reached target ignition-diskful.target. Oct 2 20:41:04.565083 systemd[1]: Mounted sysroot-usr.mount. Oct 2 20:41:04.588566 systemd[1]: Mounting sysroot-usr-share-oem.mount... Oct 2 20:41:04.601063 systemd[1]: Starting initrd-setup-root.service... Oct 2 20:41:04.728987 kernel: BTRFS: device label OEM devid 1 transid 16 /dev/sda6 scanned by mount (939) Oct 2 20:41:04.729002 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Oct 2 20:41:04.729014 kernel: BTRFS info (device sda6): using free space tree Oct 2 20:41:04.729021 kernel: BTRFS info (device sda6): has skinny extents Oct 2 20:41:04.729028 kernel: BTRFS info (device sda6): enabling ssd optimizations Oct 2 20:41:04.666897 systemd[1]: Finished initrd-setup-root.service. Oct 2 20:41:04.790290 kernel: audit: type=1130 audit(1696279264.736:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:41:04.736000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:41:04.790336 coreos-metadata[936]: Oct 02 20:41:04.698 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Oct 2 20:41:04.790336 coreos-metadata[936]: Oct 02 20:41:04.723 INFO Fetch successful Oct 2 20:41:04.811576 coreos-metadata[935]: Oct 02 20:41:04.698 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Oct 2 20:41:04.811576 coreos-metadata[935]: Oct 02 20:41:04.723 INFO Fetch successful Oct 2 20:41:04.811576 coreos-metadata[935]: Oct 02 20:41:04.739 INFO wrote hostname ci-3510.3.0-a-0ae5c90d19 to /sysroot/etc/hostname Oct 2 20:41:05.024438 kernel: audit: type=1130 audit(1696279264.827:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:41:05.024452 kernel: audit: type=1130 audit(1696279264.890:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:41:05.024461 kernel: audit: type=1131 audit(1696279264.890:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:41:04.827000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:41:04.890000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:41:04.890000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:41:05.024523 initrd-setup-root[945]: cut: /sysroot/etc/passwd: No such file or directory Oct 2 20:41:04.738450 systemd[1]: Mounted sysroot-usr-share-oem.mount. Oct 2 20:41:05.047000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:41:05.076500 initrd-setup-root[954]: cut: /sysroot/etc/group: No such file or directory Oct 2 20:41:05.114456 kernel: audit: type=1130 audit(1696279265.047:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:41:04.798619 systemd[1]: Finished flatcar-metadata-hostname.service. Oct 2 20:41:05.123572 initrd-setup-root[962]: cut: /sysroot/etc/shadow: No such file or directory Oct 2 20:41:04.828573 systemd[1]: flatcar-static-network.service: Deactivated successfully. Oct 2 20:41:05.143540 initrd-setup-root[970]: cut: /sysroot/etc/gshadow: No such file or directory Oct 2 20:41:04.828617 systemd[1]: Finished flatcar-static-network.service. Oct 2 20:41:05.161467 ignition[1013]: INFO : Ignition 2.14.0 Oct 2 20:41:05.161467 ignition[1013]: INFO : Stage: mount Oct 2 20:41:05.161467 ignition[1013]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 20:41:05.161467 ignition[1013]: DEBUG : parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Oct 2 20:41:05.161467 ignition[1013]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/packet" Oct 2 20:41:05.161467 ignition[1013]: INFO : mount: mount passed Oct 2 20:41:05.161467 ignition[1013]: INFO : POST message to Packet Timeline Oct 2 20:41:05.161467 ignition[1013]: INFO : GET https://metadata.packet.net/metadata: attempt #1 Oct 2 20:41:05.161467 ignition[1013]: INFO : GET result: OK Oct 2 20:41:05.250000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:41:04.891923 systemd[1]: Starting ignition-mount.service... Oct 2 20:41:05.322552 kernel: audit: type=1130 audit(1696279265.250:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:41:05.322573 ignition[1013]: INFO : Ignition finished successfully Oct 2 20:41:05.012882 systemd[1]: Starting sysroot-boot.service... Oct 2 20:41:05.417401 kernel: BTRFS: device label OEM devid 1 transid 17 /dev/sda6 scanned by mount (1029) Oct 2 20:41:05.417413 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Oct 2 20:41:05.417420 kernel: BTRFS info (device sda6): using free space tree Oct 2 20:41:05.417427 kernel: BTRFS info (device sda6): has skinny extents Oct 2 20:41:05.417434 kernel: BTRFS info (device sda6): enabling ssd optimizations Oct 2 20:41:05.032000 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Oct 2 20:41:05.032038 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Oct 2 20:41:05.032592 systemd[1]: Finished sysroot-boot.service. Oct 2 20:41:05.482576 ignition[1048]: INFO : Ignition 2.14.0 Oct 2 20:41:05.482576 ignition[1048]: INFO : Stage: files Oct 2 20:41:05.482576 ignition[1048]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 20:41:05.482576 ignition[1048]: DEBUG : parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Oct 2 20:41:05.482576 ignition[1048]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/packet" Oct 2 20:41:05.482576 ignition[1048]: DEBUG : files: compiled without relabeling support, skipping Oct 2 20:41:05.482576 ignition[1048]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Oct 2 20:41:05.482576 ignition[1048]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Oct 2 20:41:05.482576 ignition[1048]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Oct 2 20:41:05.482576 ignition[1048]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Oct 2 20:41:05.482576 ignition[1048]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Oct 2 20:41:05.482576 ignition[1048]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.3.0.tgz" Oct 2 20:41:05.482576 ignition[1048]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://github.com/containernetworking/plugins/releases/download/v1.3.0/cni-plugins-linux-amd64-v1.3.0.tgz: attempt #1 Oct 2 20:41:05.234568 systemd[1]: Finished ignition-mount.service. Oct 2 20:41:05.253284 systemd[1]: Starting ignition-files.service... Oct 2 20:41:05.317142 systemd[1]: Mounting sysroot-usr-share-oem.mount... Oct 2 20:41:05.450233 systemd[1]: Mounted sysroot-usr-share-oem.mount. Oct 2 20:41:05.477962 unknown[1048]: wrote ssh authorized keys file for user: core Oct 2 20:41:05.851049 ignition[1048]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Oct 2 20:41:05.944140 ignition[1048]: DEBUG : files: createFilesystemsFiles: createFiles: op(3): file matches expected sum of: 5d0324ca8a3c90c680b6e1fddb245a2255582fa15949ba1f3c6bb7323df9d3af754dae98d6e40ac9ccafb2999c932df2c4288d418949a4915d928eb23c090540 Oct 2 20:41:05.944140 ignition[1048]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.3.0.tgz" Oct 2 20:41:05.944140 ignition[1048]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/opt/crictl-v1.27.0-linux-amd64.tar.gz" Oct 2 20:41:06.005538 ignition[1048]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.27.0/crictl-v1.27.0-linux-amd64.tar.gz: attempt #1 Oct 2 20:41:06.254605 ignition[1048]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET result: OK Oct 2 20:41:06.565868 ignition[1048]: DEBUG : files: createFilesystemsFiles: createFiles: op(4): file matches expected sum of: aa622325bf05520939f9e020d7a28ab48ac23e2fae6f47d5a4e52174c88c1ebc31b464853e4fd65bd8f5331f330a6ca96fd370d247d3eeaed042da4ee2d1219a Oct 2 20:41:06.565868 ignition[1048]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/crictl-v1.27.0-linux-amd64.tar.gz" Oct 2 20:41:06.606607 ignition[1048]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/opt/bin/kubeadm" Oct 2 20:41:06.606607 ignition[1048]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET https://storage.googleapis.com/kubernetes-release/release/v1.27.2/bin/linux/amd64/kubeadm: attempt #1 Oct 2 20:41:06.692679 ignition[1048]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET result: OK Oct 2 20:41:07.060272 ignition[1048]: DEBUG : files: createFilesystemsFiles: createFiles: op(5): file matches expected sum of: f40216b7d14046931c58072d10c7122934eac5a23c08821371f8b08ac1779443ad11d3458a4c5dcde7cf80fc600a9fefb14b1942aa46a52330248d497ca88836 Oct 2 20:41:07.084630 ignition[1048]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/opt/bin/kubeadm" Oct 2 20:41:07.084630 ignition[1048]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/bin/kubelet" Oct 2 20:41:07.084630 ignition[1048]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://storage.googleapis.com/kubernetes-release/release/v1.27.2/bin/linux/amd64/kubelet: attempt #1 Oct 2 20:41:07.136587 ignition[1048]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK Oct 2 20:41:07.702752 ignition[1048]: DEBUG : files: createFilesystemsFiles: createFiles: op(6): file matches expected sum of: a283da2224d456958b2cb99b4f6faf4457c4ed89e9e95f37d970c637f6a7f64ff4dd4d2bfce538759b2d2090933bece599a285ef8fd132eb383fece9a3941560 Oct 2 20:41:07.727637 ignition[1048]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/bin/kubelet" Oct 2 20:41:07.727637 ignition[1048]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/opt/bin/kubectl" Oct 2 20:41:07.727637 ignition[1048]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET https://storage.googleapis.com/kubernetes-release/release/v1.27.2/bin/linux/amd64/kubectl: attempt #1 Oct 2 20:41:07.780242 ignition[1048]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET result: OK Oct 2 20:41:08.074699 ignition[1048]: DEBUG : files: createFilesystemsFiles: createFiles: op(7): file matches expected sum of: 857e67001e74840518413593d90c6e64ad3f00d55fa44ad9a8e2ed6135392c908caff7ec19af18cbe10784b8f83afe687a0bc3bacbc9eee984cdeb9c0749cb83 Oct 2 20:41:08.074699 ignition[1048]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/opt/bin/kubectl" Oct 2 20:41:08.135416 ignition[1048]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/docker/daemon.json" Oct 2 20:41:08.135416 ignition[1048]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/docker/daemon.json" Oct 2 20:41:08.135416 ignition[1048]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/home/core/install.sh" Oct 2 20:41:08.135416 ignition[1048]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/home/core/install.sh" Oct 2 20:41:08.135416 ignition[1048]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/home/core/nginx.yaml" Oct 2 20:41:08.135416 ignition[1048]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/home/core/nginx.yaml" Oct 2 20:41:08.135416 ignition[1048]: INFO : files: createFilesystemsFiles: createFiles: op(b): [started] writing file "/sysroot/etc/systemd/system/packet-phone-home.service" Oct 2 20:41:08.135416 ignition[1048]: INFO : files: createFilesystemsFiles: createFiles: op(b): oem config not found in "/usr/share/oem", looking on oem partition Oct 2 20:41:08.135416 ignition[1048]: INFO : files: createFilesystemsFiles: createFiles: op(b): op(c): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem41538142" Oct 2 20:41:08.135416 ignition[1048]: CRITICAL : files: createFilesystemsFiles: createFiles: op(b): op(c): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem41538142": device or resource busy Oct 2 20:41:08.135416 ignition[1048]: ERROR : files: createFilesystemsFiles: createFiles: op(b): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem41538142", trying btrfs: device or resource busy Oct 2 20:41:08.135416 ignition[1048]: INFO : files: createFilesystemsFiles: createFiles: op(b): op(d): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem41538142" Oct 2 20:41:08.346618 kernel: BTRFS info: devid 1 device path /dev/sda6 changed to /dev/disk/by-label/OEM scanned by ignition (1057) Oct 2 20:41:08.343974 systemd[1]: Finished ignition-files.service. Oct 2 20:41:08.353000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:41:08.418905 ignition[1048]: INFO : files: createFilesystemsFiles: createFiles: op(b): op(d): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem41538142" Oct 2 20:41:08.418905 ignition[1048]: INFO : files: createFilesystemsFiles: createFiles: op(b): op(e): [started] unmounting "/mnt/oem41538142" Oct 2 20:41:08.418905 ignition[1048]: INFO : files: createFilesystemsFiles: createFiles: op(b): op(e): [finished] unmounting "/mnt/oem41538142" Oct 2 20:41:08.418905 ignition[1048]: INFO : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/etc/systemd/system/packet-phone-home.service" Oct 2 20:41:08.418905 ignition[1048]: INFO : files: op(f): [started] processing unit "coreos-metadata-sshkeys@.service" Oct 2 20:41:08.418905 ignition[1048]: INFO : files: op(f): [finished] processing unit "coreos-metadata-sshkeys@.service" Oct 2 20:41:08.418905 ignition[1048]: INFO : files: op(10): [started] processing unit "packet-phone-home.service" Oct 2 20:41:08.418905 ignition[1048]: INFO : files: op(10): [finished] processing unit "packet-phone-home.service" Oct 2 20:41:08.418905 ignition[1048]: INFO : files: op(11): [started] processing unit "prepare-cni-plugins.service" Oct 2 20:41:08.418905 ignition[1048]: INFO : files: op(11): op(12): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Oct 2 20:41:08.418905 ignition[1048]: INFO : files: op(11): op(12): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Oct 2 20:41:08.418905 ignition[1048]: INFO : files: op(11): [finished] processing unit "prepare-cni-plugins.service" Oct 2 20:41:08.418905 ignition[1048]: INFO : files: op(13): [started] processing unit "prepare-critools.service" Oct 2 20:41:08.418905 ignition[1048]: INFO : files: op(13): op(14): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Oct 2 20:41:08.418905 ignition[1048]: INFO : files: op(13): op(14): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Oct 2 20:41:08.418905 ignition[1048]: INFO : files: op(13): [finished] processing unit "prepare-critools.service" Oct 2 20:41:08.418905 ignition[1048]: INFO : files: op(15): [started] setting preset to enabled for "packet-phone-home.service" Oct 2 20:41:08.418905 ignition[1048]: INFO : files: op(15): [finished] setting preset to enabled for "packet-phone-home.service" Oct 2 20:41:08.418905 ignition[1048]: INFO : files: op(16): [started] setting preset to enabled for "prepare-cni-plugins.service" Oct 2 20:41:08.818617 kernel: audit: type=1130 audit(1696279268.353:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:41:08.463000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:41:08.495000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:41:08.495000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:41:08.569000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:41:08.569000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:41:08.660000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:41:08.783000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:41:08.364596 systemd[1]: Starting initrd-setup-root-after-ignition.service... Oct 2 20:41:08.835691 ignition[1048]: INFO : files: op(16): [finished] setting preset to enabled for "prepare-cni-plugins.service" Oct 2 20:41:08.835691 ignition[1048]: INFO : files: op(17): [started] setting preset to enabled for "prepare-critools.service" Oct 2 20:41:08.835691 ignition[1048]: INFO : files: op(17): [finished] setting preset to enabled for "prepare-critools.service" Oct 2 20:41:08.835691 ignition[1048]: INFO : files: op(18): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Oct 2 20:41:08.835691 ignition[1048]: INFO : files: op(18): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Oct 2 20:41:08.835691 ignition[1048]: INFO : files: createResultFile: createFiles: op(19): [started] writing file "/sysroot/etc/.ignition-result.json" Oct 2 20:41:08.835691 ignition[1048]: INFO : files: createResultFile: createFiles: op(19): [finished] writing file "/sysroot/etc/.ignition-result.json" Oct 2 20:41:08.835691 ignition[1048]: INFO : files: files passed Oct 2 20:41:08.835691 ignition[1048]: INFO : POST message to Packet Timeline Oct 2 20:41:08.835691 ignition[1048]: INFO : GET https://metadata.packet.net/metadata: attempt #1 Oct 2 20:41:08.835691 ignition[1048]: INFO : GET result: OK Oct 2 20:41:08.835691 ignition[1048]: INFO : Ignition finished successfully Oct 2 20:41:09.207967 kernel: kauditd_printk_skb: 7 callbacks suppressed Oct 2 20:41:09.207985 kernel: audit: type=1131 audit(1696279269.038:48): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:41:09.207993 kernel: audit: type=1131 audit(1696279269.148:49): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:41:09.038000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:41:09.148000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:41:08.427545 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Oct 2 20:41:09.273564 kernel: audit: type=1131 audit(1696279269.215:50): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:41:09.215000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:41:08.427880 systemd[1]: Starting ignition-quench.service... Oct 2 20:41:09.287526 initrd-setup-root-after-ignition[1085]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Oct 2 20:41:08.444808 systemd[1]: Finished initrd-setup-root-after-ignition.service. Oct 2 20:41:08.464752 systemd[1]: ignition-quench.service: Deactivated successfully. Oct 2 20:41:08.464808 systemd[1]: Finished ignition-quench.service. Oct 2 20:41:09.354000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:41:08.496649 systemd[1]: Reached target ignition-complete.target. Oct 2 20:41:09.482418 kernel: audit: type=1131 audit(1696279269.354:51): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:41:09.482435 kernel: audit: type=1131 audit(1696279269.423:52): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:41:09.423000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:41:08.523448 systemd[1]: Starting initrd-parse-etc.service... Oct 2 20:41:09.550337 kernel: audit: type=1131 audit(1696279269.489:53): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:41:09.489000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:41:08.540638 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Oct 2 20:41:08.540693 systemd[1]: Finished initrd-parse-etc.service. Oct 2 20:41:09.579520 iscsid[895]: iscsid shutting down. Oct 2 20:41:09.593514 ignition[1100]: INFO : Ignition 2.14.0 Oct 2 20:41:09.593514 ignition[1100]: INFO : Stage: umount Oct 2 20:41:09.593514 ignition[1100]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 20:41:09.593514 ignition[1100]: DEBUG : parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Oct 2 20:41:09.593514 ignition[1100]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/packet" Oct 2 20:41:09.593514 ignition[1100]: INFO : umount: umount passed Oct 2 20:41:09.593514 ignition[1100]: INFO : POST message to Packet Timeline Oct 2 20:41:09.593514 ignition[1100]: INFO : GET https://metadata.packet.net/metadata: attempt #1 Oct 2 20:41:09.593514 ignition[1100]: INFO : GET result: OK Oct 2 20:41:09.921533 kernel: audit: type=1131 audit(1696279269.600:54): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:41:09.921558 kernel: audit: type=1131 audit(1696279269.670:55): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:41:09.921569 kernel: audit: type=1131 audit(1696279269.738:56): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:41:09.921579 kernel: audit: type=1131 audit(1696279269.806:57): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:41:09.600000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:41:09.670000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:41:09.738000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:41:09.806000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:41:09.872000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:41:09.910000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:41:08.570594 systemd[1]: Reached target initrd-fs.target. Oct 2 20:41:09.933000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:41:09.941660 ignition[1100]: INFO : Ignition finished successfully Oct 2 20:41:09.948000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:41:08.590566 systemd[1]: Reached target initrd.target. Oct 2 20:41:09.965000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:41:08.610737 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Oct 2 20:41:08.612952 systemd[1]: Starting dracut-pre-pivot.service... Oct 2 20:41:09.998000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:41:08.646516 systemd[1]: Finished dracut-pre-pivot.service. Oct 2 20:41:10.014000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:41:10.014000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:41:08.663408 systemd[1]: Starting initrd-cleanup.service... Oct 2 20:41:08.696368 systemd[1]: Stopped target nss-lookup.target. Oct 2 20:41:08.718905 systemd[1]: Stopped target remote-cryptsetup.target. Oct 2 20:41:08.743954 systemd[1]: Stopped target timers.target. Oct 2 20:41:08.762893 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Oct 2 20:41:10.090000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:41:08.763254 systemd[1]: Stopped dracut-pre-pivot.service. Oct 2 20:41:10.106000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:41:10.107000 audit: BPF prog-id=6 op=UNLOAD Oct 2 20:41:08.785211 systemd[1]: Stopped target initrd.target. Oct 2 20:41:08.804901 systemd[1]: Stopped target basic.target. Oct 2 20:41:08.825904 systemd[1]: Stopped target ignition-complete.target. Oct 2 20:41:10.151000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:41:08.844897 systemd[1]: Stopped target ignition-diskful.target. Oct 2 20:41:10.167000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:41:08.868041 systemd[1]: Stopped target initrd-root-device.target. Oct 2 20:41:10.184000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:41:08.890048 systemd[1]: Stopped target remote-fs.target. Oct 2 20:41:08.911023 systemd[1]: Stopped target remote-fs-pre.target. Oct 2 20:41:10.215000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:41:08.934060 systemd[1]: Stopped target sysinit.target. Oct 2 20:41:08.958048 systemd[1]: Stopped target local-fs.target. Oct 2 20:41:08.984033 systemd[1]: Stopped target local-fs-pre.target. Oct 2 20:41:10.264000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:41:09.008885 systemd[1]: Stopped target swap.target. Oct 2 20:41:10.280000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:41:09.022775 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Oct 2 20:41:10.295000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:41:09.023145 systemd[1]: Stopped dracut-pre-mount.service. Oct 2 20:41:09.040205 systemd[1]: Stopped target cryptsetup.target. Oct 2 20:41:10.326000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:41:09.142587 systemd[1]: dracut-initqueue.service: Deactivated successfully. Oct 2 20:41:10.341000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:41:09.142666 systemd[1]: Stopped dracut-initqueue.service. Oct 2 20:41:10.357000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:41:09.149702 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Oct 2 20:41:10.372000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:41:10.372000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:41:09.149824 systemd[1]: Stopped ignition-fetch-offline.service. Oct 2 20:41:09.216668 systemd[1]: Stopped target paths.target. Oct 2 20:41:09.280555 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Oct 2 20:41:09.285533 systemd[1]: Stopped systemd-ask-password-console.path. Oct 2 20:41:09.296633 systemd[1]: Stopped target slices.target. Oct 2 20:41:09.318726 systemd[1]: Stopped target sockets.target. Oct 2 20:41:09.336609 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Oct 2 20:41:09.336724 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Oct 2 20:41:09.355737 systemd[1]: ignition-files.service: Deactivated successfully. Oct 2 20:41:09.355968 systemd[1]: Stopped ignition-files.service. Oct 2 20:41:09.424697 systemd[1]: flatcar-metadata-hostname.service: Deactivated successfully. Oct 2 20:41:09.424836 systemd[1]: Stopped flatcar-metadata-hostname.service. Oct 2 20:41:10.485000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:41:09.491332 systemd[1]: Stopping ignition-mount.service... Oct 2 20:41:09.557614 systemd[1]: Stopping iscsid.service... Oct 2 20:41:09.572900 systemd[1]: Stopping sysroot-boot.service... Oct 2 20:41:09.586553 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Oct 2 20:41:09.586936 systemd[1]: Stopped systemd-udev-trigger.service. Oct 2 20:41:09.601898 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Oct 2 20:41:09.602199 systemd[1]: Stopped dracut-pre-trigger.service. Oct 2 20:41:10.568314 systemd-journald[269]: Received SIGTERM from PID 1 (n/a). Oct 2 20:41:09.672970 systemd[1]: sysroot-boot.mount: Deactivated successfully. Oct 2 20:41:09.673387 systemd[1]: iscsid.service: Deactivated successfully. Oct 2 20:41:09.673429 systemd[1]: Stopped iscsid.service. Oct 2 20:41:09.739774 systemd[1]: ignition-mount.service: Deactivated successfully. Oct 2 20:41:09.739812 systemd[1]: Stopped ignition-mount.service. Oct 2 20:41:09.807693 systemd[1]: sysroot-boot.service: Deactivated successfully. Oct 2 20:41:09.807731 systemd[1]: Stopped sysroot-boot.service. Oct 2 20:41:09.873728 systemd[1]: iscsid.socket: Deactivated successfully. Oct 2 20:41:09.873771 systemd[1]: Closed iscsid.socket. Oct 2 20:41:09.884690 systemd[1]: ignition-disks.service: Deactivated successfully. Oct 2 20:41:09.884725 systemd[1]: Stopped ignition-disks.service. Oct 2 20:41:09.911512 systemd[1]: ignition-kargs.service: Deactivated successfully. Oct 2 20:41:09.911542 systemd[1]: Stopped ignition-kargs.service. Oct 2 20:41:09.934562 systemd[1]: ignition-setup.service: Deactivated successfully. Oct 2 20:41:09.934619 systemd[1]: Stopped ignition-setup.service. Oct 2 20:41:09.949619 systemd[1]: initrd-setup-root.service: Deactivated successfully. Oct 2 20:41:09.949710 systemd[1]: Stopped initrd-setup-root.service. Oct 2 20:41:09.966872 systemd[1]: Stopping iscsiuio.service... Oct 2 20:41:09.982194 systemd[1]: iscsiuio.service: Deactivated successfully. Oct 2 20:41:09.982441 systemd[1]: Stopped iscsiuio.service. Oct 2 20:41:10.000393 systemd[1]: initrd-cleanup.service: Deactivated successfully. Oct 2 20:41:10.000611 systemd[1]: Finished initrd-cleanup.service. Oct 2 20:41:10.017782 systemd[1]: Stopped target network.target. Oct 2 20:41:10.030580 systemd[1]: iscsiuio.socket: Deactivated successfully. Oct 2 20:41:10.030683 systemd[1]: Closed iscsiuio.socket. Oct 2 20:41:10.045816 systemd[1]: Stopping systemd-networkd.service... Oct 2 20:41:10.054448 systemd-networkd[872]: enp2s0f1np1: DHCPv6 lease lost Oct 2 20:41:10.060727 systemd[1]: Stopping systemd-resolved.service... Oct 2 20:41:10.066499 systemd-networkd[872]: enp2s0f0np0: DHCPv6 lease lost Oct 2 20:41:10.077019 systemd[1]: systemd-resolved.service: Deactivated successfully. Oct 2 20:41:10.567000 audit: BPF prog-id=9 op=UNLOAD Oct 2 20:41:10.077262 systemd[1]: Stopped systemd-resolved.service. Oct 2 20:41:10.092249 systemd[1]: systemd-networkd.service: Deactivated successfully. Oct 2 20:41:10.092506 systemd[1]: Stopped systemd-networkd.service. Oct 2 20:41:10.107919 systemd[1]: systemd-networkd.socket: Deactivated successfully. Oct 2 20:41:10.107999 systemd[1]: Closed systemd-networkd.socket. Oct 2 20:41:10.123954 systemd[1]: Stopping network-cleanup.service... Oct 2 20:41:10.137532 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Oct 2 20:41:10.137669 systemd[1]: Stopped parse-ip-for-networkd.service. Oct 2 20:41:10.152770 systemd[1]: systemd-sysctl.service: Deactivated successfully. Oct 2 20:41:10.152909 systemd[1]: Stopped systemd-sysctl.service. Oct 2 20:41:10.169078 systemd[1]: systemd-modules-load.service: Deactivated successfully. Oct 2 20:41:10.169219 systemd[1]: Stopped systemd-modules-load.service. Oct 2 20:41:10.185974 systemd[1]: Stopping systemd-udevd.service... Oct 2 20:41:10.204215 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Oct 2 20:41:10.205627 systemd[1]: systemd-udevd.service: Deactivated successfully. Oct 2 20:41:10.205946 systemd[1]: Stopped systemd-udevd.service. Oct 2 20:41:10.218986 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Oct 2 20:41:10.219119 systemd[1]: Closed systemd-udevd-control.socket. Oct 2 20:41:10.233629 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Oct 2 20:41:10.233736 systemd[1]: Closed systemd-udevd-kernel.socket. Oct 2 20:41:10.249592 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Oct 2 20:41:10.249616 systemd[1]: Stopped dracut-pre-udev.service. Oct 2 20:41:10.265655 systemd[1]: dracut-cmdline.service: Deactivated successfully. Oct 2 20:41:10.265700 systemd[1]: Stopped dracut-cmdline.service. Oct 2 20:41:10.281549 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Oct 2 20:41:10.281606 systemd[1]: Stopped dracut-cmdline-ask.service. Oct 2 20:41:10.297508 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Oct 2 20:41:10.312525 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Oct 2 20:41:10.312697 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Oct 2 20:41:10.327985 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Oct 2 20:41:10.328111 systemd[1]: Stopped kmod-static-nodes.service. Oct 2 20:41:10.342628 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Oct 2 20:41:10.342744 systemd[1]: Stopped systemd-vconsole-setup.service. Oct 2 20:41:10.360854 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Oct 2 20:41:10.362075 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Oct 2 20:41:10.362272 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Oct 2 20:41:10.467943 systemd[1]: network-cleanup.service: Deactivated successfully. Oct 2 20:41:10.468157 systemd[1]: Stopped network-cleanup.service. Oct 2 20:41:10.486989 systemd[1]: Reached target initrd-switch-root.target. Oct 2 20:41:10.505350 systemd[1]: Starting initrd-switch-root.service... Oct 2 20:41:10.526076 systemd[1]: Switching root. Oct 2 20:41:10.569759 systemd-journald[269]: Journal stopped Oct 2 20:41:14.469407 kernel: SELinux: Class mctp_socket not defined in policy. Oct 2 20:41:14.469429 kernel: SELinux: Class anon_inode not defined in policy. Oct 2 20:41:14.469446 kernel: SELinux: the above unknown classes and permissions will be allowed Oct 2 20:41:14.469455 kernel: SELinux: policy capability network_peer_controls=1 Oct 2 20:41:14.469472 kernel: SELinux: policy capability open_perms=1 Oct 2 20:41:14.469481 kernel: SELinux: policy capability extended_socket_class=1 Oct 2 20:41:14.469495 kernel: SELinux: policy capability always_check_network=0 Oct 2 20:41:14.469506 kernel: SELinux: policy capability cgroup_seclabel=1 Oct 2 20:41:14.469516 kernel: SELinux: policy capability nnp_nosuid_transition=1 Oct 2 20:41:14.469525 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Oct 2 20:41:14.469541 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Oct 2 20:41:14.469553 systemd[1]: Successfully loaded SELinux policy in 321.977ms. Oct 2 20:41:14.469568 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 6.510ms. Oct 2 20:41:14.469584 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Oct 2 20:41:14.469599 systemd[1]: Detected architecture x86-64. Oct 2 20:41:14.469612 systemd[1]: Detected first boot. Oct 2 20:41:14.469627 systemd[1]: Hostname set to . Oct 2 20:41:14.469640 systemd[1]: Initializing machine ID from random generator. Oct 2 20:41:14.469653 systemd[1]: Populated /etc with preset unit settings. Oct 2 20:41:14.469664 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 2 20:41:14.469680 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 2 20:41:14.469693 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 2 20:41:14.469709 systemd[1]: initrd-switch-root.service: Deactivated successfully. Oct 2 20:41:14.469721 systemd[1]: Stopped initrd-switch-root.service. Oct 2 20:41:14.469734 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Oct 2 20:41:14.469748 systemd[1]: Created slice system-addon\x2dconfig.slice. Oct 2 20:41:14.469758 systemd[1]: Created slice system-addon\x2drun.slice. Oct 2 20:41:14.469774 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Oct 2 20:41:14.469784 systemd[1]: Created slice system-getty.slice. Oct 2 20:41:14.469800 systemd[1]: Created slice system-modprobe.slice. Oct 2 20:41:14.469817 systemd[1]: Created slice system-serial\x2dgetty.slice. Oct 2 20:41:14.469829 systemd[1]: Created slice system-system\x2dcloudinit.slice. Oct 2 20:41:14.469840 systemd[1]: Created slice system-systemd\x2dfsck.slice. Oct 2 20:41:14.469853 systemd[1]: Created slice user.slice. Oct 2 20:41:14.469865 systemd[1]: Started systemd-ask-password-console.path. Oct 2 20:41:14.469881 systemd[1]: Started systemd-ask-password-wall.path. Oct 2 20:41:14.469894 systemd[1]: Set up automount boot.automount. Oct 2 20:41:14.469908 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Oct 2 20:41:14.469921 systemd[1]: Stopped target initrd-switch-root.target. Oct 2 20:41:14.469935 systemd[1]: Stopped target initrd-fs.target. Oct 2 20:41:14.469952 systemd[1]: Stopped target initrd-root-fs.target. Oct 2 20:41:14.469971 systemd[1]: Reached target integritysetup.target. Oct 2 20:41:14.469984 systemd[1]: Reached target remote-cryptsetup.target. Oct 2 20:41:14.469997 systemd[1]: Reached target remote-fs.target. Oct 2 20:41:14.470010 systemd[1]: Reached target slices.target. Oct 2 20:41:14.470023 systemd[1]: Reached target swap.target. Oct 2 20:41:14.470037 systemd[1]: Reached target torcx.target. Oct 2 20:41:14.470056 systemd[1]: Reached target veritysetup.target. Oct 2 20:41:14.470070 systemd[1]: Listening on systemd-coredump.socket. Oct 2 20:41:14.470082 systemd[1]: Listening on systemd-initctl.socket. Oct 2 20:41:14.470096 systemd[1]: Listening on systemd-networkd.socket. Oct 2 20:41:14.470110 systemd[1]: Listening on systemd-udevd-control.socket. Oct 2 20:41:14.470127 systemd[1]: Listening on systemd-udevd-kernel.socket. Oct 2 20:41:14.470142 systemd[1]: Listening on systemd-userdbd.socket. Oct 2 20:41:14.470155 systemd[1]: Mounting dev-hugepages.mount... Oct 2 20:41:14.470169 systemd[1]: Mounting dev-mqueue.mount... Oct 2 20:41:14.470187 systemd[1]: Mounting media.mount... Oct 2 20:41:14.470204 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Oct 2 20:41:14.470217 systemd[1]: Mounting sys-kernel-debug.mount... Oct 2 20:41:14.470229 systemd[1]: Mounting sys-kernel-tracing.mount... Oct 2 20:41:14.470246 systemd[1]: Mounting tmp.mount... Oct 2 20:41:14.470259 systemd[1]: Starting flatcar-tmpfiles.service... Oct 2 20:41:14.470276 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Oct 2 20:41:14.470289 systemd[1]: Starting kmod-static-nodes.service... Oct 2 20:41:14.470303 systemd[1]: Starting modprobe@configfs.service... Oct 2 20:41:14.470319 systemd[1]: Starting modprobe@dm_mod.service... Oct 2 20:41:14.470333 systemd[1]: Starting modprobe@drm.service... Oct 2 20:41:14.470349 systemd[1]: Starting modprobe@efi_pstore.service... Oct 2 20:41:14.470363 systemd[1]: Starting modprobe@fuse.service... Oct 2 20:41:14.470376 kernel: fuse: init (API version 7.34) Oct 2 20:41:14.470388 systemd[1]: Starting modprobe@loop.service... Oct 2 20:41:14.470402 kernel: loop: module loaded Oct 2 20:41:14.470411 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Oct 2 20:41:14.470428 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Oct 2 20:41:14.470441 systemd[1]: Stopped systemd-fsck-root.service. Oct 2 20:41:14.470455 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Oct 2 20:41:14.470468 kernel: kauditd_printk_skb: 43 callbacks suppressed Oct 2 20:41:14.470482 kernel: audit: type=1131 audit(1696279274.108:101): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:41:14.470499 systemd[1]: Stopped systemd-fsck-usr.service. Oct 2 20:41:14.470517 kernel: audit: type=1131 audit(1696279274.196:102): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:41:14.470529 systemd[1]: Stopped systemd-journald.service. Oct 2 20:41:14.470543 kernel: audit: type=1130 audit(1696279274.260:103): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:41:14.470553 kernel: audit: type=1131 audit(1696279274.260:104): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:41:14.470566 kernel: audit: type=1334 audit(1696279274.346:105): prog-id=15 op=LOAD Oct 2 20:41:14.470582 kernel: audit: type=1334 audit(1696279274.364:106): prog-id=16 op=LOAD Oct 2 20:41:14.470598 kernel: audit: type=1334 audit(1696279274.382:107): prog-id=17 op=LOAD Oct 2 20:41:14.470619 kernel: audit: type=1334 audit(1696279274.400:108): prog-id=13 op=UNLOAD Oct 2 20:41:14.470639 systemd[1]: Starting systemd-journald.service... Oct 2 20:41:14.470658 kernel: audit: type=1334 audit(1696279274.400:109): prog-id=14 op=UNLOAD Oct 2 20:41:14.470676 systemd[1]: Starting systemd-modules-load.service... Oct 2 20:41:14.470694 kernel: audit: type=1305 audit(1696279274.465:110): op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Oct 2 20:41:14.470718 systemd-journald[1251]: Journal started Oct 2 20:41:14.470781 systemd-journald[1251]: Runtime Journal (/run/log/journal/3e8704d9f33346d2a10e91014bb00e61) is 8.0M, max 637.5M, 629.5M free. Oct 2 20:41:10.973000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Oct 2 20:41:11.245000 audit[1]: AVC avc: denied { integrity } for pid=1 comm="systemd" lockdown_reason="/dev/mem,kmem,port" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Oct 2 20:41:11.247000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Oct 2 20:41:11.247000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Oct 2 20:41:11.247000 audit: BPF prog-id=10 op=LOAD Oct 2 20:41:11.247000 audit: BPF prog-id=10 op=UNLOAD Oct 2 20:41:11.247000 audit: BPF prog-id=11 op=LOAD Oct 2 20:41:11.247000 audit: BPF prog-id=11 op=UNLOAD Oct 2 20:41:12.858000 audit: BPF prog-id=12 op=LOAD Oct 2 20:41:12.858000 audit: BPF prog-id=3 op=UNLOAD Oct 2 20:41:12.858000 audit: BPF prog-id=13 op=LOAD Oct 2 20:41:12.858000 audit: BPF prog-id=14 op=LOAD Oct 2 20:41:12.858000 audit: BPF prog-id=4 op=UNLOAD Oct 2 20:41:12.858000 audit: BPF prog-id=5 op=UNLOAD Oct 2 20:41:12.859000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:41:12.907000 audit: BPF prog-id=12 op=UNLOAD Oct 2 20:41:12.915000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:41:12.915000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:41:14.108000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:41:14.196000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:41:14.260000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:41:14.260000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:41:14.346000 audit: BPF prog-id=15 op=LOAD Oct 2 20:41:14.364000 audit: BPF prog-id=16 op=LOAD Oct 2 20:41:14.382000 audit: BPF prog-id=17 op=LOAD Oct 2 20:41:14.400000 audit: BPF prog-id=13 op=UNLOAD Oct 2 20:41:14.400000 audit: BPF prog-id=14 op=UNLOAD Oct 2 20:41:14.465000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Oct 2 20:41:12.857866 systemd[1]: Queued start job for default target multi-user.target. Oct 2 20:41:11.341123 /usr/lib/systemd/system-generators/torcx-generator[1140]: time="2023-10-02T20:41:11Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.0 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.0 /var/lib/torcx/store]" Oct 2 20:41:12.860457 systemd[1]: systemd-journald.service: Deactivated successfully. Oct 2 20:41:11.341534 /usr/lib/systemd/system-generators/torcx-generator[1140]: time="2023-10-02T20:41:11Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Oct 2 20:41:11.341546 /usr/lib/systemd/system-generators/torcx-generator[1140]: time="2023-10-02T20:41:11Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Oct 2 20:41:11.341565 /usr/lib/systemd/system-generators/torcx-generator[1140]: time="2023-10-02T20:41:11Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Oct 2 20:41:11.341570 /usr/lib/systemd/system-generators/torcx-generator[1140]: time="2023-10-02T20:41:11Z" level=debug msg="skipped missing lower profile" missing profile=oem Oct 2 20:41:11.341586 /usr/lib/systemd/system-generators/torcx-generator[1140]: time="2023-10-02T20:41:11Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Oct 2 20:41:11.341593 /usr/lib/systemd/system-generators/torcx-generator[1140]: time="2023-10-02T20:41:11Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Oct 2 20:41:11.341698 /usr/lib/systemd/system-generators/torcx-generator[1140]: time="2023-10-02T20:41:11Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Oct 2 20:41:11.341719 /usr/lib/systemd/system-generators/torcx-generator[1140]: time="2023-10-02T20:41:11Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Oct 2 20:41:11.341726 /usr/lib/systemd/system-generators/torcx-generator[1140]: time="2023-10-02T20:41:11Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Oct 2 20:41:11.342168 /usr/lib/systemd/system-generators/torcx-generator[1140]: time="2023-10-02T20:41:11Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Oct 2 20:41:11.342187 /usr/lib/systemd/system-generators/torcx-generator[1140]: time="2023-10-02T20:41:11Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Oct 2 20:41:11.342197 /usr/lib/systemd/system-generators/torcx-generator[1140]: time="2023-10-02T20:41:11Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.0: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.0 Oct 2 20:41:11.342205 /usr/lib/systemd/system-generators/torcx-generator[1140]: time="2023-10-02T20:41:11Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Oct 2 20:41:11.342213 /usr/lib/systemd/system-generators/torcx-generator[1140]: time="2023-10-02T20:41:11Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.0: no such file or directory" path=/var/lib/torcx/store/3510.3.0 Oct 2 20:41:11.342221 /usr/lib/systemd/system-generators/torcx-generator[1140]: time="2023-10-02T20:41:11Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Oct 2 20:41:12.507103 /usr/lib/systemd/system-generators/torcx-generator[1140]: time="2023-10-02T20:41:12Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 2 20:41:12.507254 /usr/lib/systemd/system-generators/torcx-generator[1140]: time="2023-10-02T20:41:12Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 2 20:41:12.507317 /usr/lib/systemd/system-generators/torcx-generator[1140]: time="2023-10-02T20:41:12Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 2 20:41:12.507408 /usr/lib/systemd/system-generators/torcx-generator[1140]: time="2023-10-02T20:41:12Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 2 20:41:12.507438 /usr/lib/systemd/system-generators/torcx-generator[1140]: time="2023-10-02T20:41:12Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Oct 2 20:41:12.507472 /usr/lib/systemd/system-generators/torcx-generator[1140]: time="2023-10-02T20:41:12Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Oct 2 20:41:14.465000 audit[1251]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=3 a1=7ffcee34b240 a2=4000 a3=7ffcee34b2dc items=0 ppid=1 pid=1251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:41:14.465000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Oct 2 20:41:14.547497 systemd[1]: Starting systemd-network-generator.service... Oct 2 20:41:14.574355 systemd[1]: Starting systemd-remount-fs.service... Oct 2 20:41:14.601364 systemd[1]: Starting systemd-udev-trigger.service... Oct 2 20:41:14.644262 systemd[1]: verity-setup.service: Deactivated successfully. Oct 2 20:41:14.644284 systemd[1]: Stopped verity-setup.service. Oct 2 20:41:14.650000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:41:14.689351 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Oct 2 20:41:14.709493 systemd[1]: Started systemd-journald.service. Oct 2 20:41:14.715000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:41:14.716956 systemd[1]: Mounted dev-hugepages.mount. Oct 2 20:41:14.724571 systemd[1]: Mounted dev-mqueue.mount. Oct 2 20:41:14.731573 systemd[1]: Mounted media.mount. Oct 2 20:41:14.738570 systemd[1]: Mounted sys-kernel-debug.mount. Oct 2 20:41:14.747559 systemd[1]: Mounted sys-kernel-tracing.mount. Oct 2 20:41:14.756546 systemd[1]: Mounted tmp.mount. Oct 2 20:41:14.763623 systemd[1]: Finished flatcar-tmpfiles.service. Oct 2 20:41:14.771000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:41:14.772643 systemd[1]: Finished kmod-static-nodes.service. Oct 2 20:41:14.780000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:41:14.781762 systemd[1]: modprobe@configfs.service: Deactivated successfully. Oct 2 20:41:14.781879 systemd[1]: Finished modprobe@configfs.service. Oct 2 20:41:14.789000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:41:14.789000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:41:14.790728 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Oct 2 20:41:14.790867 systemd[1]: Finished modprobe@dm_mod.service. Oct 2 20:41:14.798000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:41:14.798000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:41:14.799812 systemd[1]: modprobe@drm.service: Deactivated successfully. Oct 2 20:41:14.799973 systemd[1]: Finished modprobe@drm.service. Oct 2 20:41:14.808000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:41:14.808000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:41:14.810051 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Oct 2 20:41:14.810332 systemd[1]: Finished modprobe@efi_pstore.service. Oct 2 20:41:14.817000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:41:14.817000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:41:14.819141 systemd[1]: modprobe@fuse.service: Deactivated successfully. Oct 2 20:41:14.819627 systemd[1]: Finished modprobe@fuse.service. Oct 2 20:41:14.826000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:41:14.826000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:41:14.828116 systemd[1]: modprobe@loop.service: Deactivated successfully. Oct 2 20:41:14.828516 systemd[1]: Finished modprobe@loop.service. Oct 2 20:41:14.835000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:41:14.835000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:41:14.837156 systemd[1]: Finished systemd-modules-load.service. Oct 2 20:41:14.844000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:41:14.846090 systemd[1]: Finished systemd-network-generator.service. Oct 2 20:41:14.853000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:41:14.855097 systemd[1]: Finished systemd-remount-fs.service. Oct 2 20:41:14.862000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:41:14.864100 systemd[1]: Finished systemd-udev-trigger.service. Oct 2 20:41:14.871000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:41:14.873675 systemd[1]: Reached target network-pre.target. Oct 2 20:41:14.885170 systemd[1]: Mounting sys-fs-fuse-connections.mount... Oct 2 20:41:14.894010 systemd[1]: Mounting sys-kernel-config.mount... Oct 2 20:41:14.901515 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Oct 2 20:41:14.902496 systemd[1]: Starting systemd-hwdb-update.service... Oct 2 20:41:14.909927 systemd[1]: Starting systemd-journal-flush.service... Oct 2 20:41:14.913721 systemd-journald[1251]: Time spent on flushing to /var/log/journal/3e8704d9f33346d2a10e91014bb00e61 is 15.291ms for 1603 entries. Oct 2 20:41:14.913721 systemd-journald[1251]: System Journal (/var/log/journal/3e8704d9f33346d2a10e91014bb00e61) is 8.0M, max 195.6M, 187.6M free. Oct 2 20:41:14.960176 systemd-journald[1251]: Received client request to flush runtime journal. Oct 2 20:41:14.926423 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Oct 2 20:41:14.926999 systemd[1]: Starting systemd-random-seed.service... Oct 2 20:41:14.941416 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Oct 2 20:41:14.941928 systemd[1]: Starting systemd-sysctl.service... Oct 2 20:41:14.949163 systemd[1]: Starting systemd-sysusers.service... Oct 2 20:41:14.955887 systemd[1]: Starting systemd-udev-settle.service... Oct 2 20:41:14.964518 systemd[1]: Mounted sys-fs-fuse-connections.mount. Oct 2 20:41:14.972500 systemd[1]: Mounted sys-kernel-config.mount. Oct 2 20:41:14.980550 systemd[1]: Finished systemd-journal-flush.service. Oct 2 20:41:14.987000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:41:14.988540 systemd[1]: Finished systemd-random-seed.service. Oct 2 20:41:14.995000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:41:14.996518 systemd[1]: Finished systemd-sysctl.service. Oct 2 20:41:15.003000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:41:15.004521 systemd[1]: Finished systemd-sysusers.service. Oct 2 20:41:15.011000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:41:15.013513 systemd[1]: Reached target first-boot-complete.target. Oct 2 20:41:15.023062 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Oct 2 20:41:15.032505 udevadm[1267]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Oct 2 20:41:15.040670 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Oct 2 20:41:15.047000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:41:15.214583 systemd[1]: Finished systemd-hwdb-update.service. Oct 2 20:41:15.221000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:41:15.222000 audit: BPF prog-id=18 op=LOAD Oct 2 20:41:15.223000 audit: BPF prog-id=19 op=LOAD Oct 2 20:41:15.223000 audit: BPF prog-id=7 op=UNLOAD Oct 2 20:41:15.223000 audit: BPF prog-id=8 op=UNLOAD Oct 2 20:41:15.225761 systemd[1]: Starting systemd-udevd.service... Oct 2 20:41:15.240453 systemd-udevd[1271]: Using default interface naming scheme 'v252'. Oct 2 20:41:15.261124 systemd[1]: Started systemd-udevd.service. Oct 2 20:41:15.268000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:41:15.271483 systemd[1]: Condition check resulted in dev-ttyS1.device being skipped. Oct 2 20:41:15.271000 audit: BPF prog-id=20 op=LOAD Oct 2 20:41:15.272820 systemd[1]: Starting systemd-networkd.service... Oct 2 20:41:15.294000 audit: BPF prog-id=21 op=LOAD Oct 2 20:41:15.313570 kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0E:00/input/input2 Oct 2 20:41:15.313734 kernel: ACPI: button: Sleep Button [SLPB] Oct 2 20:41:15.312000 audit: BPF prog-id=22 op=LOAD Oct 2 20:41:15.312000 audit: BPF prog-id=23 op=LOAD Oct 2 20:41:15.314201 systemd[1]: Starting systemd-userdbd.service... Oct 2 20:41:15.335178 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input3 Oct 2 20:41:15.335269 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/sda6 scanned by (udev-worker) (1335) Oct 2 20:41:15.360315 kernel: ACPI: button: Power Button [PWRF] Oct 2 20:41:15.306000 audit[1292]: AVC avc: denied { confidentiality } for pid=1292 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Oct 2 20:41:15.306000 audit[1292]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=561c25eef030 a1=4d8bc a2=7f7a9cb04bc5 a3=5 items=40 ppid=1271 pid=1292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:41:15.306000 audit: CWD cwd="/" Oct 2 20:41:15.306000 audit: PATH item=0 name=(null) inode=15504 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 20:41:15.306000 audit: PATH item=1 name=(null) inode=13759 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 20:41:15.306000 audit: PATH item=2 name=(null) inode=15504 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 20:41:15.306000 audit: PATH item=3 name=(null) inode=13760 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 20:41:15.306000 audit: PATH item=4 name=(null) inode=15504 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 20:41:15.306000 audit: PATH item=5 name=(null) inode=13761 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 20:41:15.306000 audit: PATH item=6 name=(null) inode=13761 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 20:41:15.306000 audit: PATH item=7 name=(null) inode=13762 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 20:41:15.306000 audit: PATH item=8 name=(null) inode=13761 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 20:41:15.306000 audit: PATH item=9 name=(null) inode=13763 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 20:41:15.306000 audit: PATH item=10 name=(null) inode=13761 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 20:41:15.306000 audit: PATH item=11 name=(null) inode=13764 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 20:41:15.306000 audit: PATH item=12 name=(null) inode=13761 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 20:41:15.306000 audit: PATH item=13 name=(null) inode=13765 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 20:41:15.306000 audit: PATH item=14 name=(null) inode=13761 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 20:41:15.306000 audit: PATH item=15 name=(null) inode=13766 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 20:41:15.306000 audit: PATH item=16 name=(null) inode=15504 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 20:41:15.306000 audit: PATH item=17 name=(null) inode=13767 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 20:41:15.306000 audit: PATH item=18 name=(null) inode=13767 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 20:41:15.306000 audit: PATH item=19 name=(null) inode=13768 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 20:41:15.306000 audit: PATH item=20 name=(null) inode=13767 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 20:41:15.306000 audit: PATH item=21 name=(null) inode=13769 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 20:41:15.306000 audit: PATH item=22 name=(null) inode=13767 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 20:41:15.306000 audit: PATH item=23 name=(null) inode=13770 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 20:41:15.306000 audit: PATH item=24 name=(null) inode=13767 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 20:41:15.306000 audit: PATH item=25 name=(null) inode=13771 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 20:41:15.306000 audit: PATH item=26 name=(null) inode=13767 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 20:41:15.306000 audit: PATH item=27 name=(null) inode=13772 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 20:41:15.306000 audit: PATH item=28 name=(null) inode=15504 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 20:41:15.306000 audit: PATH item=29 name=(null) inode=13773 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 20:41:15.306000 audit: PATH item=30 name=(null) inode=13773 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 20:41:15.306000 audit: PATH item=31 name=(null) inode=13774 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 20:41:15.306000 audit: PATH item=32 name=(null) inode=13773 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 20:41:15.306000 audit: PATH item=33 name=(null) inode=13775 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 20:41:15.306000 audit: PATH item=34 name=(null) inode=13773 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 20:41:15.306000 audit: PATH item=35 name=(null) inode=13776 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 20:41:15.306000 audit: PATH item=36 name=(null) inode=13773 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 20:41:15.306000 audit: PATH item=37 name=(null) inode=13777 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 20:41:15.306000 audit: PATH item=38 name=(null) inode=13773 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 20:41:15.306000 audit: PATH item=39 name=(null) inode=13778 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 20:41:15.306000 audit: PROCTITLE proctitle="(udev-worker)" Oct 2 20:41:15.399314 kernel: mousedev: PS/2 mouse device common for all mice Oct 2 20:41:15.399359 kernel: IPMI message handler: version 39.2 Oct 2 20:41:15.407231 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Oct 2 20:41:15.437321 kernel: ipmi device interface Oct 2 20:41:15.468315 systemd[1]: Started systemd-userdbd.service. Oct 2 20:41:15.475000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:41:15.485316 kernel: ipmi_si: IPMI System Interface driver Oct 2 20:41:15.485347 kernel: mei_me 0000:00:16.0: Device doesn't have valid ME Interface Oct 2 20:41:15.485448 kernel: mei_me 0000:00:16.4: Device doesn't have valid ME Interface Oct 2 20:41:15.485526 kernel: i801_smbus 0000:00:1f.4: SPD Write Disable is set Oct 2 20:41:15.485597 kernel: i801_smbus 0000:00:1f.4: SMBus using PCI interrupt Oct 2 20:41:15.485662 kernel: i2c i2c-0: 2/4 memory slots populated (from DMI) Oct 2 20:41:15.524160 kernel: ipmi_si dmi-ipmi-si.0: ipmi_platform: probing via SMBIOS Oct 2 20:41:15.644368 kernel: ipmi_platform: ipmi_si: SMBIOS: io 0xca2 regsize 1 spacing 1 irq 0 Oct 2 20:41:15.644420 kernel: ipmi_si: Adding SMBIOS-specified kcs state machine Oct 2 20:41:15.682831 kernel: ipmi_si IPI0001:00: ipmi_platform: probing via ACPI Oct 2 20:41:15.683050 kernel: ipmi_si IPI0001:00: ipmi_platform: [io 0x0ca2] regsize 1 spacing 1 irq 0 Oct 2 20:41:15.730322 kernel: iTCO_vendor_support: vendor-support=0 Oct 2 20:41:15.730396 kernel: ipmi_si dmi-ipmi-si.0: Removing SMBIOS-specified kcs state machine in favor of ACPI Oct 2 20:41:15.747270 systemd-networkd[1309]: bond0: netdev ready Oct 2 20:41:15.749488 systemd-networkd[1309]: lo: Link UP Oct 2 20:41:15.749490 systemd-networkd[1309]: lo: Gained carrier Oct 2 20:41:15.749954 systemd-networkd[1309]: Enumeration completed Oct 2 20:41:15.750038 systemd[1]: Started systemd-networkd.service. Oct 2 20:41:15.750236 systemd-networkd[1309]: bond0: Configuring with /etc/systemd/network/05-bond0.network. Oct 2 20:41:15.752310 kernel: ipmi_si: Adding ACPI-specified kcs state machine Oct 2 20:41:15.752333 kernel: ipmi_si: Trying ACPI-specified kcs state machine at i/o address 0xca2, slave address 0x20, irq 0 Oct 2 20:41:15.761515 systemd-networkd[1309]: enp2s0f1np1: Configuring with /etc/systemd/network/10-0c:42:a1:65:fd:df.network. Oct 2 20:41:15.811000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:41:15.829311 kernel: ipmi_si IPI0001:00: The BMC does not support clearing the recv irq bit, compensating, but the BMC needs to be fixed. Oct 2 20:41:15.858336 kernel: iTCO_wdt iTCO_wdt: unable to reset NO_REBOOT flag, device disabled by hardware/BIOS Oct 2 20:41:15.858646 kernel: ipmi_si IPI0001:00: IPMI message handler: Found new BMC (man_id: 0x002a7c, prod_id: 0x1b11, dev_id: 0x20) Oct 2 20:41:15.920796 kernel: intel_rapl_common: Found RAPL domain package Oct 2 20:41:15.920839 kernel: intel_rapl_common: Found RAPL domain core Oct 2 20:41:15.920852 kernel: intel_rapl_common: Found RAPL domain dram Oct 2 20:41:16.049353 kernel: ipmi_si IPI0001:00: IPMI kcs interface initialized Oct 2 20:41:16.068312 kernel: ipmi_ssif: IPMI SSIF Interface driver Oct 2 20:41:16.070574 systemd[1]: Finished systemd-udev-settle.service. Oct 2 20:41:16.077000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:41:16.079067 systemd[1]: Starting lvm2-activation-early.service... Oct 2 20:41:16.096394 lvm[1375]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Oct 2 20:41:16.124655 systemd[1]: Finished lvm2-activation-early.service. Oct 2 20:41:16.131000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:41:16.132549 systemd[1]: Reached target cryptsetup.target. Oct 2 20:41:16.141068 systemd[1]: Starting lvm2-activation.service... Oct 2 20:41:16.143925 lvm[1376]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Oct 2 20:41:16.177767 systemd[1]: Finished lvm2-activation.service. Oct 2 20:41:16.185000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:41:16.186444 systemd[1]: Reached target local-fs-pre.target. Oct 2 20:41:16.194391 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Oct 2 20:41:16.194410 systemd[1]: Reached target local-fs.target. Oct 2 20:41:16.202399 systemd[1]: Reached target machines.target. Oct 2 20:41:16.210978 systemd[1]: Starting ldconfig.service... Oct 2 20:41:16.218043 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Oct 2 20:41:16.218073 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 2 20:41:16.218616 systemd[1]: Starting systemd-boot-update.service... Oct 2 20:41:16.225811 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Oct 2 20:41:16.235880 systemd[1]: Starting systemd-machine-id-commit.service... Oct 2 20:41:16.235987 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Oct 2 20:41:16.236029 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Oct 2 20:41:16.236606 systemd[1]: Starting systemd-tmpfiles-setup.service... Oct 2 20:41:16.236863 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1378 (bootctl) Oct 2 20:41:16.237485 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Oct 2 20:41:16.247023 systemd-tmpfiles[1382]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Oct 2 20:41:16.250649 systemd-tmpfiles[1382]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Oct 2 20:41:16.256570 systemd-tmpfiles[1382]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Oct 2 20:41:16.257725 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Oct 2 20:41:16.256000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:41:16.347382 kernel: mlx5_core 0000:02:00.1 enp2s0f1np1: Link up Oct 2 20:41:16.382374 kernel: bond0: (slave enp2s0f1np1): Enslaving as a backup interface with an up link Oct 2 20:41:16.382477 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Oct 2 20:41:16.404365 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready Oct 2 20:41:16.422274 systemd-networkd[1309]: enp2s0f0np0: Configuring with /etc/systemd/network/10-0c:42:a1:65:fd:de.network. Oct 2 20:41:16.546765 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Oct 2 20:41:16.585311 kernel: mlx5_core 0000:02:00.0 enp2s0f0np0: Link up Oct 2 20:41:16.609311 kernel: bond0: (slave enp2s0f0np0): Enslaving as a backup interface with an up link Oct 2 20:41:16.610115 systemd-networkd[1309]: bond0: Link UP Oct 2 20:41:16.610313 systemd-networkd[1309]: enp2s0f1np1: Link UP Oct 2 20:41:16.610477 systemd-networkd[1309]: enp2s0f1np1: Gained carrier Oct 2 20:41:16.611475 systemd-networkd[1309]: enp2s0f1np1: Reconfiguring with /etc/systemd/network/10-0c:42:a1:65:fd:de.network. Oct 2 20:41:16.647985 kernel: bond0: (slave enp2s0f1np1): link status definitely up, 10000 Mbps full duplex Oct 2 20:41:16.648020 kernel: bond0: active interface up! Oct 2 20:41:16.669318 kernel: bond0: (slave enp2s0f0np0): link status definitely up, 10000 Mbps full duplex Oct 2 20:41:16.717477 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Oct 2 20:41:16.717823 systemd[1]: Finished systemd-machine-id-commit.service. Oct 2 20:41:16.716000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:41:16.736472 systemd-fsck[1386]: fsck.fat 4.2 (2021-01-31) Oct 2 20:41:16.736472 systemd-fsck[1386]: /dev/sda1: 789 files, 115069/258078 clusters Oct 2 20:41:16.737273 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Oct 2 20:41:16.745000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:41:16.747113 systemd[1]: Mounting boot.mount... Oct 2 20:41:16.750765 systemd-networkd[1309]: bond0: Gained carrier Oct 2 20:41:16.750957 systemd-networkd[1309]: enp2s0f0np0: Link UP Oct 2 20:41:16.751109 systemd-networkd[1309]: enp2s0f0np0: Gained carrier Oct 2 20:41:16.758413 systemd[1]: Mounted boot.mount. Oct 2 20:41:16.764567 systemd-networkd[1309]: enp2s0f1np1: Link DOWN Oct 2 20:41:16.764569 systemd-networkd[1309]: enp2s0f1np1: Lost carrier Oct 2 20:41:16.797368 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms Oct 2 20:41:16.797725 systemd[1]: Finished systemd-boot-update.service. Oct 2 20:41:16.813000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:41:16.821312 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms Oct 2 20:41:16.824503 systemd[1]: Finished systemd-tmpfiles-setup.service. Oct 2 20:41:16.843343 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms Oct 2 20:41:16.859000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:41:16.861222 systemd[1]: Starting audit-rules.service... Oct 2 20:41:16.866312 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms Oct 2 20:41:16.883194 systemd[1]: Starting clean-ca-certificates.service... Oct 2 20:41:16.881000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Oct 2 20:41:16.881000 audit[1404]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd6b751340 a2=420 a3=0 items=0 ppid=1389 pid=1404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:41:16.881000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Oct 2 20:41:16.883371 augenrules[1404]: No rules Oct 2 20:41:16.890357 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms Oct 2 20:41:16.907961 systemd[1]: Starting systemd-journal-catalog-update.service... Oct 2 20:41:16.911351 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms Oct 2 20:41:16.933358 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms Oct 2 20:41:16.933388 kernel: mlx5_core 0000:02:00.1 enp2s0f1np1: Link up Oct 2 20:41:16.948337 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms Oct 2 20:41:16.951951 systemd-networkd[1309]: enp2s0f1np1: Link UP Oct 2 20:41:16.952142 systemd-networkd[1309]: enp2s0f1np1: Gained carrier Oct 2 20:41:16.967098 systemd[1]: Starting systemd-resolved.service... Oct 2 20:41:16.982740 kernel: bond0: (slave enp2s0f1np1): invalid new link 1 on slave Oct 2 20:41:16.984615 ldconfig[1377]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Oct 2 20:41:16.990336 systemd[1]: Starting systemd-timesyncd.service... Oct 2 20:41:16.997902 systemd[1]: Starting systemd-update-utmp.service... Oct 2 20:41:17.004655 systemd[1]: Finished ldconfig.service. Oct 2 20:41:17.011663 systemd[1]: Finished audit-rules.service. Oct 2 20:41:17.018505 systemd[1]: Finished clean-ca-certificates.service. Oct 2 20:41:17.026525 systemd[1]: Finished systemd-journal-catalog-update.service. Oct 2 20:41:17.038094 systemd[1]: Starting systemd-update-done.service... Oct 2 20:41:17.044388 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Oct 2 20:41:17.044620 systemd[1]: Finished systemd-update-utmp.service. Oct 2 20:41:17.052511 systemd[1]: Finished systemd-update-done.service. Oct 2 20:41:17.062450 systemd[1]: Started systemd-timesyncd.service. Oct 2 20:41:17.065016 systemd-resolved[1411]: Positive Trust Anchors: Oct 2 20:41:17.065022 systemd-resolved[1411]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Oct 2 20:41:17.065041 systemd-resolved[1411]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Oct 2 20:41:17.068916 systemd-resolved[1411]: Using system hostname 'ci-3510.3.0-a-0ae5c90d19'. Oct 2 20:41:17.070464 systemd[1]: Started systemd-resolved.service. Oct 2 20:41:17.078441 systemd[1]: Reached target network.target. Oct 2 20:41:17.086404 systemd[1]: Reached target nss-lookup.target. Oct 2 20:41:17.101352 systemd[1]: Reached target sysinit.target. Oct 2 20:41:17.106350 kernel: bond0: (slave enp2s0f1np1): link status up again after 100 ms Oct 2 20:41:17.122419 systemd[1]: Started motdgen.path. Oct 2 20:41:17.125309 kernel: bond0: (slave enp2s0f1np1): link status definitely up, 10000 Mbps full duplex Oct 2 20:41:17.132400 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Oct 2 20:41:17.142384 systemd[1]: Started systemd-tmpfiles-clean.timer. Oct 2 20:41:17.150385 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Oct 2 20:41:17.150401 systemd[1]: Reached target paths.target. Oct 2 20:41:17.157384 systemd[1]: Reached target time-set.target. Oct 2 20:41:17.165442 systemd[1]: Started logrotate.timer. Oct 2 20:41:17.172437 systemd[1]: Started mdadm.timer. Oct 2 20:41:17.179385 systemd[1]: Reached target timers.target. Oct 2 20:41:17.186510 systemd[1]: Listening on dbus.socket. Oct 2 20:41:17.193912 systemd[1]: Starting docker.socket... Oct 2 20:41:17.201784 systemd[1]: Listening on sshd.socket. Oct 2 20:41:17.208457 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 2 20:41:17.208667 systemd[1]: Listening on docker.socket. Oct 2 20:41:17.215432 systemd[1]: Reached target sockets.target. Oct 2 20:41:17.223412 systemd[1]: Reached target basic.target. Oct 2 20:41:17.230404 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Oct 2 20:41:17.230417 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Oct 2 20:41:17.230852 systemd[1]: Starting containerd.service... Oct 2 20:41:17.237815 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Oct 2 20:41:17.247003 systemd[1]: Starting coreos-metadata.service... Oct 2 20:41:17.253949 systemd[1]: Starting dbus.service... Oct 2 20:41:17.259980 systemd[1]: Starting enable-oem-cloudinit.service... Oct 2 20:41:17.265002 jq[1426]: false Oct 2 20:41:17.266930 systemd[1]: Starting extend-filesystems.service... Oct 2 20:41:17.267924 coreos-metadata[1419]: Oct 02 20:41:17.267 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Oct 2 20:41:17.273378 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Oct 2 20:41:17.273963 dbus-daemon[1425]: [system] SELinux support is enabled Oct 2 20:41:17.274113 systemd[1]: Starting motdgen.service... Oct 2 20:41:17.275480 extend-filesystems[1427]: Found sda Oct 2 20:41:17.275480 extend-filesystems[1427]: Found sda1 Oct 2 20:41:17.303203 extend-filesystems[1427]: Found sda2 Oct 2 20:41:17.303203 extend-filesystems[1427]: Found sda3 Oct 2 20:41:17.303203 extend-filesystems[1427]: Found usr Oct 2 20:41:17.303203 extend-filesystems[1427]: Found sda4 Oct 2 20:41:17.303203 extend-filesystems[1427]: Found sda6 Oct 2 20:41:17.303203 extend-filesystems[1427]: Found sda7 Oct 2 20:41:17.303203 extend-filesystems[1427]: Found sda9 Oct 2 20:41:17.303203 extend-filesystems[1427]: Checking size of /dev/sda9 Oct 2 20:41:17.303203 extend-filesystems[1427]: Resized partition /dev/sda9 Oct 2 20:41:17.407351 kernel: EXT4-fs (sda9): resizing filesystem from 553472 to 116605649 blocks Oct 2 20:41:17.407394 coreos-metadata[1422]: Oct 02 20:41:17.277 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Oct 2 20:41:17.281073 systemd[1]: Starting prepare-cni-plugins.service... Oct 2 20:41:17.407549 extend-filesystems[1444]: resize2fs 1.46.5 (30-Dec-2021) Oct 2 20:41:17.316133 systemd[1]: Starting prepare-critools.service... Oct 2 20:41:17.336053 systemd[1]: Starting ssh-key-proc-cmdline.service... Oct 2 20:41:17.355011 systemd[1]: Starting sshd-keygen.service... Oct 2 20:41:17.369730 systemd[1]: Starting systemd-logind.service... Oct 2 20:41:17.386347 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 2 20:41:17.386845 systemd[1]: Starting tcsd.service... Oct 2 20:41:17.392894 systemd-logind[1455]: Watching system buttons on /dev/input/event3 (Power Button) Oct 2 20:41:17.422922 jq[1458]: true Oct 2 20:41:17.392904 systemd-logind[1455]: Watching system buttons on /dev/input/event2 (Sleep Button) Oct 2 20:41:17.392913 systemd-logind[1455]: Watching system buttons on /dev/input/event0 (HID 0557:2419) Oct 2 20:41:17.393047 systemd-logind[1455]: New seat seat0. Oct 2 20:41:17.399622 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Oct 2 20:41:17.399977 systemd[1]: Starting update-engine.service... Oct 2 20:41:17.414996 systemd[1]: Starting update-ssh-keys-after-ignition.service... Oct 2 20:41:17.430681 systemd[1]: Started dbus.service. Oct 2 20:41:17.439076 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Oct 2 20:41:17.439172 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Oct 2 20:41:17.439343 systemd[1]: motdgen.service: Deactivated successfully. Oct 2 20:41:17.439424 systemd[1]: Finished motdgen.service. Oct 2 20:41:17.447225 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Oct 2 20:41:17.447340 systemd[1]: Finished ssh-key-proc-cmdline.service. Oct 2 20:41:17.450810 update_engine[1457]: I1002 20:41:17.450405 1457 main.cc:92] Flatcar Update Engine starting Oct 2 20:41:17.452422 tar[1460]: ./ Oct 2 20:41:17.452422 tar[1460]: ./loopback Oct 2 20:41:17.454095 update_engine[1457]: I1002 20:41:17.454056 1457 update_check_scheduler.cc:74] Next update check in 3m4s Oct 2 20:41:17.458072 jq[1464]: true Oct 2 20:41:17.458414 dbus-daemon[1425]: [system] Successfully activated service 'org.freedesktop.systemd1' Oct 2 20:41:17.459473 tar[1461]: crictl Oct 2 20:41:17.463506 systemd[1]: tcsd.service: Skipped due to 'exec-condition'. Oct 2 20:41:17.463623 systemd[1]: Condition check resulted in tcsd.service being skipped. Oct 2 20:41:17.463709 systemd[1]: Started update-engine.service. Oct 2 20:41:17.469485 env[1465]: time="2023-10-02T20:41:17.469459796Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Oct 2 20:41:17.472176 tar[1460]: ./bandwidth Oct 2 20:41:17.477441 systemd[1]: Started systemd-logind.service. Oct 2 20:41:17.478862 env[1465]: time="2023-10-02T20:41:17.478805887Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Oct 2 20:41:17.479290 env[1465]: time="2023-10-02T20:41:17.479278665Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Oct 2 20:41:17.479922 env[1465]: time="2023-10-02T20:41:17.479906024Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.132-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Oct 2 20:41:17.479922 env[1465]: time="2023-10-02T20:41:17.479921148Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Oct 2 20:41:17.481804 env[1465]: time="2023-10-02T20:41:17.481789877Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Oct 2 20:41:17.481804 env[1465]: time="2023-10-02T20:41:17.481802293Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Oct 2 20:41:17.481881 env[1465]: time="2023-10-02T20:41:17.481810895Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Oct 2 20:41:17.481881 env[1465]: time="2023-10-02T20:41:17.481816361Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Oct 2 20:41:17.481881 env[1465]: time="2023-10-02T20:41:17.481856853Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Oct 2 20:41:17.482001 env[1465]: time="2023-10-02T20:41:17.481991956Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Oct 2 20:41:17.482064 env[1465]: time="2023-10-02T20:41:17.482054087Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Oct 2 20:41:17.482095 env[1465]: time="2023-10-02T20:41:17.482063622Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Oct 2 20:41:17.483869 env[1465]: time="2023-10-02T20:41:17.483855394Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Oct 2 20:41:17.483869 env[1465]: time="2023-10-02T20:41:17.483866992Z" level=info msg="metadata content store policy set" policy=shared Oct 2 20:41:17.488355 systemd[1]: Started locksmithd.service. Oct 2 20:41:17.488554 bash[1488]: Updated "/home/core/.ssh/authorized_keys" Oct 2 20:41:17.493325 env[1465]: time="2023-10-02T20:41:17.493301334Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Oct 2 20:41:17.493362 env[1465]: time="2023-10-02T20:41:17.493329939Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Oct 2 20:41:17.493362 env[1465]: time="2023-10-02T20:41:17.493338528Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Oct 2 20:41:17.493362 env[1465]: time="2023-10-02T20:41:17.493355626Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Oct 2 20:41:17.493426 env[1465]: time="2023-10-02T20:41:17.493364252Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Oct 2 20:41:17.493426 env[1465]: time="2023-10-02T20:41:17.493372019Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Oct 2 20:41:17.493426 env[1465]: time="2023-10-02T20:41:17.493378764Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Oct 2 20:41:17.493426 env[1465]: time="2023-10-02T20:41:17.493385717Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Oct 2 20:41:17.493426 env[1465]: time="2023-10-02T20:41:17.493395153Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Oct 2 20:41:17.493426 env[1465]: time="2023-10-02T20:41:17.493406624Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Oct 2 20:41:17.493426 env[1465]: time="2023-10-02T20:41:17.493413774Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Oct 2 20:41:17.493426 env[1465]: time="2023-10-02T20:41:17.493422213Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Oct 2 20:41:17.493559 env[1465]: time="2023-10-02T20:41:17.493478730Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Oct 2 20:41:17.493559 env[1465]: time="2023-10-02T20:41:17.493525161Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Oct 2 20:41:17.493700 env[1465]: time="2023-10-02T20:41:17.493686808Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Oct 2 20:41:17.493725 env[1465]: time="2023-10-02T20:41:17.493710318Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Oct 2 20:41:17.493725 env[1465]: time="2023-10-02T20:41:17.493719381Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Oct 2 20:41:17.493763 env[1465]: time="2023-10-02T20:41:17.493744284Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Oct 2 20:41:17.493763 env[1465]: time="2023-10-02T20:41:17.493752196Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Oct 2 20:41:17.493796 env[1465]: time="2023-10-02T20:41:17.493761907Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Oct 2 20:41:17.493796 env[1465]: time="2023-10-02T20:41:17.493768944Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Oct 2 20:41:17.493796 env[1465]: time="2023-10-02T20:41:17.493775599Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Oct 2 20:41:17.493796 env[1465]: time="2023-10-02T20:41:17.493781576Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Oct 2 20:41:17.493796 env[1465]: time="2023-10-02T20:41:17.493787733Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Oct 2 20:41:17.493796 env[1465]: time="2023-10-02T20:41:17.493793626Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Oct 2 20:41:17.493939 env[1465]: time="2023-10-02T20:41:17.493882610Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Oct 2 20:41:17.494061 env[1465]: time="2023-10-02T20:41:17.494041416Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Oct 2 20:41:17.494132 env[1465]: time="2023-10-02T20:41:17.494117748Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Oct 2 20:41:17.494169 env[1465]: time="2023-10-02T20:41:17.494133530Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Oct 2 20:41:17.494190 env[1465]: time="2023-10-02T20:41:17.494149336Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Oct 2 20:41:17.494267 env[1465]: time="2023-10-02T20:41:17.494197578Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Oct 2 20:41:17.494295 env[1465]: time="2023-10-02T20:41:17.494269932Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Oct 2 20:41:17.494295 env[1465]: time="2023-10-02T20:41:17.494289414Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Oct 2 20:41:17.494336 env[1465]: time="2023-10-02T20:41:17.494321432Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Oct 2 20:41:17.494538 env[1465]: time="2023-10-02T20:41:17.494494743Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Oct 2 20:41:17.497098 env[1465]: time="2023-10-02T20:41:17.494547948Z" level=info msg="Connect containerd service" Oct 2 20:41:17.497098 env[1465]: time="2023-10-02T20:41:17.494571593Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Oct 2 20:41:17.497098 env[1465]: time="2023-10-02T20:41:17.494956917Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Oct 2 20:41:17.497098 env[1465]: time="2023-10-02T20:41:17.495081229Z" level=info msg="Start subscribing containerd event" Oct 2 20:41:17.497098 env[1465]: time="2023-10-02T20:41:17.495101543Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Oct 2 20:41:17.497098 env[1465]: time="2023-10-02T20:41:17.495110781Z" level=info msg="Start recovering state" Oct 2 20:41:17.497098 env[1465]: time="2023-10-02T20:41:17.495129383Z" level=info msg=serving... address=/run/containerd/containerd.sock Oct 2 20:41:17.497098 env[1465]: time="2023-10-02T20:41:17.495146869Z" level=info msg="Start event monitor" Oct 2 20:41:17.497098 env[1465]: time="2023-10-02T20:41:17.495158222Z" level=info msg="containerd successfully booted in 0.026098s" Oct 2 20:41:17.497098 env[1465]: time="2023-10-02T20:41:17.495166837Z" level=info msg="Start snapshots syncer" Oct 2 20:41:17.497098 env[1465]: time="2023-10-02T20:41:17.495173990Z" level=info msg="Start cni network conf syncer for default" Oct 2 20:41:17.497098 env[1465]: time="2023-10-02T20:41:17.495178004Z" level=info msg="Start streaming server" Oct 2 20:41:17.495467 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Oct 2 20:41:17.495611 systemd[1]: Reached target system-config.target. Oct 2 20:41:17.503435 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Oct 2 20:41:17.503561 systemd[1]: Reached target user-config.target. Oct 2 20:41:17.504253 tar[1460]: ./ptp Oct 2 20:41:17.514227 systemd[1]: Started containerd.service. Oct 2 20:41:17.521688 systemd[1]: Finished update-ssh-keys-after-ignition.service. Oct 2 20:41:17.529007 tar[1460]: ./vlan Oct 2 20:41:17.552755 tar[1460]: ./host-device Oct 2 20:41:17.564584 locksmithd[1499]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Oct 2 20:41:17.575090 tar[1460]: ./tuning Oct 2 20:41:17.594297 tar[1460]: ./vrf Oct 2 20:41:17.613955 tar[1460]: ./sbr Oct 2 20:41:17.633200 tar[1460]: ./tap Oct 2 20:41:17.655201 tar[1460]: ./dhcp Oct 2 20:41:17.711282 tar[1460]: ./static Oct 2 20:41:17.727113 tar[1460]: ./firewall Oct 2 20:41:17.731546 systemd[1]: Finished prepare-critools.service. Oct 2 20:41:17.751464 tar[1460]: ./macvlan Oct 2 20:41:17.773431 tar[1460]: ./dummy Oct 2 20:41:17.795116 tar[1460]: ./bridge Oct 2 20:41:17.800310 kernel: EXT4-fs (sda9): resized filesystem to 116605649 Oct 2 20:41:17.829089 extend-filesystems[1444]: Filesystem at /dev/sda9 is mounted on /; on-line resizing required Oct 2 20:41:17.829089 extend-filesystems[1444]: old_desc_blocks = 1, new_desc_blocks = 56 Oct 2 20:41:17.829089 extend-filesystems[1444]: The filesystem on /dev/sda9 is now 116605649 (4k) blocks long. Oct 2 20:41:17.867347 extend-filesystems[1427]: Resized filesystem in /dev/sda9 Oct 2 20:41:17.867347 extend-filesystems[1427]: Found sdb Oct 2 20:41:17.882348 tar[1460]: ./ipvlan Oct 2 20:41:17.882348 tar[1460]: ./portmap Oct 2 20:41:17.829572 systemd[1]: extend-filesystems.service: Deactivated successfully. Oct 2 20:41:17.829661 systemd[1]: Finished extend-filesystems.service. Oct 2 20:41:17.889670 tar[1460]: ./host-local Oct 2 20:41:17.913614 systemd[1]: Finished prepare-cni-plugins.service. Oct 2 20:41:18.057515 sshd_keygen[1454]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Oct 2 20:41:18.068879 systemd[1]: Finished sshd-keygen.service. Oct 2 20:41:18.076274 systemd[1]: Starting issuegen.service... Oct 2 20:41:18.083606 systemd[1]: issuegen.service: Deactivated successfully. Oct 2 20:41:18.083676 systemd[1]: Finished issuegen.service. Oct 2 20:41:18.091151 systemd[1]: Starting systemd-user-sessions.service... Oct 2 20:41:18.099626 systemd[1]: Finished systemd-user-sessions.service. Oct 2 20:41:18.108046 systemd[1]: Started getty@tty1.service. Oct 2 20:41:18.115055 systemd[1]: Started serial-getty@ttyS1.service. Oct 2 20:41:18.123490 systemd[1]: Reached target getty.target. Oct 2 20:41:18.295356 systemd-networkd[1309]: bond0: Gained IPv6LL Oct 2 20:41:19.375316 kernel: mlx5_core 0000:02:00.0: lag map port 1:1 port 2:2 shared_fdb:0 Oct 2 20:41:23.137607 login[1528]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Oct 2 20:41:23.144236 login[1527]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Oct 2 20:41:23.145723 systemd-logind[1455]: New session 1 of user core. Oct 2 20:41:23.146349 systemd[1]: Created slice user-500.slice. Oct 2 20:41:23.147273 systemd[1]: Starting user-runtime-dir@500.service... Oct 2 20:41:23.149066 systemd-logind[1455]: New session 2 of user core. Oct 2 20:41:23.152657 systemd[1]: Finished user-runtime-dir@500.service. Oct 2 20:41:23.153357 systemd[1]: Starting user@500.service... Oct 2 20:41:23.155379 (systemd)[1532]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Oct 2 20:41:23.223722 coreos-metadata[1419]: Oct 02 20:41:23.223 INFO Failed to fetch: error sending request for url (https://metadata.packet.net/metadata): error trying to connect: dns error: failed to lookup address information: Name or service not known Oct 2 20:41:23.223865 coreos-metadata[1422]: Oct 02 20:41:23.223 INFO Failed to fetch: error sending request for url (https://metadata.packet.net/metadata): error trying to connect: dns error: failed to lookup address information: Name or service not known Oct 2 20:41:23.228345 systemd[1532]: Queued start job for default target default.target. Oct 2 20:41:23.228574 systemd[1532]: Reached target paths.target. Oct 2 20:41:23.228585 systemd[1532]: Reached target sockets.target. Oct 2 20:41:23.228593 systemd[1532]: Reached target timers.target. Oct 2 20:41:23.228600 systemd[1532]: Reached target basic.target. Oct 2 20:41:23.228623 systemd[1532]: Reached target default.target. Oct 2 20:41:23.228643 systemd[1532]: Startup finished in 70ms. Oct 2 20:41:23.228660 systemd[1]: Started user@500.service. Oct 2 20:41:23.229211 systemd[1]: Started session-1.scope. Oct 2 20:41:23.229599 systemd[1]: Started session-2.scope. Oct 2 20:41:24.224026 coreos-metadata[1422]: Oct 02 20:41:24.223 INFO Fetching https://metadata.packet.net/metadata: Attempt #2 Oct 2 20:41:24.224808 coreos-metadata[1419]: Oct 02 20:41:24.223 INFO Fetching https://metadata.packet.net/metadata: Attempt #2 Oct 2 20:41:24.726330 kernel: mlx5_core 0000:02:00.0: modify lag map port 1:2 port 2:2 Oct 2 20:41:24.726545 kernel: mlx5_core 0000:02:00.0: modify lag map port 1:1 port 2:2 Oct 2 20:41:25.280480 systemd[1]: Created slice system-sshd.slice. Oct 2 20:41:25.281141 systemd[1]: Started sshd@0-139.178.89.131:22-139.178.89.65:52786.service. Oct 2 20:41:25.294905 coreos-metadata[1422]: Oct 02 20:41:25.294 INFO Fetch successful Oct 2 20:41:25.295593 coreos-metadata[1419]: Oct 02 20:41:25.295 INFO Fetch successful Oct 2 20:41:25.321339 unknown[1419]: wrote ssh authorized keys file for user: core Oct 2 20:41:25.321568 systemd[1]: Finished coreos-metadata.service. Oct 2 20:41:25.322293 systemd[1]: Started packet-phone-home.service. Oct 2 20:41:25.330630 curl[1557]: % Total % Received % Xferd Average Speed Time Time Time Current Oct 2 20:41:25.330783 curl[1557]: Dload Upload Total Spent Left Speed Oct 2 20:41:25.334264 update-ssh-keys[1558]: Updated "/home/core/.ssh/authorized_keys" Oct 2 20:41:25.334533 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Oct 2 20:41:25.334708 systemd[1]: Reached target multi-user.target. Oct 2 20:41:25.335304 systemd[1]: Starting systemd-update-utmp-runlevel.service... Oct 2 20:41:25.339041 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Oct 2 20:41:25.339110 systemd[1]: Finished systemd-update-utmp-runlevel.service. Oct 2 20:41:25.339200 systemd[1]: Startup finished in 1.937s (kernel) + 19.797s (initrd) + 14.711s (userspace) = 36.446s. Oct 2 20:41:25.345610 sshd[1553]: Accepted publickey for core from 139.178.89.65 port 52786 ssh2: RSA SHA256:M4fPbwtaE29dxMxiSyaa1yIvxglYsCEa+0scmSZWaB4 Oct 2 20:41:25.349154 sshd[1553]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 20:41:25.359957 systemd-logind[1455]: New session 3 of user core. Oct 2 20:41:25.362244 systemd[1]: Started session-3.scope. Oct 2 20:41:25.448135 systemd[1]: Started sshd@1-139.178.89.131:22-139.178.89.65:52796.service. Oct 2 20:41:25.480402 curl[1557]: \u000d 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0\u000d 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 Oct 2 20:41:25.480907 systemd[1]: packet-phone-home.service: Deactivated successfully. Oct 2 20:41:25.481512 sshd[1563]: Accepted publickey for core from 139.178.89.65 port 52796 ssh2: RSA SHA256:M4fPbwtaE29dxMxiSyaa1yIvxglYsCEa+0scmSZWaB4 Oct 2 20:41:25.482229 sshd[1563]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 20:41:25.484646 systemd-logind[1455]: New session 4 of user core. Oct 2 20:41:25.485009 systemd[1]: Started session-4.scope. Oct 2 20:41:25.548752 sshd[1563]: pam_unix(sshd:session): session closed for user core Oct 2 20:41:25.555709 systemd[1]: sshd@1-139.178.89.131:22-139.178.89.65:52796.service: Deactivated successfully. Oct 2 20:41:25.557368 systemd[1]: session-4.scope: Deactivated successfully. Oct 2 20:41:25.559096 systemd-logind[1455]: Session 4 logged out. Waiting for processes to exit. Oct 2 20:41:25.561682 systemd[1]: Started sshd@2-139.178.89.131:22-139.178.89.65:43404.service. Oct 2 20:41:25.564097 systemd-logind[1455]: Removed session 4. Oct 2 20:41:25.598976 systemd-timesyncd[1412]: Contacted time server 73.239.145.47:123 (0.flatcar.pool.ntp.org). Oct 2 20:41:25.599100 systemd-timesyncd[1412]: Initial clock synchronization to Mon 2023-10-02 20:41:25.780528 UTC. Oct 2 20:41:25.665084 sshd[1569]: Accepted publickey for core from 139.178.89.65 port 43404 ssh2: RSA SHA256:M4fPbwtaE29dxMxiSyaa1yIvxglYsCEa+0scmSZWaB4 Oct 2 20:41:25.667435 sshd[1569]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 20:41:25.674545 systemd-logind[1455]: New session 5 of user core. Oct 2 20:41:25.676124 systemd[1]: Started session-5.scope. Oct 2 20:41:25.738497 sshd[1569]: pam_unix(sshd:session): session closed for user core Oct 2 20:41:25.745119 systemd[1]: sshd@2-139.178.89.131:22-139.178.89.65:43404.service: Deactivated successfully. Oct 2 20:41:25.746722 systemd[1]: session-5.scope: Deactivated successfully. Oct 2 20:41:25.748467 systemd-logind[1455]: Session 5 logged out. Waiting for processes to exit. Oct 2 20:41:25.751197 systemd[1]: Started sshd@3-139.178.89.131:22-139.178.89.65:43418.service. Oct 2 20:41:25.753550 systemd-logind[1455]: Removed session 5. Oct 2 20:41:25.855919 sshd[1576]: Accepted publickey for core from 139.178.89.65 port 43418 ssh2: RSA SHA256:M4fPbwtaE29dxMxiSyaa1yIvxglYsCEa+0scmSZWaB4 Oct 2 20:41:25.858164 sshd[1576]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 20:41:25.865357 systemd-logind[1455]: New session 6 of user core. Oct 2 20:41:25.866959 systemd[1]: Started session-6.scope. Oct 2 20:41:25.931167 sshd[1576]: pam_unix(sshd:session): session closed for user core Oct 2 20:41:25.932685 systemd[1]: sshd@3-139.178.89.131:22-139.178.89.65:43418.service: Deactivated successfully. Oct 2 20:41:25.932994 systemd[1]: session-6.scope: Deactivated successfully. Oct 2 20:41:25.933269 systemd-logind[1455]: Session 6 logged out. Waiting for processes to exit. Oct 2 20:41:25.933776 systemd[1]: Started sshd@4-139.178.89.131:22-139.178.89.65:43422.service. Oct 2 20:41:25.934199 systemd-logind[1455]: Removed session 6. Oct 2 20:41:25.968249 sshd[1582]: Accepted publickey for core from 139.178.89.65 port 43422 ssh2: RSA SHA256:M4fPbwtaE29dxMxiSyaa1yIvxglYsCEa+0scmSZWaB4 Oct 2 20:41:25.969119 sshd[1582]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 20:41:25.972010 systemd-logind[1455]: New session 7 of user core. Oct 2 20:41:25.972575 systemd[1]: Started session-7.scope. Oct 2 20:41:26.068876 sudo[1585]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Oct 2 20:41:26.069524 sudo[1585]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 2 20:41:26.085771 dbus-daemon[1425]: \xd0-\xdd\u0001\x9cU: received setenforce notice (enforcing=-1737270192) Oct 2 20:41:26.090310 sudo[1585]: pam_unix(sudo:session): session closed for user root Oct 2 20:41:26.092286 sshd[1582]: pam_unix(sshd:session): session closed for user core Oct 2 20:41:26.093833 systemd[1]: sshd@4-139.178.89.131:22-139.178.89.65:43422.service: Deactivated successfully. Oct 2 20:41:26.094144 systemd[1]: session-7.scope: Deactivated successfully. Oct 2 20:41:26.094555 systemd-logind[1455]: Session 7 logged out. Waiting for processes to exit. Oct 2 20:41:26.095043 systemd[1]: Started sshd@5-139.178.89.131:22-139.178.89.65:43434.service. Oct 2 20:41:26.095497 systemd-logind[1455]: Removed session 7. Oct 2 20:41:26.130353 sshd[1589]: Accepted publickey for core from 139.178.89.65 port 43434 ssh2: RSA SHA256:M4fPbwtaE29dxMxiSyaa1yIvxglYsCEa+0scmSZWaB4 Oct 2 20:41:26.131192 sshd[1589]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 20:41:26.134416 systemd-logind[1455]: New session 8 of user core. Oct 2 20:41:26.135072 systemd[1]: Started session-8.scope. Oct 2 20:41:26.199321 sudo[1593]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Oct 2 20:41:26.199952 sudo[1593]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 2 20:41:26.207554 sudo[1593]: pam_unix(sudo:session): session closed for user root Oct 2 20:41:26.220075 sudo[1592]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Oct 2 20:41:26.220686 sudo[1592]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 2 20:41:26.234055 systemd[1]: Stopping audit-rules.service... Oct 2 20:41:26.233000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Oct 2 20:41:26.234989 auditctl[1596]: No rules Oct 2 20:41:26.235126 systemd[1]: audit-rules.service: Deactivated successfully. Oct 2 20:41:26.235205 systemd[1]: Stopped audit-rules.service. Oct 2 20:41:26.235967 systemd[1]: Starting audit-rules.service... Oct 2 20:41:26.240397 kernel: kauditd_printk_skb: 94 callbacks suppressed Oct 2 20:41:26.240432 kernel: audit: type=1305 audit(1696279286.233:158): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Oct 2 20:41:26.245882 augenrules[1613]: No rules Oct 2 20:41:26.246156 systemd[1]: Finished audit-rules.service. Oct 2 20:41:26.246602 sudo[1592]: pam_unix(sudo:session): session closed for user root Oct 2 20:41:26.247415 sshd[1589]: pam_unix(sshd:session): session closed for user core Oct 2 20:41:26.249229 systemd[1]: sshd@5-139.178.89.131:22-139.178.89.65:43434.service: Deactivated successfully. Oct 2 20:41:26.249564 systemd[1]: session-8.scope: Deactivated successfully. Oct 2 20:41:26.249927 systemd-logind[1455]: Session 8 logged out. Waiting for processes to exit. Oct 2 20:41:26.250488 systemd[1]: Started sshd@6-139.178.89.131:22-139.178.89.65:43438.service. Oct 2 20:41:26.250952 systemd-logind[1455]: Removed session 8. Oct 2 20:41:26.233000 audit[1596]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd4e907fb0 a2=420 a3=0 items=0 ppid=1 pid=1596 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:41:26.288012 kernel: audit: type=1300 audit(1696279286.233:158): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd4e907fb0 a2=420 a3=0 items=0 ppid=1 pid=1596 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:41:26.288084 kernel: audit: type=1327 audit(1696279286.233:158): proctitle=2F7362696E2F617564697463746C002D44 Oct 2 20:41:26.233000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Oct 2 20:41:26.297827 kernel: audit: type=1131 audit(1696279286.233:159): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:41:26.233000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:41:26.320764 kernel: audit: type=1130 audit(1696279286.245:160): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:41:26.245000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:41:26.343740 kernel: audit: type=1106 audit(1696279286.246:161): pid=1592 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 20:41:26.246000 audit[1592]: USER_END pid=1592 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 20:41:26.349330 sshd[1619]: Accepted publickey for core from 139.178.89.65 port 43438 ssh2: RSA SHA256:M4fPbwtaE29dxMxiSyaa1yIvxglYsCEa+0scmSZWaB4 Oct 2 20:41:26.351655 sshd[1619]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 20:41:26.354232 systemd-logind[1455]: New session 9 of user core. Oct 2 20:41:26.354730 systemd[1]: Started session-9.scope. Oct 2 20:41:26.370336 kernel: audit: type=1104 audit(1696279286.246:162): pid=1592 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 20:41:26.246000 audit[1592]: CRED_DISP pid=1592 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 20:41:26.394398 kernel: audit: type=1106 audit(1696279286.247:163): pid=1589 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 20:41:26.247000 audit[1589]: USER_END pid=1589 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 20:41:26.402529 sudo[1622]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Oct 2 20:41:26.402638 sudo[1622]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 2 20:41:26.427195 kernel: audit: type=1104 audit(1696279286.247:164): pid=1589 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 20:41:26.247000 audit[1589]: CRED_DISP pid=1589 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 20:41:26.453526 kernel: audit: type=1131 audit(1696279286.249:165): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-139.178.89.131:22-139.178.89.65:43434 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:41:26.249000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-139.178.89.131:22-139.178.89.65:43434 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:41:26.250000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-139.178.89.131:22-139.178.89.65:43438 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:41:26.347000 audit[1619]: USER_ACCT pid=1619 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 20:41:26.350000 audit[1619]: CRED_ACQ pid=1619 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 20:41:26.350000 audit[1619]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe77605a20 a2=3 a3=0 items=0 ppid=1 pid=1619 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:41:26.350000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 20:41:26.355000 audit[1619]: USER_START pid=1619 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 20:41:26.356000 audit[1621]: CRED_ACQ pid=1621 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 20:41:26.401000 audit[1622]: USER_ACCT pid=1622 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 20:41:26.401000 audit[1622]: CRED_REFR pid=1622 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 20:41:26.402000 audit[1622]: USER_START pid=1622 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 20:41:26.941826 systemd[1]: Starting systemd-networkd-wait-online.service... Oct 2 20:41:26.945947 systemd[1]: Finished systemd-networkd-wait-online.service. Oct 2 20:41:26.944000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:41:26.946114 systemd[1]: Reached target network-online.target. Oct 2 20:41:26.946719 systemd[1]: Starting docker.service... Oct 2 20:41:26.968069 env[1642]: time="2023-10-02T20:41:26.968043244Z" level=info msg="Starting up" Oct 2 20:41:26.968689 env[1642]: time="2023-10-02T20:41:26.968679277Z" level=info msg="parsed scheme: \"unix\"" module=grpc Oct 2 20:41:26.968689 env[1642]: time="2023-10-02T20:41:26.968687744Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Oct 2 20:41:26.968741 env[1642]: time="2023-10-02T20:41:26.968697795Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Oct 2 20:41:26.968741 env[1642]: time="2023-10-02T20:41:26.968703557Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Oct 2 20:41:26.969449 env[1642]: time="2023-10-02T20:41:26.969416088Z" level=info msg="parsed scheme: \"unix\"" module=grpc Oct 2 20:41:26.969449 env[1642]: time="2023-10-02T20:41:26.969423321Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Oct 2 20:41:26.969449 env[1642]: time="2023-10-02T20:41:26.969432797Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Oct 2 20:41:26.969449 env[1642]: time="2023-10-02T20:41:26.969437635Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Oct 2 20:41:27.103508 env[1642]: time="2023-10-02T20:41:27.103442135Z" level=info msg="Loading containers: start." Oct 2 20:41:27.134000 audit[1687]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1687 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:41:27.134000 audit[1687]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7fff17a76c60 a2=0 a3=7fff17a76c4c items=0 ppid=1642 pid=1687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:41:27.134000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Oct 2 20:41:27.135000 audit[1689]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1689 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:41:27.135000 audit[1689]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffec045e720 a2=0 a3=7ffec045e70c items=0 ppid=1642 pid=1689 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:41:27.135000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Oct 2 20:41:27.136000 audit[1691]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1691 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:41:27.136000 audit[1691]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffd0bb11cf0 a2=0 a3=7ffd0bb11cdc items=0 ppid=1642 pid=1691 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:41:27.136000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Oct 2 20:41:27.137000 audit[1693]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1693 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:41:27.137000 audit[1693]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffd4c4b08d0 a2=0 a3=7ffd4c4b08bc items=0 ppid=1642 pid=1693 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:41:27.137000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Oct 2 20:41:27.145000 audit[1695]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1695 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:41:27.145000 audit[1695]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffdf67229d0 a2=0 a3=7ffdf67229bc items=0 ppid=1642 pid=1695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:41:27.145000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Oct 2 20:41:27.194000 audit[1700]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1700 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:41:27.194000 audit[1700]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffcf1682700 a2=0 a3=7ffcf16826ec items=0 ppid=1642 pid=1700 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:41:27.194000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Oct 2 20:41:27.198000 audit[1702]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1702 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:41:27.198000 audit[1702]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffc83dc97a0 a2=0 a3=7ffc83dc978c items=0 ppid=1642 pid=1702 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:41:27.198000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Oct 2 20:41:27.198000 audit[1704]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1704 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:41:27.198000 audit[1704]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7ffd7c505410 a2=0 a3=7ffd7c5053fc items=0 ppid=1642 pid=1704 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:41:27.198000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Oct 2 20:41:27.200000 audit[1706]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1706 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:41:27.200000 audit[1706]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7fff9b2e92a0 a2=0 a3=7fff9b2e928c items=0 ppid=1642 pid=1706 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:41:27.200000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Oct 2 20:41:27.203000 audit[1710]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1710 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:41:27.203000 audit[1710]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7fff3f18e140 a2=0 a3=7fff3f18e12c items=0 ppid=1642 pid=1710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:41:27.203000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Oct 2 20:41:27.204000 audit[1711]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1711 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:41:27.204000 audit[1711]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffd3e020cd0 a2=0 a3=7ffd3e020cbc items=0 ppid=1642 pid=1711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:41:27.204000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Oct 2 20:41:27.216378 kernel: Initializing XFRM netlink socket Oct 2 20:41:27.244198 env[1642]: time="2023-10-02T20:41:27.244178914Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Oct 2 20:41:27.255000 audit[1719]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1719 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:41:27.255000 audit[1719]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7fffbc7ddc80 a2=0 a3=7fffbc7ddc6c items=0 ppid=1642 pid=1719 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:41:27.255000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Oct 2 20:41:27.277000 audit[1722]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1722 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:41:27.277000 audit[1722]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7fffb07ba750 a2=0 a3=7fffb07ba73c items=0 ppid=1642 pid=1722 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:41:27.277000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Oct 2 20:41:27.278000 audit[1725]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1725 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:41:27.278000 audit[1725]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffc22882730 a2=0 a3=7ffc2288271c items=0 ppid=1642 pid=1725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:41:27.278000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Oct 2 20:41:27.280000 audit[1727]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1727 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:41:27.280000 audit[1727]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7fffe3a9e7f0 a2=0 a3=7fffe3a9e7dc items=0 ppid=1642 pid=1727 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:41:27.280000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Oct 2 20:41:27.281000 audit[1729]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1729 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:41:27.281000 audit[1729]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7ffdbfa7b070 a2=0 a3=7ffdbfa7b05c items=0 ppid=1642 pid=1729 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:41:27.281000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Oct 2 20:41:27.282000 audit[1731]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1731 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:41:27.282000 audit[1731]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7ffd910d3920 a2=0 a3=7ffd910d390c items=0 ppid=1642 pid=1731 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:41:27.282000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Oct 2 20:41:27.283000 audit[1733]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1733 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:41:27.283000 audit[1733]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffe003e3050 a2=0 a3=7ffe003e303c items=0 ppid=1642 pid=1733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:41:27.283000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Oct 2 20:41:27.290000 audit[1736]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1736 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:41:27.290000 audit[1736]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7ffe78289980 a2=0 a3=7ffe7828996c items=0 ppid=1642 pid=1736 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:41:27.290000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Oct 2 20:41:27.292000 audit[1738]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1738 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:41:27.292000 audit[1738]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7ffe212fe0f0 a2=0 a3=7ffe212fe0dc items=0 ppid=1642 pid=1738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:41:27.292000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Oct 2 20:41:27.294000 audit[1740]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1740 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:41:27.294000 audit[1740]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffe6d4f29e0 a2=0 a3=7ffe6d4f29cc items=0 ppid=1642 pid=1740 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:41:27.294000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Oct 2 20:41:27.295000 audit[1742]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1742 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:41:27.295000 audit[1742]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffcccf59970 a2=0 a3=7ffcccf5995c items=0 ppid=1642 pid=1742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:41:27.295000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Oct 2 20:41:27.297319 systemd-networkd[1309]: docker0: Link UP Oct 2 20:41:27.301000 audit[1746]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1746 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:41:27.301000 audit[1746]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff59f00630 a2=0 a3=7fff59f0061c items=0 ppid=1642 pid=1746 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:41:27.301000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Oct 2 20:41:27.302000 audit[1747]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1747 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:41:27.302000 audit[1747]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7fffe723c230 a2=0 a3=7fffe723c21c items=0 ppid=1642 pid=1747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:41:27.302000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Oct 2 20:41:27.303804 env[1642]: time="2023-10-02T20:41:27.303752380Z" level=info msg="Loading containers: done." Oct 2 20:41:27.334184 env[1642]: time="2023-10-02T20:41:27.334064767Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Oct 2 20:41:27.334517 env[1642]: time="2023-10-02T20:41:27.334461650Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Oct 2 20:41:27.334767 env[1642]: time="2023-10-02T20:41:27.334672675Z" level=info msg="Daemon has completed initialization" Oct 2 20:41:27.357298 systemd[1]: Started docker.service. Oct 2 20:41:27.356000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:41:27.368130 env[1642]: time="2023-10-02T20:41:27.368019498Z" level=info msg="API listen on /run/docker.sock" Oct 2 20:41:27.412272 systemd[1]: Reloading. Oct 2 20:41:27.474196 /usr/lib/systemd/system-generators/torcx-generator[1795]: time="2023-10-02T20:41:27Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.0 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.0 /var/lib/torcx/store]" Oct 2 20:41:27.474211 /usr/lib/systemd/system-generators/torcx-generator[1795]: time="2023-10-02T20:41:27Z" level=info msg="torcx already run" Oct 2 20:41:27.531173 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 2 20:41:27.531182 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 2 20:41:27.544899 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 2 20:41:27.586000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:27.586000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:27.586000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:27.586000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:27.586000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:27.586000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:27.586000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:27.586000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:27.586000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:27.587000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:27.587000 audit: BPF prog-id=31 op=LOAD Oct 2 20:41:27.587000 audit: BPF prog-id=26 op=UNLOAD Oct 2 20:41:27.587000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:27.587000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:27.587000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:27.587000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:27.587000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:27.587000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:27.587000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:27.587000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:27.587000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:27.587000 audit: BPF prog-id=32 op=LOAD Oct 2 20:41:27.587000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:27.587000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:27.587000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:27.587000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:27.587000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:27.587000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:27.587000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:27.587000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:27.587000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:27.587000 audit: BPF prog-id=33 op=LOAD Oct 2 20:41:27.587000 audit: BPF prog-id=27 op=UNLOAD Oct 2 20:41:27.587000 audit: BPF prog-id=28 op=UNLOAD Oct 2 20:41:27.588000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:27.588000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:27.588000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:27.588000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:27.588000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:27.588000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:27.588000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:27.588000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:27.588000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:27.588000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:27.588000 audit: BPF prog-id=34 op=LOAD Oct 2 20:41:27.588000 audit: BPF prog-id=29 op=UNLOAD Oct 2 20:41:27.588000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:27.588000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:27.588000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:27.588000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:27.588000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:27.588000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:27.588000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:27.588000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:27.588000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:27.588000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:27.589000 audit: BPF prog-id=35 op=LOAD Oct 2 20:41:27.589000 audit: BPF prog-id=25 op=UNLOAD Oct 2 20:41:27.589000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:27.589000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:27.589000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:27.589000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:27.589000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:27.589000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:27.589000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:27.589000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:27.589000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:27.589000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:27.589000 audit: BPF prog-id=36 op=LOAD Oct 2 20:41:27.589000 audit: BPF prog-id=21 op=UNLOAD Oct 2 20:41:27.589000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:27.589000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:27.589000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:27.589000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:27.589000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:27.589000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:27.589000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:27.589000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:27.589000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:27.589000 audit: BPF prog-id=37 op=LOAD Oct 2 20:41:27.589000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:27.589000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:27.589000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:27.589000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:27.589000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:27.589000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:27.589000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:27.589000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:27.589000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:27.589000 audit: BPF prog-id=38 op=LOAD Oct 2 20:41:27.589000 audit: BPF prog-id=22 op=UNLOAD Oct 2 20:41:27.589000 audit: BPF prog-id=23 op=UNLOAD Oct 2 20:41:27.589000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:27.589000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:27.589000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:27.589000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:27.589000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:27.589000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:27.589000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:27.589000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:27.589000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:27.590000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:27.590000 audit: BPF prog-id=39 op=LOAD Oct 2 20:41:27.590000 audit: BPF prog-id=24 op=UNLOAD Oct 2 20:41:27.590000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:27.590000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:27.590000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:27.590000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:27.590000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:27.590000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:27.590000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:27.590000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:27.590000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:27.590000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:27.590000 audit: BPF prog-id=40 op=LOAD Oct 2 20:41:27.590000 audit: BPF prog-id=15 op=UNLOAD Oct 2 20:41:27.590000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:27.590000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:27.590000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:27.590000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:27.590000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:27.590000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:27.590000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:27.590000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:27.590000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:27.590000 audit: BPF prog-id=41 op=LOAD Oct 2 20:41:27.590000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:27.590000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:27.590000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:27.590000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:27.590000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:27.590000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:27.590000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:27.590000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:27.591000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:27.591000 audit: BPF prog-id=42 op=LOAD Oct 2 20:41:27.591000 audit: BPF prog-id=16 op=UNLOAD Oct 2 20:41:27.591000 audit: BPF prog-id=17 op=UNLOAD Oct 2 20:41:27.591000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:27.591000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:27.591000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:27.591000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:27.591000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:27.591000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:27.591000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:27.591000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:27.591000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:27.591000 audit: BPF prog-id=43 op=LOAD Oct 2 20:41:27.591000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:27.591000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:27.591000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:27.591000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:27.591000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:27.591000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:27.591000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:27.591000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:27.591000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:27.591000 audit: BPF prog-id=44 op=LOAD Oct 2 20:41:27.591000 audit: BPF prog-id=18 op=UNLOAD Oct 2 20:41:27.591000 audit: BPF prog-id=19 op=UNLOAD Oct 2 20:41:27.592000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:27.592000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:27.592000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:27.592000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:27.592000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:27.592000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:27.592000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:27.592000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:27.592000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:27.592000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:27.592000 audit: BPF prog-id=45 op=LOAD Oct 2 20:41:27.592000 audit: BPF prog-id=20 op=UNLOAD Oct 2 20:41:27.597428 systemd[1]: Started kubelet.service. Oct 2 20:41:27.596000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:41:27.621850 kubelet[1855]: E1002 20:41:27.621793 1855 run.go:74] "command failed" err="failed to load kubelet config file, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory, path: /var/lib/kubelet/config.yaml" Oct 2 20:41:27.623054 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Oct 2 20:41:27.623123 systemd[1]: kubelet.service: Failed with result 'exit-code'. Oct 2 20:41:27.622000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 2 20:41:28.388737 env[1465]: time="2023-10-02T20:41:28.388589783Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.27.6\"" Oct 2 20:41:29.069513 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2049707272.mount: Deactivated successfully. Oct 2 20:41:30.587106 env[1465]: time="2023-10-02T20:41:30.587051429Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.27.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:41:30.587779 env[1465]: time="2023-10-02T20:41:30.587721666Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:19b9246d37c8b8c754a8af86facf1975604cfc709fc0ff736531917402189d9c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:41:30.588847 env[1465]: time="2023-10-02T20:41:30.588806460Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.27.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:41:30.589788 env[1465]: time="2023-10-02T20:41:30.589746797Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:5e7a0196a7908cb49bcbf751d2546a008c329ff1e70c26c1cd542e0ada4b623c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:41:30.590280 env[1465]: time="2023-10-02T20:41:30.590235865Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.27.6\" returns image reference \"sha256:19b9246d37c8b8c754a8af86facf1975604cfc709fc0ff736531917402189d9c\"" Oct 2 20:41:30.595600 env[1465]: time="2023-10-02T20:41:30.595555324Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.27.6\"" Oct 2 20:41:32.460972 env[1465]: time="2023-10-02T20:41:32.460921631Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.27.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:41:32.461564 env[1465]: time="2023-10-02T20:41:32.461519163Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7810e6aed9778a5f84fc93f48b0c52edfc55333d7b8de7c71972df8c5b925988,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:41:32.462491 env[1465]: time="2023-10-02T20:41:32.462452274Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.27.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:41:32.463465 env[1465]: time="2023-10-02T20:41:32.463415245Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:c76ca5b0cf607f82c54d51c3c6766da30c9a9f684065e1cac761ea9b07b74e97,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:41:32.464443 env[1465]: time="2023-10-02T20:41:32.464365477Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.27.6\" returns image reference \"sha256:7810e6aed9778a5f84fc93f48b0c52edfc55333d7b8de7c71972df8c5b925988\"" Oct 2 20:41:32.471470 env[1465]: time="2023-10-02T20:41:32.471409712Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.27.6\"" Oct 2 20:41:33.683223 env[1465]: time="2023-10-02T20:41:33.683165600Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.27.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:41:33.683845 env[1465]: time="2023-10-02T20:41:33.683803412Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:993d768b9b96e874c4a171298200661de0d28e52f4d8764e6b2ed1c42470851d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:41:33.684774 env[1465]: time="2023-10-02T20:41:33.684730303Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.27.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:41:33.685612 env[1465]: time="2023-10-02T20:41:33.685572814Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:bb227512d96e93dd3fe356cef552cc3f78905f36330b762adde23c3f0943d57b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:41:33.686008 env[1465]: time="2023-10-02T20:41:33.685967214Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.27.6\" returns image reference \"sha256:993d768b9b96e874c4a171298200661de0d28e52f4d8764e6b2ed1c42470851d\"" Oct 2 20:41:33.692014 env[1465]: time="2023-10-02T20:41:33.691957091Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.27.6\"" Oct 2 20:41:34.669458 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount537275580.mount: Deactivated successfully. Oct 2 20:41:35.000832 env[1465]: time="2023-10-02T20:41:35.000737918Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.27.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:41:35.001720 env[1465]: time="2023-10-02T20:41:35.001698685Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ec57bbfaaae73ecc3c12f05d5ae974468cc0ef356dee588cd15fd471815c7985,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:41:35.003025 env[1465]: time="2023-10-02T20:41:35.002979467Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.27.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:41:35.004120 env[1465]: time="2023-10-02T20:41:35.004081383Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:8e9eff2f6d0b398f9ac5f5a15c1cb7d5f468f28d64a78d593d57f72a969a54ef,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:41:35.004403 env[1465]: time="2023-10-02T20:41:35.004314606Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.27.6\" returns image reference \"sha256:ec57bbfaaae73ecc3c12f05d5ae974468cc0ef356dee588cd15fd471815c7985\"" Oct 2 20:41:35.011082 env[1465]: time="2023-10-02T20:41:35.011038010Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" Oct 2 20:41:35.507109 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount921814957.mount: Deactivated successfully. Oct 2 20:41:35.516870 env[1465]: time="2023-10-02T20:41:35.516814093Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:41:35.517668 env[1465]: time="2023-10-02T20:41:35.517614487Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:41:35.518423 env[1465]: time="2023-10-02T20:41:35.518381050Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:41:35.519117 env[1465]: time="2023-10-02T20:41:35.519070816Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:41:35.519474 env[1465]: time="2023-10-02T20:41:35.519415940Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c\"" Oct 2 20:41:35.525113 env[1465]: time="2023-10-02T20:41:35.525040378Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.7-0\"" Oct 2 20:41:36.189501 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2724858533.mount: Deactivated successfully. Oct 2 20:41:37.646325 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Oct 2 20:41:37.646000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:41:37.646488 systemd[1]: Stopped kubelet.service. Oct 2 20:41:37.647447 systemd[1]: Started kubelet.service. Oct 2 20:41:37.669067 kernel: kauditd_printk_skb: 259 callbacks suppressed Oct 2 20:41:37.669140 kernel: audit: type=1130 audit(1696279297.646:375): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:41:37.671687 kubelet[1943]: E1002 20:41:37.671598 1943 run.go:74] "command failed" err="failed to load kubelet config file, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory, path: /var/lib/kubelet/config.yaml" Oct 2 20:41:37.673772 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Oct 2 20:41:37.673857 systemd[1]: kubelet.service: Failed with result 'exit-code'. Oct 2 20:41:37.646000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:41:37.781060 kernel: audit: type=1131 audit(1696279297.646:376): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:41:37.781110 kernel: audit: type=1130 audit(1696279297.647:377): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:41:37.647000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:41:37.838268 kernel: audit: type=1131 audit(1696279297.673:378): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 2 20:41:37.673000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 2 20:41:39.062022 env[1465]: time="2023-10-02T20:41:39.061915231Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.7-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:41:39.063629 env[1465]: time="2023-10-02T20:41:39.063552740Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:86b6af7dd652c1b38118be1c338e9354b33469e69a218f7e290a0ca5304ad681,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:41:39.067186 env[1465]: time="2023-10-02T20:41:39.067098742Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.7-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:41:39.069957 env[1465]: time="2023-10-02T20:41:39.069874430Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:51eae8381dcb1078289fa7b4f3df2630cdc18d09fb56f8e56b41c40e191d6c83,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:41:39.071663 env[1465]: time="2023-10-02T20:41:39.071565241Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.7-0\" returns image reference \"sha256:86b6af7dd652c1b38118be1c338e9354b33469e69a218f7e290a0ca5304ad681\"" Oct 2 20:41:39.084218 env[1465]: time="2023-10-02T20:41:39.084184644Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.10.1\"" Oct 2 20:41:39.658974 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2801477115.mount: Deactivated successfully. Oct 2 20:41:40.171120 env[1465]: time="2023-10-02T20:41:40.171068153Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.10.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:41:40.171787 env[1465]: time="2023-10-02T20:41:40.171745852Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ead0a4a53df89fd173874b46093b6e62d8c72967bbf606d672c9e8c9b601a4fc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:41:40.172465 env[1465]: time="2023-10-02T20:41:40.172417329Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.10.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:41:40.173585 env[1465]: time="2023-10-02T20:41:40.173542836Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:a0ead06651cf580044aeb0a0feba63591858fb2e43ade8c9dea45a6a89ae7e5e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:41:40.173822 env[1465]: time="2023-10-02T20:41:40.173770996Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.10.1\" returns image reference \"sha256:ead0a4a53df89fd173874b46093b6e62d8c72967bbf606d672c9e8c9b601a4fc\"" Oct 2 20:41:41.570492 systemd[1]: Stopped kubelet.service. Oct 2 20:41:41.569000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:41:41.580460 systemd[1]: Reloading. Oct 2 20:41:41.609464 /usr/lib/systemd/system-generators/torcx-generator[2109]: time="2023-10-02T20:41:41Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.0 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.0 /var/lib/torcx/store]" Oct 2 20:41:41.609487 /usr/lib/systemd/system-generators/torcx-generator[2109]: time="2023-10-02T20:41:41Z" level=info msg="torcx already run" Oct 2 20:41:41.569000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:41:41.696076 kernel: audit: type=1130 audit(1696279301.569:379): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:41:41.696111 kernel: audit: type=1131 audit(1696279301.569:380): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:41:41.716519 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 2 20:41:41.716527 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 2 20:41:41.728888 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 2 20:41:41.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:41.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:41.898005 kernel: audit: type=1400 audit(1696279301.772:381): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:41.898054 kernel: audit: type=1400 audit(1696279301.772:382): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:41.898070 kernel: audit: type=1400 audit(1696279301.772:383): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:41.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:41.960657 kernel: audit: type=1400 audit(1696279301.772:384): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:41.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:41.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:41.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:41.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:41.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:41.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:41.959000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:41.959000 audit: BPF prog-id=46 op=LOAD Oct 2 20:41:41.959000 audit: BPF prog-id=31 op=UNLOAD Oct 2 20:41:41.959000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:41.959000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:41.959000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:41.959000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:41.959000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:41.959000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:41.959000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:41.959000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:42.023000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:42.023000 audit: BPF prog-id=47 op=LOAD Oct 2 20:41:42.023000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:42.023000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:42.023000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:42.023000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:42.023000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:42.023000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:42.023000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:42.023000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:42.023000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:42.023000 audit: BPF prog-id=48 op=LOAD Oct 2 20:41:42.023000 audit: BPF prog-id=32 op=UNLOAD Oct 2 20:41:42.023000 audit: BPF prog-id=33 op=UNLOAD Oct 2 20:41:42.024000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:42.024000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:42.024000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:42.024000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:42.024000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:42.024000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:42.024000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:42.024000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:42.024000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:42.025000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:42.025000 audit: BPF prog-id=49 op=LOAD Oct 2 20:41:42.025000 audit: BPF prog-id=34 op=UNLOAD Oct 2 20:41:42.025000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:42.025000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:42.025000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:42.025000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:42.025000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:42.025000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:42.025000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:42.025000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:42.025000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:42.025000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:42.025000 audit: BPF prog-id=50 op=LOAD Oct 2 20:41:42.025000 audit: BPF prog-id=35 op=UNLOAD Oct 2 20:41:42.025000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:42.025000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:42.025000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:42.025000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:42.025000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:42.025000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:42.025000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:42.025000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:42.025000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:42.026000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:42.026000 audit: BPF prog-id=51 op=LOAD Oct 2 20:41:42.026000 audit: BPF prog-id=36 op=UNLOAD Oct 2 20:41:42.026000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:42.026000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:42.026000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:42.026000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:42.026000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:42.026000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:42.026000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:42.026000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:42.026000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:42.026000 audit: BPF prog-id=52 op=LOAD Oct 2 20:41:42.026000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:42.026000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:42.026000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:42.026000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:42.026000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:42.026000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:42.026000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:42.026000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:42.026000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:42.026000 audit: BPF prog-id=53 op=LOAD Oct 2 20:41:42.026000 audit: BPF prog-id=37 op=UNLOAD Oct 2 20:41:42.026000 audit: BPF prog-id=38 op=UNLOAD Oct 2 20:41:42.026000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:42.026000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:42.026000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:42.026000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:42.026000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:42.026000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:42.026000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:42.026000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:42.026000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:42.026000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:42.026000 audit: BPF prog-id=54 op=LOAD Oct 2 20:41:42.026000 audit: BPF prog-id=39 op=UNLOAD Oct 2 20:41:42.027000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:42.027000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:42.027000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:42.027000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:42.027000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:42.027000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:42.027000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:42.027000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:42.027000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:42.027000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:42.027000 audit: BPF prog-id=55 op=LOAD Oct 2 20:41:42.027000 audit: BPF prog-id=40 op=UNLOAD Oct 2 20:41:42.027000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:42.027000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:42.027000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:42.027000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:42.027000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:42.027000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:42.027000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:42.027000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:42.027000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:42.027000 audit: BPF prog-id=56 op=LOAD Oct 2 20:41:42.027000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:42.027000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:42.027000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:42.027000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:42.027000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:42.027000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:42.027000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:42.027000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:42.027000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:42.027000 audit: BPF prog-id=57 op=LOAD Oct 2 20:41:42.027000 audit: BPF prog-id=41 op=UNLOAD Oct 2 20:41:42.027000 audit: BPF prog-id=42 op=UNLOAD Oct 2 20:41:42.027000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:42.027000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:42.027000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:42.027000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:42.027000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:42.027000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:42.027000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:42.027000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:42.028000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:42.028000 audit: BPF prog-id=58 op=LOAD Oct 2 20:41:42.028000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:42.028000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:42.028000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:42.028000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:42.028000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:42.028000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:42.028000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:42.028000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:42.028000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:42.028000 audit: BPF prog-id=59 op=LOAD Oct 2 20:41:42.028000 audit: BPF prog-id=43 op=UNLOAD Oct 2 20:41:42.028000 audit: BPF prog-id=44 op=UNLOAD Oct 2 20:41:42.029000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:42.029000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:42.029000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:42.029000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:42.029000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:42.029000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:42.029000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:42.029000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:42.029000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:42.029000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:42.029000 audit: BPF prog-id=60 op=LOAD Oct 2 20:41:42.029000 audit: BPF prog-id=45 op=UNLOAD Oct 2 20:41:42.036116 systemd[1]: Started kubelet.service. Oct 2 20:41:42.035000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:41:42.059363 kubelet[2168]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Oct 2 20:41:42.059599 kubelet[2168]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Oct 2 20:41:42.059599 kubelet[2168]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Oct 2 20:41:42.059599 kubelet[2168]: I1002 20:41:42.059533 2168 server.go:199] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Oct 2 20:41:42.399864 kubelet[2168]: I1002 20:41:42.399823 2168 server.go:415] "Kubelet version" kubeletVersion="v1.27.2" Oct 2 20:41:42.399864 kubelet[2168]: I1002 20:41:42.399835 2168 server.go:417] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Oct 2 20:41:42.399996 kubelet[2168]: I1002 20:41:42.399958 2168 server.go:837] "Client rotation is on, will bootstrap in background" Oct 2 20:41:42.402087 kubelet[2168]: I1002 20:41:42.402057 2168 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Oct 2 20:41:42.402671 kubelet[2168]: E1002 20:41:42.402635 2168 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://139.178.89.131:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 139.178.89.131:6443: connect: connection refused Oct 2 20:41:42.420825 kubelet[2168]: I1002 20:41:42.420789 2168 server.go:662] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Oct 2 20:41:42.420925 kubelet[2168]: I1002 20:41:42.420885 2168 container_manager_linux.go:266] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Oct 2 20:41:42.420925 kubelet[2168]: I1002 20:41:42.420922 2168 container_manager_linux.go:271] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:} {Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:} {Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] TopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] PodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms TopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]} Oct 2 20:41:42.421009 kubelet[2168]: I1002 20:41:42.420933 2168 topology_manager.go:136] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Oct 2 20:41:42.421009 kubelet[2168]: I1002 20:41:42.420940 2168 container_manager_linux.go:302] "Creating device plugin manager" Oct 2 20:41:42.421009 kubelet[2168]: I1002 20:41:42.420979 2168 state_mem.go:36] "Initialized new in-memory state store" Oct 2 20:41:42.423093 kubelet[2168]: I1002 20:41:42.423063 2168 kubelet.go:405] "Attempting to sync node with API server" Oct 2 20:41:42.423093 kubelet[2168]: I1002 20:41:42.423088 2168 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Oct 2 20:41:42.423171 kubelet[2168]: I1002 20:41:42.423098 2168 kubelet.go:309] "Adding apiserver pod source" Oct 2 20:41:42.423171 kubelet[2168]: I1002 20:41:42.423106 2168 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Oct 2 20:41:42.423515 kubelet[2168]: I1002 20:41:42.423478 2168 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Oct 2 20:41:42.423553 kubelet[2168]: W1002 20:41:42.423490 2168 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://139.178.89.131:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 139.178.89.131:6443: connect: connection refused Oct 2 20:41:42.423553 kubelet[2168]: E1002 20:41:42.423534 2168 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://139.178.89.131:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 139.178.89.131:6443: connect: connection refused Oct 2 20:41:42.423553 kubelet[2168]: W1002 20:41:42.423534 2168 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://139.178.89.131:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.0-a-0ae5c90d19&limit=500&resourceVersion=0": dial tcp 139.178.89.131:6443: connect: connection refused Oct 2 20:41:42.423624 kubelet[2168]: E1002 20:41:42.423557 2168 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://139.178.89.131:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.0-a-0ae5c90d19&limit=500&resourceVersion=0": dial tcp 139.178.89.131:6443: connect: connection refused Oct 2 20:41:42.423642 kubelet[2168]: W1002 20:41:42.423639 2168 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Oct 2 20:41:42.423952 kubelet[2168]: I1002 20:41:42.423921 2168 server.go:1168] "Started kubelet" Oct 2 20:41:42.423991 kubelet[2168]: I1002 20:41:42.423983 2168 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Oct 2 20:41:42.424026 kubelet[2168]: I1002 20:41:42.423994 2168 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Oct 2 20:41:42.424135 kubelet[2168]: E1002 20:41:42.424125 2168 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Oct 2 20:41:42.424164 kubelet[2168]: E1002 20:41:42.424140 2168 kubelet.go:1400] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Oct 2 20:41:42.424189 kubelet[2168]: E1002 20:41:42.424127 2168 event.go:289] Unable to write event: '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510.3.0-a-0ae5c90d19.178a6509ccd2d861", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510.3.0-a-0ae5c90d19", UID:"ci-3510.3.0-a-0ae5c90d19", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.0-a-0ae5c90d19"}, FirstTimestamp:time.Date(2023, time.October, 2, 20, 41, 42, 423894113, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 20, 41, 42, 423894113, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'Post "https://139.178.89.131:6443/api/v1/namespaces/default/events": dial tcp 139.178.89.131:6443: connect: connection refused'(may retry after sleeping) Oct 2 20:41:42.424520 kubelet[2168]: I1002 20:41:42.424489 2168 server.go:461] "Adding debug handlers to kubelet server" Oct 2 20:41:42.424000 audit[2168]: AVC avc: denied { mac_admin } for pid=2168 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:42.424000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 20:41:42.424000 audit[2168]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000f18d80 a1=c000ebca68 a2=c000f18d50 a3=25 items=0 ppid=1 pid=2168 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:41:42.424000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 20:41:42.424000 audit[2168]: AVC avc: denied { mac_admin } for pid=2168 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:42.424000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 20:41:42.424000 audit[2168]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0010485c0 a1=c000ebca80 a2=c000f18e10 a3=25 items=0 ppid=1 pid=2168 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:41:42.424000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 20:41:42.424847 kubelet[2168]: I1002 20:41:42.424575 2168 kubelet.go:1355] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Oct 2 20:41:42.424847 kubelet[2168]: I1002 20:41:42.424595 2168 kubelet.go:1359] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Oct 2 20:41:42.424847 kubelet[2168]: I1002 20:41:42.424626 2168 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Oct 2 20:41:42.424847 kubelet[2168]: I1002 20:41:42.424672 2168 volume_manager.go:284] "Starting Kubelet Volume Manager" Oct 2 20:41:42.424847 kubelet[2168]: I1002 20:41:42.424707 2168 desired_state_of_world_populator.go:145] "Desired state populator starts to run" Oct 2 20:41:42.424966 kubelet[2168]: E1002 20:41:42.424859 2168 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://139.178.89.131:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.0-a-0ae5c90d19?timeout=10s\": dial tcp 139.178.89.131:6443: connect: connection refused" interval="200ms" Oct 2 20:41:42.424991 kubelet[2168]: W1002 20:41:42.424956 2168 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://139.178.89.131:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 139.178.89.131:6443: connect: connection refused Oct 2 20:41:42.425010 kubelet[2168]: E1002 20:41:42.424990 2168 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://139.178.89.131:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 139.178.89.131:6443: connect: connection refused Oct 2 20:41:42.425000 audit[2192]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=2192 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:41:42.425000 audit[2192]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffda8686e40 a2=0 a3=7ffda8686e2c items=0 ppid=2168 pid=2192 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:41:42.425000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Oct 2 20:41:42.426000 audit[2193]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=2193 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:41:42.426000 audit[2193]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd85154900 a2=0 a3=7ffd851548ec items=0 ppid=2168 pid=2193 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:41:42.426000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Oct 2 20:41:42.427000 audit[2196]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=2196 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:41:42.427000 audit[2196]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffcd69a3d70 a2=0 a3=7ffcd69a3d5c items=0 ppid=2168 pid=2196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:41:42.427000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 2 20:41:42.428000 audit[2198]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=2198 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:41:42.428000 audit[2198]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffea598a680 a2=0 a3=7ffea598a66c items=0 ppid=2168 pid=2198 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:41:42.428000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 2 20:41:42.431000 audit[2201]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=2201 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:41:42.431000 audit[2201]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffcbca56c40 a2=0 a3=7ffcbca56c2c items=0 ppid=2168 pid=2201 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:41:42.431000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Oct 2 20:41:42.431960 kubelet[2168]: I1002 20:41:42.431934 2168 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Oct 2 20:41:42.432000 audit[2202]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=2202 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:41:42.432000 audit[2202]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffef2deda80 a2=0 a3=7ffef2deda6c items=0 ppid=2168 pid=2202 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:41:42.432000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Oct 2 20:41:42.432478 kubelet[2168]: I1002 20:41:42.432424 2168 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Oct 2 20:41:42.432478 kubelet[2168]: I1002 20:41:42.432443 2168 status_manager.go:207] "Starting to sync pod status with apiserver" Oct 2 20:41:42.432478 kubelet[2168]: I1002 20:41:42.432454 2168 kubelet.go:2257] "Starting kubelet main sync loop" Oct 2 20:41:42.432000 audit[2204]: NETFILTER_CFG table=mangle:32 family=2 entries=1 op=nft_register_chain pid=2204 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:41:42.432000 audit[2204]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffff30c35f0 a2=0 a3=7ffff30c35dc items=0 ppid=2168 pid=2204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:41:42.432000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Oct 2 20:41:42.432600 kubelet[2168]: E1002 20:41:42.432486 2168 kubelet.go:2281] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Oct 2 20:41:42.432679 kubelet[2168]: W1002 20:41:42.432662 2168 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://139.178.89.131:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 139.178.89.131:6443: connect: connection refused Oct 2 20:41:42.432702 kubelet[2168]: E1002 20:41:42.432685 2168 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://139.178.89.131:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 139.178.89.131:6443: connect: connection refused Oct 2 20:41:42.432000 audit[2205]: NETFILTER_CFG table=mangle:33 family=10 entries=1 op=nft_register_chain pid=2205 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:41:42.432000 audit[2205]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc7835f040 a2=0 a3=7ffc7835f02c items=0 ppid=2168 pid=2205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:41:42.432000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Oct 2 20:41:42.432000 audit[2206]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=2206 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:41:42.432000 audit[2206]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffee3cdb6c0 a2=0 a3=10e3 items=0 ppid=2168 pid=2206 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:41:42.432000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Oct 2 20:41:42.433000 audit[2207]: NETFILTER_CFG table=nat:35 family=10 entries=2 op=nft_register_chain pid=2207 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:41:42.433000 audit[2207]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffc8aecc610 a2=0 a3=7ffc8aecc5fc items=0 ppid=2168 pid=2207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:41:42.433000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Oct 2 20:41:42.433000 audit[2208]: NETFILTER_CFG table=filter:36 family=2 entries=1 op=nft_register_chain pid=2208 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:41:42.433000 audit[2208]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffbe7f43a0 a2=0 a3=7fffbe7f438c items=0 ppid=2168 pid=2208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:41:42.433000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Oct 2 20:41:42.433000 audit[2209]: NETFILTER_CFG table=filter:37 family=10 entries=2 op=nft_register_chain pid=2209 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:41:42.433000 audit[2209]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffc72f4a300 a2=0 a3=7ffc72f4a2ec items=0 ppid=2168 pid=2209 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:41:42.433000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Oct 2 20:41:42.533268 kubelet[2168]: E1002 20:41:42.533156 2168 kubelet.go:2281] "Skipping pod synchronization" err="container runtime status check may not have completed yet" Oct 2 20:41:42.578507 kubelet[2168]: I1002 20:41:42.578426 2168 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.0-a-0ae5c90d19" Oct 2 20:41:42.579150 kubelet[2168]: E1002 20:41:42.579107 2168 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://139.178.89.131:6443/api/v1/nodes\": dial tcp 139.178.89.131:6443: connect: connection refused" node="ci-3510.3.0-a-0ae5c90d19" Oct 2 20:41:42.579690 kubelet[2168]: I1002 20:41:42.579638 2168 cpu_manager.go:214] "Starting CPU manager" policy="none" Oct 2 20:41:42.579690 kubelet[2168]: I1002 20:41:42.579687 2168 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Oct 2 20:41:42.580090 kubelet[2168]: I1002 20:41:42.579735 2168 state_mem.go:36] "Initialized new in-memory state store" Oct 2 20:41:42.581535 kubelet[2168]: I1002 20:41:42.581486 2168 policy_none.go:49] "None policy: Start" Oct 2 20:41:42.582731 kubelet[2168]: I1002 20:41:42.582651 2168 memory_manager.go:169] "Starting memorymanager" policy="None" Oct 2 20:41:42.582731 kubelet[2168]: I1002 20:41:42.582704 2168 state_mem.go:35] "Initializing new in-memory state store" Oct 2 20:41:42.592113 systemd[1]: Created slice kubepods.slice. Oct 2 20:41:42.601637 systemd[1]: Created slice kubepods-burstable.slice. Oct 2 20:41:42.609177 systemd[1]: Created slice kubepods-besteffort.slice. Oct 2 20:41:42.625999 kubelet[2168]: E1002 20:41:42.625902 2168 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://139.178.89.131:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.0-a-0ae5c90d19?timeout=10s\": dial tcp 139.178.89.131:6443: connect: connection refused" interval="400ms" Oct 2 20:41:42.628810 kubelet[2168]: I1002 20:41:42.628737 2168 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Oct 2 20:41:42.627000 audit[2168]: AVC avc: denied { mac_admin } for pid=2168 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:42.627000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 20:41:42.627000 audit[2168]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000f19560 a1=c0012e00c0 a2=c000f19530 a3=25 items=0 ppid=1 pid=2168 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:41:42.627000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 20:41:42.629762 kubelet[2168]: I1002 20:41:42.628889 2168 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Oct 2 20:41:42.629762 kubelet[2168]: I1002 20:41:42.629410 2168 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Oct 2 20:41:42.630234 kubelet[2168]: E1002 20:41:42.630191 2168 eviction_manager.go:262] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ci-3510.3.0-a-0ae5c90d19\" not found" Oct 2 20:41:42.734193 kubelet[2168]: I1002 20:41:42.733976 2168 topology_manager.go:212] "Topology Admit Handler" Oct 2 20:41:42.738075 kubelet[2168]: I1002 20:41:42.737994 2168 topology_manager.go:212] "Topology Admit Handler" Oct 2 20:41:42.740030 kubelet[2168]: I1002 20:41:42.740020 2168 topology_manager.go:212] "Topology Admit Handler" Oct 2 20:41:42.742651 systemd[1]: Created slice kubepods-burstable-podd45c7ec0b5998ba9ed58342d7ec412e5.slice. Oct 2 20:41:42.776431 systemd[1]: Created slice kubepods-burstable-pod8bd80e30254a62bf5285de45d8d06f0e.slice. Oct 2 20:41:42.783096 kubelet[2168]: I1002 20:41:42.783046 2168 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.0-a-0ae5c90d19" Oct 2 20:41:42.783750 kubelet[2168]: E1002 20:41:42.783699 2168 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://139.178.89.131:6443/api/v1/nodes\": dial tcp 139.178.89.131:6443: connect: connection refused" node="ci-3510.3.0-a-0ae5c90d19" Oct 2 20:41:42.786497 systemd[1]: Created slice kubepods-burstable-poda3160a8940a388c43186675d1dbbff0b.slice. Oct 2 20:41:42.827772 kubelet[2168]: I1002 20:41:42.827699 2168 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/d45c7ec0b5998ba9ed58342d7ec412e5-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.0-a-0ae5c90d19\" (UID: \"d45c7ec0b5998ba9ed58342d7ec412e5\") " pod="kube-system/kube-controller-manager-ci-3510.3.0-a-0ae5c90d19" Oct 2 20:41:42.828085 kubelet[2168]: I1002 20:41:42.827837 2168 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/d45c7ec0b5998ba9ed58342d7ec412e5-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.0-a-0ae5c90d19\" (UID: \"d45c7ec0b5998ba9ed58342d7ec412e5\") " pod="kube-system/kube-controller-manager-ci-3510.3.0-a-0ae5c90d19" Oct 2 20:41:42.828085 kubelet[2168]: I1002 20:41:42.827944 2168 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/d45c7ec0b5998ba9ed58342d7ec412e5-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.0-a-0ae5c90d19\" (UID: \"d45c7ec0b5998ba9ed58342d7ec412e5\") " pod="kube-system/kube-controller-manager-ci-3510.3.0-a-0ae5c90d19" Oct 2 20:41:42.828085 kubelet[2168]: I1002 20:41:42.828072 2168 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/8bd80e30254a62bf5285de45d8d06f0e-kubeconfig\") pod \"kube-scheduler-ci-3510.3.0-a-0ae5c90d19\" (UID: \"8bd80e30254a62bf5285de45d8d06f0e\") " pod="kube-system/kube-scheduler-ci-3510.3.0-a-0ae5c90d19" Oct 2 20:41:42.828577 kubelet[2168]: I1002 20:41:42.828182 2168 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/a3160a8940a388c43186675d1dbbff0b-ca-certs\") pod \"kube-apiserver-ci-3510.3.0-a-0ae5c90d19\" (UID: \"a3160a8940a388c43186675d1dbbff0b\") " pod="kube-system/kube-apiserver-ci-3510.3.0-a-0ae5c90d19" Oct 2 20:41:42.828577 kubelet[2168]: I1002 20:41:42.828286 2168 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/a3160a8940a388c43186675d1dbbff0b-k8s-certs\") pod \"kube-apiserver-ci-3510.3.0-a-0ae5c90d19\" (UID: \"a3160a8940a388c43186675d1dbbff0b\") " pod="kube-system/kube-apiserver-ci-3510.3.0-a-0ae5c90d19" Oct 2 20:41:42.828577 kubelet[2168]: I1002 20:41:42.828429 2168 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/a3160a8940a388c43186675d1dbbff0b-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.0-a-0ae5c90d19\" (UID: \"a3160a8940a388c43186675d1dbbff0b\") " pod="kube-system/kube-apiserver-ci-3510.3.0-a-0ae5c90d19" Oct 2 20:41:42.828577 kubelet[2168]: I1002 20:41:42.828561 2168 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/d45c7ec0b5998ba9ed58342d7ec412e5-ca-certs\") pod \"kube-controller-manager-ci-3510.3.0-a-0ae5c90d19\" (UID: \"d45c7ec0b5998ba9ed58342d7ec412e5\") " pod="kube-system/kube-controller-manager-ci-3510.3.0-a-0ae5c90d19" Oct 2 20:41:42.829082 kubelet[2168]: I1002 20:41:42.828743 2168 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/d45c7ec0b5998ba9ed58342d7ec412e5-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.0-a-0ae5c90d19\" (UID: \"d45c7ec0b5998ba9ed58342d7ec412e5\") " pod="kube-system/kube-controller-manager-ci-3510.3.0-a-0ae5c90d19" Oct 2 20:41:43.027795 kubelet[2168]: E1002 20:41:43.027611 2168 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://139.178.89.131:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.0-a-0ae5c90d19?timeout=10s\": dial tcp 139.178.89.131:6443: connect: connection refused" interval="800ms" Oct 2 20:41:43.070913 env[1465]: time="2023-10-02T20:41:43.070783387Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.0-a-0ae5c90d19,Uid:d45c7ec0b5998ba9ed58342d7ec412e5,Namespace:kube-system,Attempt:0,}" Oct 2 20:41:43.083059 env[1465]: time="2023-10-02T20:41:43.082951487Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.0-a-0ae5c90d19,Uid:8bd80e30254a62bf5285de45d8d06f0e,Namespace:kube-system,Attempt:0,}" Oct 2 20:41:43.092048 env[1465]: time="2023-10-02T20:41:43.091974105Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.0-a-0ae5c90d19,Uid:a3160a8940a388c43186675d1dbbff0b,Namespace:kube-system,Attempt:0,}" Oct 2 20:41:43.187662 kubelet[2168]: I1002 20:41:43.187600 2168 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.0-a-0ae5c90d19" Oct 2 20:41:43.188581 kubelet[2168]: E1002 20:41:43.188395 2168 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://139.178.89.131:6443/api/v1/nodes\": dial tcp 139.178.89.131:6443: connect: connection refused" node="ci-3510.3.0-a-0ae5c90d19" Oct 2 20:41:43.354153 kubelet[2168]: W1002 20:41:43.353964 2168 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://139.178.89.131:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 139.178.89.131:6443: connect: connection refused Oct 2 20:41:43.354153 kubelet[2168]: E1002 20:41:43.354051 2168 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://139.178.89.131:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 139.178.89.131:6443: connect: connection refused Oct 2 20:41:43.369050 kubelet[2168]: W1002 20:41:43.368892 2168 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://139.178.89.131:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.0-a-0ae5c90d19&limit=500&resourceVersion=0": dial tcp 139.178.89.131:6443: connect: connection refused Oct 2 20:41:43.369050 kubelet[2168]: E1002 20:41:43.369021 2168 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://139.178.89.131:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.0-a-0ae5c90d19&limit=500&resourceVersion=0": dial tcp 139.178.89.131:6443: connect: connection refused Oct 2 20:41:43.475079 kubelet[2168]: W1002 20:41:43.474912 2168 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://139.178.89.131:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 139.178.89.131:6443: connect: connection refused Oct 2 20:41:43.475079 kubelet[2168]: E1002 20:41:43.475041 2168 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://139.178.89.131:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 139.178.89.131:6443: connect: connection refused Oct 2 20:41:43.620592 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1398840918.mount: Deactivated successfully. Oct 2 20:41:43.621961 env[1465]: time="2023-10-02T20:41:43.621909890Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:41:43.623367 env[1465]: time="2023-10-02T20:41:43.623301763Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:41:43.624058 env[1465]: time="2023-10-02T20:41:43.624011521Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:41:43.624570 env[1465]: time="2023-10-02T20:41:43.624536023Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:41:43.625008 env[1465]: time="2023-10-02T20:41:43.624970162Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:41:43.626238 env[1465]: time="2023-10-02T20:41:43.626203922Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:41:43.628014 env[1465]: time="2023-10-02T20:41:43.627968371Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:41:43.628493 env[1465]: time="2023-10-02T20:41:43.628457497Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:41:43.629901 env[1465]: time="2023-10-02T20:41:43.629863686Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:41:43.630789 env[1465]: time="2023-10-02T20:41:43.630740570Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:41:43.631200 env[1465]: time="2023-10-02T20:41:43.631165618Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:41:43.631797 env[1465]: time="2023-10-02T20:41:43.631758364Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:41:43.635295 env[1465]: time="2023-10-02T20:41:43.635263741Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 20:41:43.635295 env[1465]: time="2023-10-02T20:41:43.635285267Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 20:41:43.635295 env[1465]: time="2023-10-02T20:41:43.635292136Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 20:41:43.635402 env[1465]: time="2023-10-02T20:41:43.635369218Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/9bbc431da149d819d92328e79742144132f840d2eed986434b183242c90bcfa4 pid=2217 runtime=io.containerd.runc.v2 Oct 2 20:41:43.637582 env[1465]: time="2023-10-02T20:41:43.637542906Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 20:41:43.637582 env[1465]: time="2023-10-02T20:41:43.637573186Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 20:41:43.637700 env[1465]: time="2023-10-02T20:41:43.637585352Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 20:41:43.637700 env[1465]: time="2023-10-02T20:41:43.637667365Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/7806dca22ce983e94b12cbd3f81d6410bb3b881d3556c431a6995d3a696d96cc pid=2240 runtime=io.containerd.runc.v2 Oct 2 20:41:43.638422 env[1465]: time="2023-10-02T20:41:43.638396977Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 20:41:43.638422 env[1465]: time="2023-10-02T20:41:43.638414085Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 20:41:43.638511 env[1465]: time="2023-10-02T20:41:43.638422762Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 20:41:43.638545 env[1465]: time="2023-10-02T20:41:43.638504576Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b6321bd8cb84002bacebc764a20e06c61f595a651a74feccbff3d0e47539c09f pid=2249 runtime=io.containerd.runc.v2 Oct 2 20:41:43.644214 systemd[1]: Started cri-containerd-b6321bd8cb84002bacebc764a20e06c61f595a651a74feccbff3d0e47539c09f.scope. Oct 2 20:41:43.649000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:43.676844 kernel: kauditd_printk_skb: 217 callbacks suppressed Oct 2 20:41:43.676998 kernel: audit: type=1400 audit(1696279303.649:569): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:43.649000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:43.742621 systemd[1]: Started cri-containerd-7806dca22ce983e94b12cbd3f81d6410bb3b881d3556c431a6995d3a696d96cc.scope. Oct 2 20:41:43.743173 systemd[1]: Started cri-containerd-9bbc431da149d819d92328e79742144132f840d2eed986434b183242c90bcfa4.scope. Oct 2 20:41:43.803747 kernel: audit: type=1400 audit(1696279303.649:570): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:43.803795 kernel: audit: type=1400 audit(1696279303.649:571): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:43.649000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:43.828427 kubelet[2168]: E1002 20:41:43.828384 2168 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://139.178.89.131:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.0-a-0ae5c90d19?timeout=10s\": dial tcp 139.178.89.131:6443: connect: connection refused" interval="1.6s" Oct 2 20:41:43.866954 kernel: audit: type=1400 audit(1696279303.649:572): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:43.649000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:43.930623 kernel: audit: type=1400 audit(1696279303.649:573): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:43.649000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:43.989945 kubelet[2168]: I1002 20:41:43.989937 2168 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.0-a-0ae5c90d19" Oct 2 20:41:43.990124 kubelet[2168]: E1002 20:41:43.990087 2168 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://139.178.89.131:6443/api/v1/nodes\": dial tcp 139.178.89.131:6443: connect: connection refused" node="ci-3510.3.0-a-0ae5c90d19" Oct 2 20:41:43.994218 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Oct 2 20:41:43.994244 kernel: audit: type=1400 audit(1696279303.649:574): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:43.649000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.012533 kubelet[2168]: W1002 20:41:44.012478 2168 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://139.178.89.131:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 139.178.89.131:6443: connect: connection refused Oct 2 20:41:44.012533 kubelet[2168]: E1002 20:41:44.012509 2168 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://139.178.89.131:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 139.178.89.131:6443: connect: connection refused Oct 2 20:41:44.021087 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 Oct 2 20:41:44.021118 kernel: audit: backlog limit exceeded Oct 2 20:41:44.021135 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Oct 2 20:41:43.649000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:43.649000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:43.649000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:43.739000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:43.739000 audit: BPF prog-id=61 op=LOAD Oct 2 20:41:43.739000 audit[2267]: AVC avc: denied { bpf } for pid=2267 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:43.739000 audit[2267]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2249 pid=2267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:41:43.739000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236333231626438636238343030326261636562633736346132306530 Oct 2 20:41:43.739000 audit[2267]: AVC avc: denied { perfmon } for pid=2267 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:43.739000 audit[2267]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2249 pid=2267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:41:43.739000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236333231626438636238343030326261636562633736346132306530 Oct 2 20:41:43.740000 audit[2267]: AVC avc: denied { bpf } for pid=2267 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:43.740000 audit[2267]: AVC avc: denied { bpf } for pid=2267 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:43.740000 audit[2267]: AVC avc: denied { bpf } for pid=2267 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:43.740000 audit[2267]: AVC avc: denied { perfmon } for pid=2267 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:43.740000 audit[2267]: AVC avc: denied { perfmon } for pid=2267 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:43.740000 audit[2267]: AVC avc: denied { perfmon } for pid=2267 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:43.740000 audit[2267]: AVC avc: denied { perfmon } for pid=2267 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:43.740000 audit[2267]: AVC avc: denied { perfmon } for pid=2267 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:43.740000 audit[2267]: AVC avc: denied { bpf } for pid=2267 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:43.746000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:43.746000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:43.746000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:43.746000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:43.746000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:43.746000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:43.746000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:43.746000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:43.746000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:43.740000 audit[2267]: AVC avc: denied { bpf } for pid=2267 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:43.929000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:43.740000 audit: BPF prog-id=62 op=LOAD Oct 2 20:41:43.929000 audit: BPF prog-id=63 op=LOAD Oct 2 20:41:43.740000 audit[2267]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000098c70 items=0 ppid=2249 pid=2267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:41:43.740000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236333231626438636238343030326261636562633736346132306530 Oct 2 20:41:43.929000 audit[2267]: AVC avc: denied { bpf } for pid=2267 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:43.929000 audit[2267]: AVC avc: denied { bpf } for pid=2267 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:43.929000 audit[2267]: AVC avc: denied { perfmon } for pid=2267 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:43.929000 audit[2267]: AVC avc: denied { perfmon } for pid=2267 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:43.929000 audit[2267]: AVC avc: denied { perfmon } for pid=2267 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:43.929000 audit[2267]: AVC avc: denied { perfmon } for pid=2267 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:43.929000 audit[2267]: AVC avc: denied { perfmon } for pid=2267 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:43.929000 audit[2267]: AVC avc: denied { bpf } for pid=2267 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:43.929000 audit[2233]: AVC avc: denied { bpf } for pid=2233 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:43.929000 audit[2233]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2217 pid=2233 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:41:43.929000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962626334333164613134396438313964393233323865373937343231 Oct 2 20:41:43.929000 audit[2233]: AVC avc: denied { perfmon } for pid=2233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:43.929000 audit[2233]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2217 pid=2233 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:41:43.929000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962626334333164613134396438313964393233323865373937343231 Oct 2 20:41:43.929000 audit[2233]: AVC avc: denied { bpf } for pid=2233 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:43.929000 audit[2233]: AVC avc: denied { bpf } for pid=2233 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:43.929000 audit[2233]: AVC avc: denied { bpf } for pid=2233 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:43.929000 audit[2233]: AVC avc: denied { perfmon } for pid=2233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:43.929000 audit[2233]: AVC avc: denied { perfmon } for pid=2233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:43.929000 audit[2233]: AVC avc: denied { perfmon } for pid=2233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:43.929000 audit[2233]: AVC avc: denied { perfmon } for pid=2233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:43.929000 audit[2233]: AVC avc: denied { perfmon } for pid=2233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:43.929000 audit[2233]: AVC avc: denied { bpf } for pid=2233 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:43.929000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:43.929000 audit[2267]: AVC avc: denied { bpf } for pid=2267 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:43.929000 audit[2233]: AVC avc: denied { bpf } for pid=2233 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:43.929000 audit: BPF prog-id=65 op=LOAD Oct 2 20:41:43.929000 audit[2233]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000304550 items=0 ppid=2217 pid=2233 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:41:43.929000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962626334333164613134396438313964393233323865373937343231 Oct 2 20:41:44.084000 audit[2233]: AVC avc: denied { bpf } for pid=2233 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:43.929000 audit[2267]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000098cb8 items=0 ppid=2249 pid=2267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:41:43.929000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236333231626438636238343030326261636562633736346132306530 Oct 2 20:41:44.084000 audit: BPF prog-id=64 op=UNLOAD Oct 2 20:41:44.084000 audit[2233]: AVC avc: denied { bpf } for pid=2233 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.084000 audit[2233]: AVC avc: denied { perfmon } for pid=2233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.084000 audit[2233]: AVC avc: denied { perfmon } for pid=2233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.084000 audit[2233]: AVC avc: denied { perfmon } for pid=2233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.084000 audit[2233]: AVC avc: denied { perfmon } for pid=2233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.084000 audit[2233]: AVC avc: denied { perfmon } for pid=2233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.084000 audit[2233]: AVC avc: denied { bpf } for pid=2233 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.084000 audit: BPF prog-id=62 op=UNLOAD Oct 2 20:41:44.084000 audit[2267]: AVC avc: denied { bpf } for pid=2267 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.084000 audit[2267]: AVC avc: denied { bpf } for pid=2267 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.084000 audit[2267]: AVC avc: denied { bpf } for pid=2267 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.084000 audit[2267]: AVC avc: denied { perfmon } for pid=2267 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.084000 audit[2267]: AVC avc: denied { perfmon } for pid=2267 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.084000 audit[2267]: AVC avc: denied { perfmon } for pid=2267 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.084000 audit[2267]: AVC avc: denied { perfmon } for pid=2267 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.084000 audit[2267]: AVC avc: denied { perfmon } for pid=2267 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.084000 audit[2267]: AVC avc: denied { bpf } for pid=2267 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.084000 audit[2267]: AVC avc: denied { bpf } for pid=2267 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.084000 audit[2233]: AVC avc: denied { bpf } for pid=2233 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.084000 audit: BPF prog-id=67 op=LOAD Oct 2 20:41:44.084000 audit: BPF prog-id=66 op=LOAD Oct 2 20:41:44.084000 audit[2267]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0000990c8 items=0 ppid=2249 pid=2267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:41:44.084000 audit[2233]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000304598 items=0 ppid=2217 pid=2233 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:41:44.084000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236333231626438636238343030326261636562633736346132306530 Oct 2 20:41:44.084000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962626334333164613134396438313964393233323865373937343231 Oct 2 20:41:44.162000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.162000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.162000 audit: BPF prog-id=66 op=UNLOAD Oct 2 20:41:44.162000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.162000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.162000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.162000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.162000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.162000 audit: BPF prog-id=65 op=UNLOAD Oct 2 20:41:44.162000 audit[2233]: AVC avc: denied { bpf } for pid=2233 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.162000 audit[2233]: AVC avc: denied { bpf } for pid=2233 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.162000 audit[2233]: AVC avc: denied { bpf } for pid=2233 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.162000 audit[2233]: AVC avc: denied { perfmon } for pid=2233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.162000 audit[2233]: AVC avc: denied { perfmon } for pid=2233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.162000 audit[2233]: AVC avc: denied { perfmon } for pid=2233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.162000 audit[2233]: AVC avc: denied { perfmon } for pid=2233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.162000 audit[2233]: AVC avc: denied { perfmon } for pid=2233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.162000 audit[2233]: AVC avc: denied { bpf } for pid=2233 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.162000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.162000 audit: BPF prog-id=68 op=LOAD Oct 2 20:41:44.162000 audit[2233]: AVC avc: denied { bpf } for pid=2233 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.162000 audit: BPF prog-id=69 op=LOAD Oct 2 20:41:44.162000 audit[2233]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003049a8 items=0 ppid=2217 pid=2233 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:41:44.162000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962626334333164613134396438313964393233323865373937343231 Oct 2 20:41:44.162000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.162000 audit[2262]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=2240 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:41:44.162000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738303664636132326365393833653934623132636264336638316436 Oct 2 20:41:44.162000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.162000 audit[2262]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=c items=0 ppid=2240 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:41:44.162000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738303664636132326365393833653934623132636264336638316436 Oct 2 20:41:44.162000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.162000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.162000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.162000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.162000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.162000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.162000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.162000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.162000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.162000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.162000 audit: BPF prog-id=70 op=LOAD Oct 2 20:41:44.162000 audit[2262]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c000024b40 items=0 ppid=2240 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:41:44.162000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738303664636132326365393833653934623132636264336638316436 Oct 2 20:41:44.162000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.162000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.162000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.162000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.162000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.162000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.162000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.162000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.162000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.162000 audit: BPF prog-id=71 op=LOAD Oct 2 20:41:44.162000 audit[2262]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c000024b88 items=0 ppid=2240 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:41:44.162000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738303664636132326365393833653934623132636264336638316436 Oct 2 20:41:44.162000 audit: BPF prog-id=71 op=UNLOAD Oct 2 20:41:44.162000 audit: BPF prog-id=70 op=UNLOAD Oct 2 20:41:44.162000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.162000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.162000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.162000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.162000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.162000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.162000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.162000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.162000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.162000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.162000 audit: BPF prog-id=72 op=LOAD Oct 2 20:41:44.162000 audit[2262]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c000024f98 items=0 ppid=2240 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:41:44.162000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738303664636132326365393833653934623132636264336638316436 Oct 2 20:41:44.179807 env[1465]: time="2023-10-02T20:41:44.179780370Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.0-a-0ae5c90d19,Uid:d45c7ec0b5998ba9ed58342d7ec412e5,Namespace:kube-system,Attempt:0,} returns sandbox id \"9bbc431da149d819d92328e79742144132f840d2eed986434b183242c90bcfa4\"" Oct 2 20:41:44.181530 env[1465]: time="2023-10-02T20:41:44.181495084Z" level=info msg="CreateContainer within sandbox \"9bbc431da149d819d92328e79742144132f840d2eed986434b183242c90bcfa4\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Oct 2 20:41:44.186233 env[1465]: time="2023-10-02T20:41:44.186216955Z" level=info msg="CreateContainer within sandbox \"9bbc431da149d819d92328e79742144132f840d2eed986434b183242c90bcfa4\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"bdea2aad252497e15369f8434c65d7ddfe02fba079328441bc64e7dacd6672d9\"" Oct 2 20:41:44.186454 env[1465]: time="2023-10-02T20:41:44.186440685Z" level=info msg="StartContainer for \"bdea2aad252497e15369f8434c65d7ddfe02fba079328441bc64e7dacd6672d9\"" Oct 2 20:41:44.191913 env[1465]: time="2023-10-02T20:41:44.191890854Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.0-a-0ae5c90d19,Uid:8bd80e30254a62bf5285de45d8d06f0e,Namespace:kube-system,Attempt:0,} returns sandbox id \"b6321bd8cb84002bacebc764a20e06c61f595a651a74feccbff3d0e47539c09f\"" Oct 2 20:41:44.192426 env[1465]: time="2023-10-02T20:41:44.192409309Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.0-a-0ae5c90d19,Uid:a3160a8940a388c43186675d1dbbff0b,Namespace:kube-system,Attempt:0,} returns sandbox id \"7806dca22ce983e94b12cbd3f81d6410bb3b881d3556c431a6995d3a696d96cc\"" Oct 2 20:41:44.193568 env[1465]: time="2023-10-02T20:41:44.193550071Z" level=info msg="CreateContainer within sandbox \"b6321bd8cb84002bacebc764a20e06c61f595a651a74feccbff3d0e47539c09f\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Oct 2 20:41:44.194262 env[1465]: time="2023-10-02T20:41:44.194246532Z" level=info msg="CreateContainer within sandbox \"7806dca22ce983e94b12cbd3f81d6410bb3b881d3556c431a6995d3a696d96cc\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Oct 2 20:41:44.199241 env[1465]: time="2023-10-02T20:41:44.199189520Z" level=info msg="CreateContainer within sandbox \"b6321bd8cb84002bacebc764a20e06c61f595a651a74feccbff3d0e47539c09f\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"95d8d316a1e4afcb1521760c4b5ba2aa56859b0564f634a6e9d139d460b479b4\"" Oct 2 20:41:44.199488 env[1465]: time="2023-10-02T20:41:44.199445590Z" level=info msg="StartContainer for \"95d8d316a1e4afcb1521760c4b5ba2aa56859b0564f634a6e9d139d460b479b4\"" Oct 2 20:41:44.205226 systemd[1]: Started cri-containerd-bdea2aad252497e15369f8434c65d7ddfe02fba079328441bc64e7dacd6672d9.scope. Oct 2 20:41:44.210000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.210000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.210000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.210000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.210000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.210000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.210000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.210000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.210000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.210000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.210000 audit: BPF prog-id=73 op=LOAD Oct 2 20:41:44.210000 audit[2336]: AVC avc: denied { bpf } for pid=2336 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.210000 audit[2336]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2217 pid=2336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:41:44.210000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264656132616164323532343937653135333639663834333463363564 Oct 2 20:41:44.210000 audit[2336]: AVC avc: denied { perfmon } for pid=2336 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.210000 audit[2336]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2217 pid=2336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:41:44.210000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264656132616164323532343937653135333639663834333463363564 Oct 2 20:41:44.210000 audit[2336]: AVC avc: denied { bpf } for pid=2336 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.210000 audit[2336]: AVC avc: denied { bpf } for pid=2336 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.210000 audit[2336]: AVC avc: denied { bpf } for pid=2336 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.210000 audit[2336]: AVC avc: denied { perfmon } for pid=2336 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.210000 audit[2336]: AVC avc: denied { perfmon } for pid=2336 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.210000 audit[2336]: AVC avc: denied { perfmon } for pid=2336 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.210000 audit[2336]: AVC avc: denied { perfmon } for pid=2336 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.210000 audit[2336]: AVC avc: denied { perfmon } for pid=2336 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.210000 audit[2336]: AVC avc: denied { bpf } for pid=2336 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.210000 audit[2336]: AVC avc: denied { bpf } for pid=2336 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.210000 audit: BPF prog-id=74 op=LOAD Oct 2 20:41:44.210000 audit[2336]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003d20a0 items=0 ppid=2217 pid=2336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:41:44.210000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264656132616164323532343937653135333639663834333463363564 Oct 2 20:41:44.210000 audit[2336]: AVC avc: denied { bpf } for pid=2336 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.210000 audit[2336]: AVC avc: denied { bpf } for pid=2336 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.210000 audit[2336]: AVC avc: denied { perfmon } for pid=2336 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.210000 audit[2336]: AVC avc: denied { perfmon } for pid=2336 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.210000 audit[2336]: AVC avc: denied { perfmon } for pid=2336 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.210000 audit[2336]: AVC avc: denied { perfmon } for pid=2336 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.210000 audit[2336]: AVC avc: denied { perfmon } for pid=2336 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.210000 audit[2336]: AVC avc: denied { bpf } for pid=2336 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.210000 audit[2336]: AVC avc: denied { bpf } for pid=2336 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.210000 audit: BPF prog-id=75 op=LOAD Oct 2 20:41:44.210000 audit[2336]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003d20e8 items=0 ppid=2217 pid=2336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:41:44.210000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264656132616164323532343937653135333639663834333463363564 Oct 2 20:41:44.211000 audit: BPF prog-id=75 op=UNLOAD Oct 2 20:41:44.211000 audit: BPF prog-id=74 op=UNLOAD Oct 2 20:41:44.211000 audit[2336]: AVC avc: denied { bpf } for pid=2336 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.211000 audit[2336]: AVC avc: denied { bpf } for pid=2336 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.211000 audit[2336]: AVC avc: denied { bpf } for pid=2336 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.211000 audit[2336]: AVC avc: denied { perfmon } for pid=2336 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.211000 audit[2336]: AVC avc: denied { perfmon } for pid=2336 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.211000 audit[2336]: AVC avc: denied { perfmon } for pid=2336 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.211000 audit[2336]: AVC avc: denied { perfmon } for pid=2336 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.211000 audit[2336]: AVC avc: denied { perfmon } for pid=2336 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.211000 audit[2336]: AVC avc: denied { bpf } for pid=2336 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.211000 audit[2336]: AVC avc: denied { bpf } for pid=2336 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.211000 audit: BPF prog-id=76 op=LOAD Oct 2 20:41:44.211000 audit[2336]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003d24f8 items=0 ppid=2217 pid=2336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:41:44.211000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264656132616164323532343937653135333639663834333463363564 Oct 2 20:41:44.216960 env[1465]: time="2023-10-02T20:41:44.216934523Z" level=info msg="CreateContainer within sandbox \"7806dca22ce983e94b12cbd3f81d6410bb3b881d3556c431a6995d3a696d96cc\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"a502dae05ee4d8ecb414fbd8a857fe543510dc977c4c06db98c1d68d983a776d\"" Oct 2 20:41:44.217246 env[1465]: time="2023-10-02T20:41:44.217230954Z" level=info msg="StartContainer for \"a502dae05ee4d8ecb414fbd8a857fe543510dc977c4c06db98c1d68d983a776d\"" Oct 2 20:41:44.219226 systemd[1]: Started cri-containerd-95d8d316a1e4afcb1521760c4b5ba2aa56859b0564f634a6e9d139d460b479b4.scope. Oct 2 20:41:44.224000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.224000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.224000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.224000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.224000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.224000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.224000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.224000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.224000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.224000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.224000 audit: BPF prog-id=77 op=LOAD Oct 2 20:41:44.224000 audit[2354]: AVC avc: denied { bpf } for pid=2354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.224000 audit[2354]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2249 pid=2354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:41:44.224000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3935643864333136613165346166636231353231373630633462356261 Oct 2 20:41:44.224000 audit[2354]: AVC avc: denied { perfmon } for pid=2354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.224000 audit[2354]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2249 pid=2354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:41:44.224000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3935643864333136613165346166636231353231373630633462356261 Oct 2 20:41:44.224000 audit[2354]: AVC avc: denied { bpf } for pid=2354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.224000 audit[2354]: AVC avc: denied { bpf } for pid=2354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.224000 audit[2354]: AVC avc: denied { bpf } for pid=2354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.224000 audit[2354]: AVC avc: denied { perfmon } for pid=2354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.224000 audit[2354]: AVC avc: denied { perfmon } for pid=2354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.224000 audit[2354]: AVC avc: denied { perfmon } for pid=2354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.224000 audit[2354]: AVC avc: denied { perfmon } for pid=2354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.224000 audit[2354]: AVC avc: denied { perfmon } for pid=2354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.224000 audit[2354]: AVC avc: denied { bpf } for pid=2354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.224000 audit[2354]: AVC avc: denied { bpf } for pid=2354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.224000 audit: BPF prog-id=78 op=LOAD Oct 2 20:41:44.224000 audit[2354]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003e6120 items=0 ppid=2249 pid=2354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:41:44.224000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3935643864333136613165346166636231353231373630633462356261 Oct 2 20:41:44.224000 audit[2354]: AVC avc: denied { bpf } for pid=2354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.224000 audit[2354]: AVC avc: denied { bpf } for pid=2354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.224000 audit[2354]: AVC avc: denied { perfmon } for pid=2354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.224000 audit[2354]: AVC avc: denied { perfmon } for pid=2354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.224000 audit[2354]: AVC avc: denied { perfmon } for pid=2354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.224000 audit[2354]: AVC avc: denied { perfmon } for pid=2354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.224000 audit[2354]: AVC avc: denied { perfmon } for pid=2354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.224000 audit[2354]: AVC avc: denied { bpf } for pid=2354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.224000 audit[2354]: AVC avc: denied { bpf } for pid=2354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.224000 audit: BPF prog-id=79 op=LOAD Oct 2 20:41:44.224000 audit[2354]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003e6168 items=0 ppid=2249 pid=2354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:41:44.224000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3935643864333136613165346166636231353231373630633462356261 Oct 2 20:41:44.224000 audit: BPF prog-id=79 op=UNLOAD Oct 2 20:41:44.224000 audit: BPF prog-id=78 op=UNLOAD Oct 2 20:41:44.224000 audit[2354]: AVC avc: denied { bpf } for pid=2354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.224000 audit[2354]: AVC avc: denied { bpf } for pid=2354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.224000 audit[2354]: AVC avc: denied { bpf } for pid=2354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.224000 audit[2354]: AVC avc: denied { perfmon } for pid=2354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.224000 audit[2354]: AVC avc: denied { perfmon } for pid=2354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.224000 audit[2354]: AVC avc: denied { perfmon } for pid=2354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.224000 audit[2354]: AVC avc: denied { perfmon } for pid=2354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.224000 audit[2354]: AVC avc: denied { perfmon } for pid=2354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.224000 audit[2354]: AVC avc: denied { bpf } for pid=2354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.224000 audit[2354]: AVC avc: denied { bpf } for pid=2354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.224000 audit: BPF prog-id=80 op=LOAD Oct 2 20:41:44.224000 audit[2354]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003e6578 items=0 ppid=2249 pid=2354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:41:44.224000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3935643864333136613165346166636231353231373630633462356261 Oct 2 20:41:44.229776 env[1465]: time="2023-10-02T20:41:44.229754584Z" level=info msg="StartContainer for \"bdea2aad252497e15369f8434c65d7ddfe02fba079328441bc64e7dacd6672d9\" returns successfully" Oct 2 20:41:44.236209 systemd[1]: Started cri-containerd-a502dae05ee4d8ecb414fbd8a857fe543510dc977c4c06db98c1d68d983a776d.scope. Oct 2 20:41:44.243879 env[1465]: time="2023-10-02T20:41:44.243854218Z" level=info msg="StartContainer for \"95d8d316a1e4afcb1521760c4b5ba2aa56859b0564f634a6e9d139d460b479b4\" returns successfully" Oct 2 20:41:44.243000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.243000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.243000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.243000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.243000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.243000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.243000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.243000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.243000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.243000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.243000 audit: BPF prog-id=81 op=LOAD Oct 2 20:41:44.243000 audit[2381]: AVC avc: denied { bpf } for pid=2381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.243000 audit[2381]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2240 pid=2381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:41:44.243000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135303264616530356565346438656362343134666264386138353766 Oct 2 20:41:44.243000 audit[2381]: AVC avc: denied { perfmon } for pid=2381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.243000 audit[2381]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2240 pid=2381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:41:44.243000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135303264616530356565346438656362343134666264386138353766 Oct 2 20:41:44.243000 audit[2381]: AVC avc: denied { bpf } for pid=2381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.243000 audit[2381]: AVC avc: denied { bpf } for pid=2381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.243000 audit[2381]: AVC avc: denied { bpf } for pid=2381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.243000 audit[2381]: AVC avc: denied { perfmon } for pid=2381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.243000 audit[2381]: AVC avc: denied { perfmon } for pid=2381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.243000 audit[2381]: AVC avc: denied { perfmon } for pid=2381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.243000 audit[2381]: AVC avc: denied { perfmon } for pid=2381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.243000 audit[2381]: AVC avc: denied { perfmon } for pid=2381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.243000 audit[2381]: AVC avc: denied { bpf } for pid=2381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.243000 audit[2381]: AVC avc: denied { bpf } for pid=2381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.243000 audit: BPF prog-id=82 op=LOAD Oct 2 20:41:44.243000 audit[2381]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0002907e0 items=0 ppid=2240 pid=2381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:41:44.243000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135303264616530356565346438656362343134666264386138353766 Oct 2 20:41:44.243000 audit[2381]: AVC avc: denied { bpf } for pid=2381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.243000 audit[2381]: AVC avc: denied { bpf } for pid=2381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.243000 audit[2381]: AVC avc: denied { perfmon } for pid=2381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.243000 audit[2381]: AVC avc: denied { perfmon } for pid=2381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.243000 audit[2381]: AVC avc: denied { perfmon } for pid=2381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.243000 audit[2381]: AVC avc: denied { perfmon } for pid=2381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.243000 audit[2381]: AVC avc: denied { perfmon } for pid=2381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.243000 audit[2381]: AVC avc: denied { bpf } for pid=2381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.243000 audit[2381]: AVC avc: denied { bpf } for pid=2381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.243000 audit: BPF prog-id=83 op=LOAD Oct 2 20:41:44.243000 audit[2381]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000290828 items=0 ppid=2240 pid=2381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:41:44.243000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135303264616530356565346438656362343134666264386138353766 Oct 2 20:41:44.243000 audit: BPF prog-id=83 op=UNLOAD Oct 2 20:41:44.243000 audit: BPF prog-id=82 op=UNLOAD Oct 2 20:41:44.243000 audit[2381]: AVC avc: denied { bpf } for pid=2381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.243000 audit[2381]: AVC avc: denied { bpf } for pid=2381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.243000 audit[2381]: AVC avc: denied { bpf } for pid=2381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.243000 audit[2381]: AVC avc: denied { perfmon } for pid=2381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.243000 audit[2381]: AVC avc: denied { perfmon } for pid=2381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.243000 audit[2381]: AVC avc: denied { perfmon } for pid=2381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.243000 audit[2381]: AVC avc: denied { perfmon } for pid=2381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.243000 audit[2381]: AVC avc: denied { perfmon } for pid=2381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.243000 audit[2381]: AVC avc: denied { bpf } for pid=2381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.243000 audit[2381]: AVC avc: denied { bpf } for pid=2381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:44.243000 audit: BPF prog-id=84 op=LOAD Oct 2 20:41:44.243000 audit[2381]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000290c38 items=0 ppid=2240 pid=2381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:41:44.243000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135303264616530356565346438656362343134666264386138353766 Oct 2 20:41:44.262554 env[1465]: time="2023-10-02T20:41:44.262529925Z" level=info msg="StartContainer for \"a502dae05ee4d8ecb414fbd8a857fe543510dc977c4c06db98c1d68d983a776d\" returns successfully" Oct 2 20:41:44.766000 audit[2365]: AVC avc: denied { watch } for pid=2365 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521016 scontext=system_u:system_r:svirt_lxc_net_t:s0:c425,c522 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:41:44.766000 audit[2365]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0004120c0 a2=fc6 a3=0 items=0 ppid=2217 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c425,c522 key=(null) Oct 2 20:41:44.766000 audit[2365]: AVC avc: denied { watch } for pid=2365 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c425,c522 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:41:44.766000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:41:44.766000 audit[2365]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000338780 a2=fc6 a3=0 items=0 ppid=2217 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c425,c522 key=(null) Oct 2 20:41:44.766000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:41:44.977000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521016 scontext=system_u:system_r:svirt_lxc_net_t:s0:c78,c1001 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:41:44.977000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=3e a1=c0044ac030 a2=fc6 a3=0 items=0 ppid=2240 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c78,c1001 key=(null) Oct 2 20:41:44.977000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313331002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Oct 2 20:41:44.977000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c78,c1001 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:41:44.977000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=3f a1=c0020800a0 a2=fc6 a3=0 items=0 ppid=2240 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c78,c1001 key=(null) Oct 2 20:41:44.977000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313331002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Oct 2 20:41:44.977000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=521012 scontext=system_u:system_r:svirt_lxc_net_t:s0:c78,c1001 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:41:44.977000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=3e a1=c004522060 a2=fc6 a3=0 items=0 ppid=2240 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c78,c1001 key=(null) Oct 2 20:41:44.977000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313331002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Oct 2 20:41:44.987000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=521018 scontext=system_u:system_r:svirt_lxc_net_t:s0:c78,c1001 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:41:44.987000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c78,c1001 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:41:44.987000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=54 a1=c002913a80 a2=fc6 a3=0 items=0 ppid=2240 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c78,c1001 key=(null) Oct 2 20:41:44.987000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313331002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Oct 2 20:41:44.987000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521016 scontext=system_u:system_r:svirt_lxc_net_t:s0:c78,c1001 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:41:44.987000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c000e5cff0 a2=fc6 a3=0 items=0 ppid=2240 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c78,c1001 key=(null) Oct 2 20:41:44.987000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313331002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Oct 2 20:41:44.987000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=46 a1=c00083a030 a2=fc6 a3=0 items=0 ppid=2240 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c78,c1001 key=(null) Oct 2 20:41:44.987000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313331002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Oct 2 20:41:45.047893 kubelet[2168]: E1002 20:41:45.047764 2168 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510.3.0-a-0ae5c90d19.178a6509ccd2d861", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510.3.0-a-0ae5c90d19", UID:"ci-3510.3.0-a-0ae5c90d19", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.0-a-0ae5c90d19"}, FirstTimestamp:time.Date(2023, time.October, 2, 20, 41, 42, 423894113, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 20, 41, 42, 423894113, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Oct 2 20:41:45.104725 kubelet[2168]: E1002 20:41:45.104660 2168 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510.3.0-a-0ae5c90d19.178a6509ccd682e7", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510.3.0-a-0ae5c90d19", UID:"ci-3510.3.0-a-0ae5c90d19", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"InvalidDiskCapacity", Message:"invalid capacity 0 on image filesystem", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.0-a-0ae5c90d19"}, FirstTimestamp:time.Date(2023, time.October, 2, 20, 41, 42, 424134375, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 20, 41, 42, 424134375, time.Local), Count:1, Type:"Warning", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Oct 2 20:41:45.337357 kubelet[2168]: E1002 20:41:45.337211 2168 csi_plugin.go:295] Failed to initialize CSINode: error updating CSINode annotation: timed out waiting for the condition; caused by: nodes "ci-3510.3.0-a-0ae5c90d19" not found Oct 2 20:41:45.437803 kubelet[2168]: E1002 20:41:45.437744 2168 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"ci-3510.3.0-a-0ae5c90d19\" not found" node="ci-3510.3.0-a-0ae5c90d19" Oct 2 20:41:45.594673 kubelet[2168]: I1002 20:41:45.594515 2168 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.0-a-0ae5c90d19" Oct 2 20:41:45.601707 kubelet[2168]: I1002 20:41:45.601657 2168 kubelet_node_status.go:73] "Successfully registered node" node="ci-3510.3.0-a-0ae5c90d19" Oct 2 20:41:46.315019 kubelet[2168]: W1002 20:41:46.314959 2168 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Oct 2 20:41:46.425389 kubelet[2168]: I1002 20:41:46.425302 2168 apiserver.go:52] "Watching apiserver" Oct 2 20:41:46.525970 kubelet[2168]: I1002 20:41:46.525910 2168 desired_state_of_world_populator.go:153] "Finished populating initial desired state of world" Oct 2 20:41:46.550060 kubelet[2168]: I1002 20:41:46.549978 2168 reconciler.go:41] "Reconciler: start to sync state" Oct 2 20:41:48.142126 systemd[1]: Reloading. Oct 2 20:41:48.179136 /usr/lib/systemd/system-generators/torcx-generator[2500]: time="2023-10-02T20:41:48Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.0 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.0 /var/lib/torcx/store]" Oct 2 20:41:48.179157 /usr/lib/systemd/system-generators/torcx-generator[2500]: time="2023-10-02T20:41:48Z" level=info msg="torcx already run" Oct 2 20:41:48.235109 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 2 20:41:48.235118 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 2 20:41:48.248535 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 2 20:41:48.299000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.299000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.299000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.299000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.299000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.299000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.299000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.299000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.299000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.299000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.299000 audit: BPF prog-id=85 op=LOAD Oct 2 20:41:48.299000 audit: BPF prog-id=81 op=UNLOAD Oct 2 20:41:48.300000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.300000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.300000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.300000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.300000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.300000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.300000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.300000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.300000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.300000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.300000 audit: BPF prog-id=86 op=LOAD Oct 2 20:41:48.300000 audit: BPF prog-id=46 op=UNLOAD Oct 2 20:41:48.300000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.300000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.300000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.300000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.300000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.300000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.300000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.300000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.300000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.300000 audit: BPF prog-id=87 op=LOAD Oct 2 20:41:48.300000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.300000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.300000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.300000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.300000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.300000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.300000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.300000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.300000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.300000 audit: BPF prog-id=88 op=LOAD Oct 2 20:41:48.300000 audit: BPF prog-id=47 op=UNLOAD Oct 2 20:41:48.300000 audit: BPF prog-id=48 op=UNLOAD Oct 2 20:41:48.301000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.301000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.301000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.301000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.301000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.301000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.301000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.301000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.301000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.301000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.301000 audit: BPF prog-id=89 op=LOAD Oct 2 20:41:48.301000 audit: BPF prog-id=73 op=UNLOAD Oct 2 20:41:48.301000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.301000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.301000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.301000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.301000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.301000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.301000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.301000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.301000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.301000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.301000 audit: BPF prog-id=90 op=LOAD Oct 2 20:41:48.301000 audit: BPF prog-id=68 op=UNLOAD Oct 2 20:41:48.302000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.302000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.302000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.302000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.302000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.302000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.302000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.302000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.302000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.302000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.302000 audit: BPF prog-id=91 op=LOAD Oct 2 20:41:48.302000 audit: BPF prog-id=49 op=UNLOAD Oct 2 20:41:48.302000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.302000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.302000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.302000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.302000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.302000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.302000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.302000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.302000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.303000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.303000 audit: BPF prog-id=92 op=LOAD Oct 2 20:41:48.303000 audit: BPF prog-id=50 op=UNLOAD Oct 2 20:41:48.303000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.303000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.303000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.303000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.303000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.303000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.303000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.303000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.303000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.303000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.303000 audit: BPF prog-id=93 op=LOAD Oct 2 20:41:48.303000 audit: BPF prog-id=63 op=UNLOAD Oct 2 20:41:48.303000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.303000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.303000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.303000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.303000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.303000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.303000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.303000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.303000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.303000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.303000 audit: BPF prog-id=94 op=LOAD Oct 2 20:41:48.303000 audit: BPF prog-id=51 op=UNLOAD Oct 2 20:41:48.303000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.303000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.303000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.303000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.303000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.303000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.303000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.303000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.304000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.304000 audit: BPF prog-id=95 op=LOAD Oct 2 20:41:48.304000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.304000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.304000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.304000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.304000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.304000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.304000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.304000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.304000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.304000 audit: BPF prog-id=96 op=LOAD Oct 2 20:41:48.304000 audit: BPF prog-id=52 op=UNLOAD Oct 2 20:41:48.304000 audit: BPF prog-id=53 op=UNLOAD Oct 2 20:41:48.304000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.304000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.304000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.304000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.304000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.304000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.304000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.304000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.304000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.304000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.304000 audit: BPF prog-id=97 op=LOAD Oct 2 20:41:48.304000 audit: BPF prog-id=54 op=UNLOAD Oct 2 20:41:48.304000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.304000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.304000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.304000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.304000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.304000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.304000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.304000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.304000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.304000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.304000 audit: BPF prog-id=98 op=LOAD Oct 2 20:41:48.304000 audit: BPF prog-id=77 op=UNLOAD Oct 2 20:41:48.305000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.305000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.305000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.305000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.305000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.305000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.305000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.305000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.305000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.305000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.305000 audit: BPF prog-id=99 op=LOAD Oct 2 20:41:48.305000 audit: BPF prog-id=61 op=UNLOAD Oct 2 20:41:48.305000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.305000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.305000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.305000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.305000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.305000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.305000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.305000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.305000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.305000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.305000 audit: BPF prog-id=100 op=LOAD Oct 2 20:41:48.305000 audit: BPF prog-id=55 op=UNLOAD Oct 2 20:41:48.305000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.305000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.305000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.305000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.305000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.305000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.305000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.305000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.306000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.306000 audit: BPF prog-id=101 op=LOAD Oct 2 20:41:48.306000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.306000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.306000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.306000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.306000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.306000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.306000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.306000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.306000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.306000 audit: BPF prog-id=102 op=LOAD Oct 2 20:41:48.306000 audit: BPF prog-id=56 op=UNLOAD Oct 2 20:41:48.306000 audit: BPF prog-id=57 op=UNLOAD Oct 2 20:41:48.306000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.306000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.306000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.306000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.306000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.306000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.306000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.306000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.306000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.306000 audit: BPF prog-id=103 op=LOAD Oct 2 20:41:48.306000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.306000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.306000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.306000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.306000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.306000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.306000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.306000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.306000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.306000 audit: BPF prog-id=104 op=LOAD Oct 2 20:41:48.306000 audit: BPF prog-id=58 op=UNLOAD Oct 2 20:41:48.306000 audit: BPF prog-id=59 op=UNLOAD Oct 2 20:41:48.307000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.307000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.307000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.307000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.307000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.307000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.307000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.307000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.307000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.308000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.308000 audit: BPF prog-id=105 op=LOAD Oct 2 20:41:48.308000 audit: BPF prog-id=60 op=UNLOAD Oct 2 20:41:48.314676 systemd[1]: Stopping kubelet.service... Oct 2 20:41:48.314772 kubelet[2168]: I1002 20:41:48.314680 2168 dynamic_cafile_content.go:171] "Shutting down controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Oct 2 20:41:48.334543 systemd[1]: kubelet.service: Deactivated successfully. Oct 2 20:41:48.334647 systemd[1]: Stopped kubelet.service. Oct 2 20:41:48.334000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:41:48.335597 systemd[1]: Started kubelet.service. Oct 2 20:41:48.335000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:41:48.359971 kubelet[2560]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Oct 2 20:41:48.359971 kubelet[2560]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Oct 2 20:41:48.359971 kubelet[2560]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Oct 2 20:41:48.359971 kubelet[2560]: I1002 20:41:48.359956 2560 server.go:199] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Oct 2 20:41:48.362407 kubelet[2560]: I1002 20:41:48.362371 2560 server.go:415] "Kubelet version" kubeletVersion="v1.27.2" Oct 2 20:41:48.362407 kubelet[2560]: I1002 20:41:48.362380 2560 server.go:417] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Oct 2 20:41:48.362511 kubelet[2560]: I1002 20:41:48.362475 2560 server.go:837] "Client rotation is on, will bootstrap in background" Oct 2 20:41:48.363378 kubelet[2560]: I1002 20:41:48.363316 2560 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Oct 2 20:41:48.363895 kubelet[2560]: I1002 20:41:48.363858 2560 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Oct 2 20:41:48.381623 kubelet[2560]: I1002 20:41:48.381596 2560 server.go:662] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Oct 2 20:41:48.381932 kubelet[2560]: I1002 20:41:48.381921 2560 container_manager_linux.go:266] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Oct 2 20:41:48.382063 kubelet[2560]: I1002 20:41:48.382054 2560 container_manager_linux.go:271] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:} {Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:} {Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:} {Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] TopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] PodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms TopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]} Oct 2 20:41:48.382182 kubelet[2560]: I1002 20:41:48.382172 2560 topology_manager.go:136] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Oct 2 20:41:48.382276 kubelet[2560]: I1002 20:41:48.382265 2560 container_manager_linux.go:302] "Creating device plugin manager" Oct 2 20:41:48.382361 kubelet[2560]: I1002 20:41:48.382352 2560 state_mem.go:36] "Initialized new in-memory state store" Oct 2 20:41:48.384397 kubelet[2560]: I1002 20:41:48.384382 2560 kubelet.go:405] "Attempting to sync node with API server" Oct 2 20:41:48.384397 kubelet[2560]: I1002 20:41:48.384402 2560 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Oct 2 20:41:48.384517 kubelet[2560]: I1002 20:41:48.384413 2560 kubelet.go:309] "Adding apiserver pod source" Oct 2 20:41:48.384517 kubelet[2560]: I1002 20:41:48.384422 2560 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Oct 2 20:41:48.384705 kubelet[2560]: I1002 20:41:48.384696 2560 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Oct 2 20:41:48.384980 kubelet[2560]: I1002 20:41:48.384973 2560 server.go:1168] "Started kubelet" Oct 2 20:41:48.385022 kubelet[2560]: I1002 20:41:48.385011 2560 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Oct 2 20:41:48.385334 kubelet[2560]: I1002 20:41:48.385320 2560 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Oct 2 20:41:48.386102 kubelet[2560]: E1002 20:41:48.386074 2560 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Oct 2 20:41:48.386184 kubelet[2560]: E1002 20:41:48.386112 2560 kubelet.go:1400] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Oct 2 20:41:48.388500 kubelet[2560]: I1002 20:41:48.388489 2560 server.go:461] "Adding debug handlers to kubelet server" Oct 2 20:41:48.388000 audit[2560]: AVC avc: denied { mac_admin } for pid=2560 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.388000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 20:41:48.388000 audit[2560]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0005d0840 a1=c00005d6e0 a2=c0005d0810 a3=25 items=0 ppid=1 pid=2560 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:41:48.388000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 20:41:48.388000 audit[2560]: AVC avc: denied { mac_admin } for pid=2560 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.388000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 20:41:48.388000 audit[2560]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0005b23a0 a1=c00005d6f8 a2=c0005d08d0 a3=25 items=0 ppid=1 pid=2560 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:41:48.388000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 20:41:48.388980 kubelet[2560]: I1002 20:41:48.388654 2560 kubelet.go:1355] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Oct 2 20:41:48.388980 kubelet[2560]: I1002 20:41:48.388682 2560 kubelet.go:1359] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Oct 2 20:41:48.388980 kubelet[2560]: I1002 20:41:48.388702 2560 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Oct 2 20:41:48.388980 kubelet[2560]: I1002 20:41:48.388750 2560 volume_manager.go:284] "Starting Kubelet Volume Manager" Oct 2 20:41:48.388980 kubelet[2560]: I1002 20:41:48.388766 2560 desired_state_of_world_populator.go:145] "Desired state populator starts to run" Oct 2 20:41:48.394435 kubelet[2560]: I1002 20:41:48.394387 2560 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Oct 2 20:41:48.395049 kubelet[2560]: I1002 20:41:48.395038 2560 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Oct 2 20:41:48.395114 kubelet[2560]: I1002 20:41:48.395052 2560 status_manager.go:207] "Starting to sync pod status with apiserver" Oct 2 20:41:48.395114 kubelet[2560]: I1002 20:41:48.395067 2560 kubelet.go:2257] "Starting kubelet main sync loop" Oct 2 20:41:48.395114 kubelet[2560]: E1002 20:41:48.395105 2560 kubelet.go:2281] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Oct 2 20:41:48.408321 kubelet[2560]: I1002 20:41:48.408302 2560 cpu_manager.go:214] "Starting CPU manager" policy="none" Oct 2 20:41:48.408321 kubelet[2560]: I1002 20:41:48.408317 2560 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Oct 2 20:41:48.408321 kubelet[2560]: I1002 20:41:48.408327 2560 state_mem.go:36] "Initialized new in-memory state store" Oct 2 20:41:48.408433 kubelet[2560]: I1002 20:41:48.408411 2560 state_mem.go:88] "Updated default CPUSet" cpuSet="" Oct 2 20:41:48.408433 kubelet[2560]: I1002 20:41:48.408420 2560 state_mem.go:96] "Updated CPUSet assignments" assignments=map[] Oct 2 20:41:48.408433 kubelet[2560]: I1002 20:41:48.408423 2560 policy_none.go:49] "None policy: Start" Oct 2 20:41:48.408692 kubelet[2560]: I1002 20:41:48.408683 2560 memory_manager.go:169] "Starting memorymanager" policy="None" Oct 2 20:41:48.408731 kubelet[2560]: I1002 20:41:48.408696 2560 state_mem.go:35] "Initializing new in-memory state store" Oct 2 20:41:48.408807 kubelet[2560]: I1002 20:41:48.408767 2560 state_mem.go:75] "Updated machine memory state" Oct 2 20:41:48.410000 audit[2560]: AVC avc: denied { mac_admin } for pid=2560 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:41:48.410000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 20:41:48.410000 audit[2560]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c001085380 a1=c00091c048 a2=c001085350 a3=25 items=0 ppid=1 pid=2560 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:41:48.410000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 20:41:48.410735 kubelet[2560]: I1002 20:41:48.410546 2560 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Oct 2 20:41:48.410735 kubelet[2560]: I1002 20:41:48.410573 2560 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Oct 2 20:41:48.410862 kubelet[2560]: I1002 20:41:48.410853 2560 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Oct 2 20:41:48.493303 kubelet[2560]: I1002 20:41:48.493232 2560 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.0-a-0ae5c90d19" Oct 2 20:41:48.495612 kubelet[2560]: I1002 20:41:48.495542 2560 topology_manager.go:212] "Topology Admit Handler" Oct 2 20:41:48.495740 kubelet[2560]: I1002 20:41:48.495657 2560 topology_manager.go:212] "Topology Admit Handler" Oct 2 20:41:48.495740 kubelet[2560]: I1002 20:41:48.495721 2560 topology_manager.go:212] "Topology Admit Handler" Oct 2 20:41:48.502231 kubelet[2560]: W1002 20:41:48.502191 2560 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Oct 2 20:41:48.502556 kubelet[2560]: W1002 20:41:48.502479 2560 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Oct 2 20:41:48.503664 kubelet[2560]: W1002 20:41:48.503588 2560 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Oct 2 20:41:48.503857 kubelet[2560]: E1002 20:41:48.503736 2560 kubelet.go:1856] "Failed creating a mirror pod for" err="pods \"kube-controller-manager-ci-3510.3.0-a-0ae5c90d19\" already exists" pod="kube-system/kube-controller-manager-ci-3510.3.0-a-0ae5c90d19" Oct 2 20:41:48.503857 kubelet[2560]: I1002 20:41:48.503757 2560 kubelet_node_status.go:108] "Node was previously registered" node="ci-3510.3.0-a-0ae5c90d19" Oct 2 20:41:48.504067 kubelet[2560]: I1002 20:41:48.503906 2560 kubelet_node_status.go:73] "Successfully registered node" node="ci-3510.3.0-a-0ae5c90d19" Oct 2 20:41:48.589701 kubelet[2560]: I1002 20:41:48.589675 2560 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/8bd80e30254a62bf5285de45d8d06f0e-kubeconfig\") pod \"kube-scheduler-ci-3510.3.0-a-0ae5c90d19\" (UID: \"8bd80e30254a62bf5285de45d8d06f0e\") " pod="kube-system/kube-scheduler-ci-3510.3.0-a-0ae5c90d19" Oct 2 20:41:48.589832 kubelet[2560]: I1002 20:41:48.589718 2560 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/a3160a8940a388c43186675d1dbbff0b-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.0-a-0ae5c90d19\" (UID: \"a3160a8940a388c43186675d1dbbff0b\") " pod="kube-system/kube-apiserver-ci-3510.3.0-a-0ae5c90d19" Oct 2 20:41:48.589832 kubelet[2560]: I1002 20:41:48.589746 2560 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/a3160a8940a388c43186675d1dbbff0b-k8s-certs\") pod \"kube-apiserver-ci-3510.3.0-a-0ae5c90d19\" (UID: \"a3160a8940a388c43186675d1dbbff0b\") " pod="kube-system/kube-apiserver-ci-3510.3.0-a-0ae5c90d19" Oct 2 20:41:48.589832 kubelet[2560]: I1002 20:41:48.589774 2560 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/d45c7ec0b5998ba9ed58342d7ec412e5-ca-certs\") pod \"kube-controller-manager-ci-3510.3.0-a-0ae5c90d19\" (UID: \"d45c7ec0b5998ba9ed58342d7ec412e5\") " pod="kube-system/kube-controller-manager-ci-3510.3.0-a-0ae5c90d19" Oct 2 20:41:48.589832 kubelet[2560]: I1002 20:41:48.589804 2560 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/d45c7ec0b5998ba9ed58342d7ec412e5-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.0-a-0ae5c90d19\" (UID: \"d45c7ec0b5998ba9ed58342d7ec412e5\") " pod="kube-system/kube-controller-manager-ci-3510.3.0-a-0ae5c90d19" Oct 2 20:41:48.590007 kubelet[2560]: I1002 20:41:48.589838 2560 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/d45c7ec0b5998ba9ed58342d7ec412e5-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.0-a-0ae5c90d19\" (UID: \"d45c7ec0b5998ba9ed58342d7ec412e5\") " pod="kube-system/kube-controller-manager-ci-3510.3.0-a-0ae5c90d19" Oct 2 20:41:48.590007 kubelet[2560]: I1002 20:41:48.589870 2560 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/d45c7ec0b5998ba9ed58342d7ec412e5-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.0-a-0ae5c90d19\" (UID: \"d45c7ec0b5998ba9ed58342d7ec412e5\") " pod="kube-system/kube-controller-manager-ci-3510.3.0-a-0ae5c90d19" Oct 2 20:41:48.590007 kubelet[2560]: I1002 20:41:48.589909 2560 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/d45c7ec0b5998ba9ed58342d7ec412e5-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.0-a-0ae5c90d19\" (UID: \"d45c7ec0b5998ba9ed58342d7ec412e5\") " pod="kube-system/kube-controller-manager-ci-3510.3.0-a-0ae5c90d19" Oct 2 20:41:48.590007 kubelet[2560]: I1002 20:41:48.589948 2560 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/a3160a8940a388c43186675d1dbbff0b-ca-certs\") pod \"kube-apiserver-ci-3510.3.0-a-0ae5c90d19\" (UID: \"a3160a8940a388c43186675d1dbbff0b\") " pod="kube-system/kube-apiserver-ci-3510.3.0-a-0ae5c90d19" Oct 2 20:41:49.385583 kubelet[2560]: I1002 20:41:49.385509 2560 apiserver.go:52] "Watching apiserver" Oct 2 20:41:49.389257 kubelet[2560]: I1002 20:41:49.389201 2560 desired_state_of_world_populator.go:153] "Finished populating initial desired state of world" Oct 2 20:41:49.395075 kubelet[2560]: I1002 20:41:49.395017 2560 reconciler.go:41] "Reconciler: start to sync state" Oct 2 20:41:49.405090 kubelet[2560]: W1002 20:41:49.405024 2560 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Oct 2 20:41:49.405229 kubelet[2560]: E1002 20:41:49.405107 2560 kubelet.go:1856] "Failed creating a mirror pod for" err="pods \"kube-apiserver-ci-3510.3.0-a-0ae5c90d19\" already exists" pod="kube-system/kube-apiserver-ci-3510.3.0-a-0ae5c90d19" Oct 2 20:41:49.406018 kubelet[2560]: W1002 20:41:49.405992 2560 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Oct 2 20:41:49.406157 kubelet[2560]: E1002 20:41:49.406077 2560 kubelet.go:1856] "Failed creating a mirror pod for" err="pods \"kube-controller-manager-ci-3510.3.0-a-0ae5c90d19\" already exists" pod="kube-system/kube-controller-manager-ci-3510.3.0-a-0ae5c90d19" Oct 2 20:41:49.433173 kubelet[2560]: I1002 20:41:49.433141 2560 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-controller-manager-ci-3510.3.0-a-0ae5c90d19" podStartSLOduration=3.433078361 podCreationTimestamp="2023-10-02 20:41:46 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 20:41:49.43305193 +0000 UTC m=+1.095770717" watchObservedRunningTime="2023-10-02 20:41:49.433078361 +0000 UTC m=+1.095797137" Oct 2 20:41:49.446222 kubelet[2560]: I1002 20:41:49.446199 2560 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-apiserver-ci-3510.3.0-a-0ae5c90d19" podStartSLOduration=1.4461687730000001 podCreationTimestamp="2023-10-02 20:41:48 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 20:41:49.44103841 +0000 UTC m=+1.103757176" watchObservedRunningTime="2023-10-02 20:41:49.446168773 +0000 UTC m=+1.108887536" Oct 2 20:41:49.446382 kubelet[2560]: I1002 20:41:49.446292 2560 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-scheduler-ci-3510.3.0-a-0ae5c90d19" podStartSLOduration=1.446276557 podCreationTimestamp="2023-10-02 20:41:48 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 20:41:49.446153802 +0000 UTC m=+1.108872571" watchObservedRunningTime="2023-10-02 20:41:49.446276557 +0000 UTC m=+1.108995315" Oct 2 20:41:52.481523 sudo[1622]: pam_unix(sudo:session): session closed for user root Oct 2 20:41:52.481000 audit[1622]: USER_END pid=1622 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 20:41:52.482248 sshd[1619]: pam_unix(sshd:session): session closed for user core Oct 2 20:41:52.483660 systemd[1]: sshd@6-139.178.89.131:22-139.178.89.65:43438.service: Deactivated successfully. Oct 2 20:41:52.484064 systemd[1]: session-9.scope: Deactivated successfully. Oct 2 20:41:52.484140 systemd[1]: session-9.scope: Consumed 2.946s CPU time. Oct 2 20:41:52.484402 systemd-logind[1455]: Session 9 logged out. Waiting for processes to exit. Oct 2 20:41:52.484933 systemd-logind[1455]: Removed session 9. Oct 2 20:41:52.507742 kernel: kauditd_printk_skb: 618 callbacks suppressed Oct 2 20:41:52.507774 kernel: audit: type=1106 audit(1696279312.481:933): pid=1622 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 20:41:52.481000 audit[1622]: CRED_DISP pid=1622 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 20:41:52.677151 kernel: audit: type=1104 audit(1696279312.481:934): pid=1622 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 20:41:52.677176 kernel: audit: type=1106 audit(1696279312.482:935): pid=1619 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 20:41:52.482000 audit[1619]: USER_END pid=1619 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 20:41:52.769785 kernel: audit: type=1104 audit(1696279312.482:936): pid=1619 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 20:41:52.482000 audit[1619]: CRED_DISP pid=1619 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 20:41:52.857204 kernel: audit: type=1131 audit(1696279312.483:937): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-139.178.89.131:22-139.178.89.65:43438 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:41:52.483000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-139.178.89.131:22-139.178.89.65:43438 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:42:00.577000 audit[2365]: AVC avc: denied { watch } for pid=2365 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c425,c522 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:42:00.577000 audit[2365]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0011aaf80 a2=fc6 a3=0 items=0 ppid=2217 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c425,c522 key=(null) Oct 2 20:42:00.783865 kernel: audit: type=1400 audit(1696279320.577:938): avc: denied { watch } for pid=2365 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c425,c522 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:42:00.783918 kernel: audit: type=1300 audit(1696279320.577:938): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0011aaf80 a2=fc6 a3=0 items=0 ppid=2217 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c425,c522 key=(null) Oct 2 20:42:00.783937 kernel: audit: type=1327 audit(1696279320.577:938): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:42:00.577000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:42:00.578000 audit[2365]: AVC avc: denied { watch } for pid=2365 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c425,c522 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:42:00.961811 kernel: audit: type=1400 audit(1696279320.578:939): avc: denied { watch } for pid=2365 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c425,c522 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:42:00.961854 kernel: audit: type=1300 audit(1696279320.578:939): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001554a20 a2=fc6 a3=0 items=0 ppid=2217 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c425,c522 key=(null) Oct 2 20:42:00.578000 audit[2365]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001554a20 a2=fc6 a3=0 items=0 ppid=2217 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c425,c522 key=(null) Oct 2 20:42:01.078864 kernel: audit: type=1327 audit(1696279320.578:939): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:42:00.578000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:42:01.169743 kernel: audit: type=1400 audit(1696279320.580:940): avc: denied { watch } for pid=2365 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c425,c522 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:42:00.580000 audit[2365]: AVC avc: denied { watch } for pid=2365 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c425,c522 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:42:01.257546 kernel: audit: type=1300 audit(1696279320.580:940): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0011aa040 a2=fc6 a3=0 items=0 ppid=2217 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c425,c522 key=(null) Oct 2 20:42:00.580000 audit[2365]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0011aa040 a2=fc6 a3=0 items=0 ppid=2217 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c425,c522 key=(null) Oct 2 20:42:01.374917 kernel: audit: type=1327 audit(1696279320.580:940): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:42:00.580000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:42:01.466535 kernel: audit: type=1400 audit(1696279320.580:941): avc: denied { watch } for pid=2365 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c425,c522 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:42:00.580000 audit[2365]: AVC avc: denied { watch } for pid=2365 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c425,c522 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:42:00.580000 audit[2365]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0011aa080 a2=fc6 a3=0 items=0 ppid=2217 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c425,c522 key=(null) Oct 2 20:42:00.580000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:42:01.376000 audit[2365]: AVC avc: denied { watch } for pid=2365 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sda9" ino=521043 scontext=system_u:system_r:svirt_lxc_net_t:s0:c425,c522 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Oct 2 20:42:01.376000 audit[2365]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000b7a8c0 a2=fc6 a3=0 items=0 ppid=2217 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c425,c522 key=(null) Oct 2 20:42:01.376000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:42:01.689220 kubelet[2560]: I1002 20:42:01.689124 2560 kuberuntime_manager.go:1460] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Oct 2 20:42:01.690077 env[1465]: time="2023-10-02T20:42:01.689857439Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Oct 2 20:42:01.690662 kubelet[2560]: I1002 20:42:01.690282 2560 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Oct 2 20:42:02.422933 kubelet[2560]: I1002 20:42:02.422856 2560 topology_manager.go:212] "Topology Admit Handler" Oct 2 20:42:02.438125 systemd[1]: Created slice kubepods-besteffort-pod76ca0ff8_07b5_4c0f_b21c_531bb71a6cec.slice. Oct 2 20:42:02.484657 kubelet[2560]: I1002 20:42:02.484593 2560 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/76ca0ff8-07b5-4c0f-b21c-531bb71a6cec-kube-proxy\") pod \"kube-proxy-qsnkx\" (UID: \"76ca0ff8-07b5-4c0f-b21c-531bb71a6cec\") " pod="kube-system/kube-proxy-qsnkx" Oct 2 20:42:02.484657 kubelet[2560]: I1002 20:42:02.484644 2560 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-mrq2r\" (UniqueName: \"kubernetes.io/projected/76ca0ff8-07b5-4c0f-b21c-531bb71a6cec-kube-api-access-mrq2r\") pod \"kube-proxy-qsnkx\" (UID: \"76ca0ff8-07b5-4c0f-b21c-531bb71a6cec\") " pod="kube-system/kube-proxy-qsnkx" Oct 2 20:42:02.484847 kubelet[2560]: I1002 20:42:02.484733 2560 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/76ca0ff8-07b5-4c0f-b21c-531bb71a6cec-xtables-lock\") pod \"kube-proxy-qsnkx\" (UID: \"76ca0ff8-07b5-4c0f-b21c-531bb71a6cec\") " pod="kube-system/kube-proxy-qsnkx" Oct 2 20:42:02.484847 kubelet[2560]: I1002 20:42:02.484767 2560 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/76ca0ff8-07b5-4c0f-b21c-531bb71a6cec-lib-modules\") pod \"kube-proxy-qsnkx\" (UID: \"76ca0ff8-07b5-4c0f-b21c-531bb71a6cec\") " pod="kube-system/kube-proxy-qsnkx" Oct 2 20:42:02.642718 kubelet[2560]: I1002 20:42:02.642664 2560 topology_manager.go:212] "Topology Admit Handler" Oct 2 20:42:02.647741 systemd[1]: Created slice kubepods-besteffort-pod0b154603_d7fd_499c_b475_a098b1b45ee8.slice. Oct 2 20:42:02.686637 kubelet[2560]: I1002 20:42:02.686536 2560 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/0b154603-d7fd-499c-b475-a098b1b45ee8-var-lib-calico\") pod \"tigera-operator-59c686f986-hzc55\" (UID: \"0b154603-d7fd-499c-b475-a098b1b45ee8\") " pod="tigera-operator/tigera-operator-59c686f986-hzc55" Oct 2 20:42:02.686637 kubelet[2560]: I1002 20:42:02.686594 2560 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-tk9wz\" (UniqueName: \"kubernetes.io/projected/0b154603-d7fd-499c-b475-a098b1b45ee8-kube-api-access-tk9wz\") pod \"tigera-operator-59c686f986-hzc55\" (UID: \"0b154603-d7fd-499c-b475-a098b1b45ee8\") " pod="tigera-operator/tigera-operator-59c686f986-hzc55" Oct 2 20:42:02.752060 env[1465]: time="2023-10-02T20:42:02.751933949Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-qsnkx,Uid:76ca0ff8-07b5-4c0f-b21c-531bb71a6cec,Namespace:kube-system,Attempt:0,}" Oct 2 20:42:02.772488 env[1465]: time="2023-10-02T20:42:02.772261511Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 20:42:02.772488 env[1465]: time="2023-10-02T20:42:02.772375266Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 20:42:02.772488 env[1465]: time="2023-10-02T20:42:02.772412791Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 20:42:02.772985 env[1465]: time="2023-10-02T20:42:02.772798287Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/9fc2a9db68688a03dc69e866311ecd404cfa11bb9e69dacac74e59a90cd719ac pid=2723 runtime=io.containerd.runc.v2 Oct 2 20:42:02.821936 systemd[1]: Started cri-containerd-9fc2a9db68688a03dc69e866311ecd404cfa11bb9e69dacac74e59a90cd719ac.scope. Oct 2 20:42:02.835000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:02.835000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:02.836000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:02.836000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:02.836000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:02.836000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:02.836000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:02.836000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:02.836000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:02.836000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:02.836000 audit: BPF prog-id=106 op=LOAD Oct 2 20:42:02.836000 audit[2734]: AVC avc: denied { bpf } for pid=2734 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:02.836000 audit[2734]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2723 pid=2734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:02.836000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966633261396462363836383861303364633639653836363331316563 Oct 2 20:42:02.836000 audit[2734]: AVC avc: denied { perfmon } for pid=2734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:02.836000 audit[2734]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2723 pid=2734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:02.836000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966633261396462363836383861303364633639653836363331316563 Oct 2 20:42:02.836000 audit[2734]: AVC avc: denied { bpf } for pid=2734 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:02.836000 audit[2734]: AVC avc: denied { bpf } for pid=2734 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:02.836000 audit[2734]: AVC avc: denied { bpf } for pid=2734 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:02.836000 audit[2734]: AVC avc: denied { perfmon } for pid=2734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:02.836000 audit[2734]: AVC avc: denied { perfmon } for pid=2734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:02.836000 audit[2734]: AVC avc: denied { perfmon } for pid=2734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:02.836000 audit[2734]: AVC avc: denied { perfmon } for pid=2734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:02.836000 audit[2734]: AVC avc: denied { perfmon } for pid=2734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:02.836000 audit[2734]: AVC avc: denied { bpf } for pid=2734 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:02.836000 audit[2734]: AVC avc: denied { bpf } for pid=2734 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:02.836000 audit: BPF prog-id=107 op=LOAD Oct 2 20:42:02.836000 audit[2734]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000296300 items=0 ppid=2723 pid=2734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:02.836000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966633261396462363836383861303364633639653836363331316563 Oct 2 20:42:02.837000 audit[2734]: AVC avc: denied { bpf } for pid=2734 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:02.837000 audit[2734]: AVC avc: denied { bpf } for pid=2734 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:02.837000 audit[2734]: AVC avc: denied { perfmon } for pid=2734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:02.837000 audit[2734]: AVC avc: denied { perfmon } for pid=2734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:02.837000 audit[2734]: AVC avc: denied { perfmon } for pid=2734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:02.837000 audit[2734]: AVC avc: denied { perfmon } for pid=2734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:02.837000 audit[2734]: AVC avc: denied { perfmon } for pid=2734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:02.837000 audit[2734]: AVC avc: denied { bpf } for pid=2734 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:02.837000 audit[2734]: AVC avc: denied { bpf } for pid=2734 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:02.837000 audit: BPF prog-id=108 op=LOAD Oct 2 20:42:02.837000 audit[2734]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000296348 items=0 ppid=2723 pid=2734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:02.837000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966633261396462363836383861303364633639653836363331316563 Oct 2 20:42:02.837000 audit: BPF prog-id=108 op=UNLOAD Oct 2 20:42:02.837000 audit: BPF prog-id=107 op=UNLOAD Oct 2 20:42:02.837000 audit[2734]: AVC avc: denied { bpf } for pid=2734 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:02.837000 audit[2734]: AVC avc: denied { bpf } for pid=2734 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:02.837000 audit[2734]: AVC avc: denied { bpf } for pid=2734 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:02.837000 audit[2734]: AVC avc: denied { perfmon } for pid=2734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:02.837000 audit[2734]: AVC avc: denied { perfmon } for pid=2734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:02.837000 audit[2734]: AVC avc: denied { perfmon } for pid=2734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:02.837000 audit[2734]: AVC avc: denied { perfmon } for pid=2734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:02.837000 audit[2734]: AVC avc: denied { perfmon } for pid=2734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:02.837000 audit[2734]: AVC avc: denied { bpf } for pid=2734 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:02.837000 audit[2734]: AVC avc: denied { bpf } for pid=2734 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:02.837000 audit: BPF prog-id=109 op=LOAD Oct 2 20:42:02.837000 audit[2734]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000296758 items=0 ppid=2723 pid=2734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:02.837000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966633261396462363836383861303364633639653836363331316563 Oct 2 20:42:02.861990 env[1465]: time="2023-10-02T20:42:02.861944657Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-qsnkx,Uid:76ca0ff8-07b5-4c0f-b21c-531bb71a6cec,Namespace:kube-system,Attempt:0,} returns sandbox id \"9fc2a9db68688a03dc69e866311ecd404cfa11bb9e69dacac74e59a90cd719ac\"" Oct 2 20:42:02.864101 env[1465]: time="2023-10-02T20:42:02.864068591Z" level=info msg="CreateContainer within sandbox \"9fc2a9db68688a03dc69e866311ecd404cfa11bb9e69dacac74e59a90cd719ac\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Oct 2 20:42:02.874286 env[1465]: time="2023-10-02T20:42:02.874248763Z" level=info msg="CreateContainer within sandbox \"9fc2a9db68688a03dc69e866311ecd404cfa11bb9e69dacac74e59a90cd719ac\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"dd71c224f06123bfc472c8c9474ead36a0d7a30e09121a3d6e80949d7e57eeed\"" Oct 2 20:42:02.874807 env[1465]: time="2023-10-02T20:42:02.874761717Z" level=info msg="StartContainer for \"dd71c224f06123bfc472c8c9474ead36a0d7a30e09121a3d6e80949d7e57eeed\"" Oct 2 20:42:02.892716 update_engine[1457]: I1002 20:42:02.892619 1457 update_attempter.cc:505] Updating boot flags... Oct 2 20:42:02.909567 systemd[1]: Started cri-containerd-dd71c224f06123bfc472c8c9474ead36a0d7a30e09121a3d6e80949d7e57eeed.scope. Oct 2 20:42:02.939000 audit[2765]: AVC avc: denied { perfmon } for pid=2765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:02.939000 audit[2765]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2723 pid=2765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:02.939000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464373163323234663036313233626663343732633863393437346561 Oct 2 20:42:02.939000 audit[2765]: AVC avc: denied { bpf } for pid=2765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:02.939000 audit[2765]: AVC avc: denied { bpf } for pid=2765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:02.939000 audit[2765]: AVC avc: denied { bpf } for pid=2765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:02.939000 audit[2765]: AVC avc: denied { perfmon } for pid=2765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:02.939000 audit[2765]: AVC avc: denied { perfmon } for pid=2765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:02.939000 audit[2765]: AVC avc: denied { perfmon } for pid=2765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:02.939000 audit[2765]: AVC avc: denied { perfmon } for pid=2765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:02.939000 audit[2765]: AVC avc: denied { perfmon } for pid=2765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:02.939000 audit[2765]: AVC avc: denied { bpf } for pid=2765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:02.939000 audit[2765]: AVC avc: denied { bpf } for pid=2765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:02.939000 audit: BPF prog-id=110 op=LOAD Oct 2 20:42:02.939000 audit[2765]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0001b5530 items=0 ppid=2723 pid=2765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:02.939000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464373163323234663036313233626663343732633863393437346561 Oct 2 20:42:02.939000 audit[2765]: AVC avc: denied { bpf } for pid=2765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:02.939000 audit[2765]: AVC avc: denied { bpf } for pid=2765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:02.939000 audit[2765]: AVC avc: denied { perfmon } for pid=2765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:02.939000 audit[2765]: AVC avc: denied { perfmon } for pid=2765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:02.939000 audit[2765]: AVC avc: denied { perfmon } for pid=2765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:02.939000 audit[2765]: AVC avc: denied { perfmon } for pid=2765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:02.939000 audit[2765]: AVC avc: denied { perfmon } for pid=2765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:02.939000 audit[2765]: AVC avc: denied { bpf } for pid=2765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:02.939000 audit[2765]: AVC avc: denied { bpf } for pid=2765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:02.939000 audit: BPF prog-id=111 op=LOAD Oct 2 20:42:02.939000 audit[2765]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0001b5578 items=0 ppid=2723 pid=2765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:02.939000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464373163323234663036313233626663343732633863393437346561 Oct 2 20:42:02.939000 audit: BPF prog-id=111 op=UNLOAD Oct 2 20:42:02.939000 audit: BPF prog-id=110 op=UNLOAD Oct 2 20:42:02.939000 audit[2765]: AVC avc: denied { bpf } for pid=2765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:02.939000 audit[2765]: AVC avc: denied { bpf } for pid=2765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:02.939000 audit[2765]: AVC avc: denied { bpf } for pid=2765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:02.939000 audit[2765]: AVC avc: denied { perfmon } for pid=2765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:02.939000 audit[2765]: AVC avc: denied { perfmon } for pid=2765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:02.939000 audit[2765]: AVC avc: denied { perfmon } for pid=2765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:02.939000 audit[2765]: AVC avc: denied { perfmon } for pid=2765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:02.939000 audit[2765]: AVC avc: denied { perfmon } for pid=2765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:02.939000 audit[2765]: AVC avc: denied { bpf } for pid=2765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:02.939000 audit[2765]: AVC avc: denied { bpf } for pid=2765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:02.939000 audit: BPF prog-id=112 op=LOAD Oct 2 20:42:02.939000 audit[2765]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0001b5608 items=0 ppid=2723 pid=2765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:02.939000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464373163323234663036313233626663343732633863393437346561 Oct 2 20:42:02.950665 env[1465]: time="2023-10-02T20:42:02.950623727Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-59c686f986-hzc55,Uid:0b154603-d7fd-499c-b475-a098b1b45ee8,Namespace:tigera-operator,Attempt:0,}" Oct 2 20:42:02.963241 env[1465]: time="2023-10-02T20:42:02.963200961Z" level=info msg="StartContainer for \"dd71c224f06123bfc472c8c9474ead36a0d7a30e09121a3d6e80949d7e57eeed\" returns successfully" Oct 2 20:42:02.966472 env[1465]: time="2023-10-02T20:42:02.966416029Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 20:42:02.966472 env[1465]: time="2023-10-02T20:42:02.966452440Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 20:42:02.966619 env[1465]: time="2023-10-02T20:42:02.966470491Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 20:42:02.966665 env[1465]: time="2023-10-02T20:42:02.966616728Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/329aa7ae0309a33dd24a30654221795f5034112ef3347b04d6022b4601ca0388 pid=2814 runtime=io.containerd.runc.v2 Oct 2 20:42:02.990055 systemd[1]: Started cri-containerd-329aa7ae0309a33dd24a30654221795f5034112ef3347b04d6022b4601ca0388.scope. Oct 2 20:42:02.994000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:02.994000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:02.994000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:02.994000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:02.994000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:02.994000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:02.994000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:02.994000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:02.994000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:02.994000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:02.994000 audit: BPF prog-id=113 op=LOAD Oct 2 20:42:02.995000 audit[2825]: AVC avc: denied { bpf } for pid=2825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:02.995000 audit[2825]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2814 pid=2825 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:02.995000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332396161376165303330396133336464323461333036353432323137 Oct 2 20:42:02.995000 audit[2825]: AVC avc: denied { perfmon } for pid=2825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:02.995000 audit[2825]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2814 pid=2825 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:02.995000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332396161376165303330396133336464323461333036353432323137 Oct 2 20:42:02.995000 audit[2825]: AVC avc: denied { bpf } for pid=2825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:02.995000 audit[2825]: AVC avc: denied { bpf } for pid=2825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:02.995000 audit[2825]: AVC avc: denied { bpf } for pid=2825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:02.995000 audit[2825]: AVC avc: denied { perfmon } for pid=2825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:02.995000 audit[2825]: AVC avc: denied { perfmon } for pid=2825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:02.995000 audit[2825]: AVC avc: denied { perfmon } for pid=2825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:02.995000 audit[2825]: AVC avc: denied { perfmon } for pid=2825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:02.995000 audit[2825]: AVC avc: denied { perfmon } for pid=2825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:02.995000 audit[2825]: AVC avc: denied { bpf } for pid=2825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:02.995000 audit[2825]: AVC avc: denied { bpf } for pid=2825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:02.995000 audit: BPF prog-id=114 op=LOAD Oct 2 20:42:02.995000 audit[2825]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00028aed0 items=0 ppid=2814 pid=2825 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:02.995000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332396161376165303330396133336464323461333036353432323137 Oct 2 20:42:02.995000 audit[2825]: AVC avc: denied { bpf } for pid=2825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:02.995000 audit[2825]: AVC avc: denied { bpf } for pid=2825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:02.995000 audit[2825]: AVC avc: denied { perfmon } for pid=2825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:02.995000 audit[2825]: AVC avc: denied { perfmon } for pid=2825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:02.995000 audit[2825]: AVC avc: denied { perfmon } for pid=2825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:02.995000 audit[2825]: AVC avc: denied { perfmon } for pid=2825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:02.995000 audit[2825]: AVC avc: denied { perfmon } for pid=2825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:02.995000 audit[2825]: AVC avc: denied { bpf } for pid=2825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:02.995000 audit[2825]: AVC avc: denied { bpf } for pid=2825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:02.995000 audit: BPF prog-id=115 op=LOAD Oct 2 20:42:02.995000 audit[2825]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00028af18 items=0 ppid=2814 pid=2825 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:02.995000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332396161376165303330396133336464323461333036353432323137 Oct 2 20:42:02.995000 audit: BPF prog-id=115 op=UNLOAD Oct 2 20:42:02.995000 audit: BPF prog-id=114 op=UNLOAD Oct 2 20:42:02.995000 audit[2825]: AVC avc: denied { bpf } for pid=2825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:02.995000 audit[2825]: AVC avc: denied { bpf } for pid=2825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:02.995000 audit[2825]: AVC avc: denied { bpf } for pid=2825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:02.995000 audit[2825]: AVC avc: denied { perfmon } for pid=2825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:02.995000 audit[2825]: AVC avc: denied { perfmon } for pid=2825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:02.995000 audit[2825]: AVC avc: denied { perfmon } for pid=2825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:02.995000 audit[2825]: AVC avc: denied { perfmon } for pid=2825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:02.995000 audit[2825]: AVC avc: denied { perfmon } for pid=2825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:02.995000 audit[2825]: AVC avc: denied { bpf } for pid=2825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:02.995000 audit[2825]: AVC avc: denied { bpf } for pid=2825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:02.995000 audit: BPF prog-id=116 op=LOAD Oct 2 20:42:02.995000 audit[2825]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00028b328 items=0 ppid=2814 pid=2825 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:02.995000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332396161376165303330396133336464323461333036353432323137 Oct 2 20:42:02.997000 audit[2875]: NETFILTER_CFG table=mangle:38 family=2 entries=1 op=nft_register_chain pid=2875 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:42:02.997000 audit[2875]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd165216c0 a2=0 a3=7ffd165216ac items=0 ppid=2781 pid=2875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:02.997000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Oct 2 20:42:02.997000 audit[2876]: NETFILTER_CFG table=mangle:39 family=10 entries=1 op=nft_register_chain pid=2876 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:42:02.997000 audit[2876]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcb66c4630 a2=0 a3=7ffcb66c461c items=0 ppid=2781 pid=2876 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:02.997000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Oct 2 20:42:02.998000 audit[2877]: NETFILTER_CFG table=nat:40 family=2 entries=1 op=nft_register_chain pid=2877 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:42:02.998000 audit[2877]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe40f38c30 a2=0 a3=7ffe40f38c1c items=0 ppid=2781 pid=2877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:02.998000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Oct 2 20:42:02.998000 audit[2878]: NETFILTER_CFG table=nat:41 family=10 entries=1 op=nft_register_chain pid=2878 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:42:02.998000 audit[2878]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc1e8fbb20 a2=0 a3=7ffc1e8fbb0c items=0 ppid=2781 pid=2878 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:02.998000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Oct 2 20:42:02.998000 audit[2879]: NETFILTER_CFG table=filter:42 family=2 entries=1 op=nft_register_chain pid=2879 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:42:02.998000 audit[2879]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffef5947100 a2=0 a3=7ffef59470ec items=0 ppid=2781 pid=2879 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:02.998000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Oct 2 20:42:02.998000 audit[2880]: NETFILTER_CFG table=filter:43 family=10 entries=1 op=nft_register_chain pid=2880 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:42:02.998000 audit[2880]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffedf550b40 a2=0 a3=7ffedf550b2c items=0 ppid=2781 pid=2880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:02.998000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Oct 2 20:42:03.012849 env[1465]: time="2023-10-02T20:42:03.012823310Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-59c686f986-hzc55,Uid:0b154603-d7fd-499c-b475-a098b1b45ee8,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"329aa7ae0309a33dd24a30654221795f5034112ef3347b04d6022b4601ca0388\"" Oct 2 20:42:03.013563 env[1465]: time="2023-10-02T20:42:03.013549781Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.29.0\"" Oct 2 20:42:03.103000 audit[2887]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2887 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:42:03.103000 audit[2887]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffedca2d8c0 a2=0 a3=7ffedca2d8ac items=0 ppid=2781 pid=2887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:03.103000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Oct 2 20:42:03.109000 audit[2889]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2889 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:42:03.109000 audit[2889]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7fffdc80fab0 a2=0 a3=7fffdc80fa9c items=0 ppid=2781 pid=2889 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:03.109000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Oct 2 20:42:03.119000 audit[2892]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2892 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:42:03.119000 audit[2892]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffde0c98d00 a2=0 a3=7ffde0c98cec items=0 ppid=2781 pid=2892 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:03.119000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Oct 2 20:42:03.121000 audit[2893]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2893 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:42:03.121000 audit[2893]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdfea76d90 a2=0 a3=7ffdfea76d7c items=0 ppid=2781 pid=2893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:03.121000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Oct 2 20:42:03.127000 audit[2895]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2895 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:42:03.127000 audit[2895]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe7c5108d0 a2=0 a3=7ffe7c5108bc items=0 ppid=2781 pid=2895 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:03.127000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Oct 2 20:42:03.130000 audit[2896]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2896 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:42:03.130000 audit[2896]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff678db990 a2=0 a3=7fff678db97c items=0 ppid=2781 pid=2896 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:03.130000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Oct 2 20:42:03.137000 audit[2898]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2898 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:42:03.137000 audit[2898]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffe9a0eccd0 a2=0 a3=7ffe9a0eccbc items=0 ppid=2781 pid=2898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:03.137000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Oct 2 20:42:03.145000 audit[2901]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2901 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:42:03.145000 audit[2901]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffd7b34f7e0 a2=0 a3=7ffd7b34f7cc items=0 ppid=2781 pid=2901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:03.145000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Oct 2 20:42:03.147000 audit[2902]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2902 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:42:03.147000 audit[2902]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffede9a3b00 a2=0 a3=7ffede9a3aec items=0 ppid=2781 pid=2902 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:03.147000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Oct 2 20:42:03.154000 audit[2904]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2904 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:42:03.154000 audit[2904]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffca57a49b0 a2=0 a3=7ffca57a499c items=0 ppid=2781 pid=2904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:03.154000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Oct 2 20:42:03.157000 audit[2905]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2905 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:42:03.157000 audit[2905]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffddf2fee10 a2=0 a3=7ffddf2fedfc items=0 ppid=2781 pid=2905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:03.157000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Oct 2 20:42:03.163000 audit[2907]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2907 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:42:03.163000 audit[2907]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe02acf960 a2=0 a3=7ffe02acf94c items=0 ppid=2781 pid=2907 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:03.163000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Oct 2 20:42:03.172000 audit[2910]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2910 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:42:03.172000 audit[2910]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe6f4ac3c0 a2=0 a3=7ffe6f4ac3ac items=0 ppid=2781 pid=2910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:03.172000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Oct 2 20:42:03.181000 audit[2913]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2913 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:42:03.181000 audit[2913]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc3b6e4b50 a2=0 a3=7ffc3b6e4b3c items=0 ppid=2781 pid=2913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:03.181000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Oct 2 20:42:03.184000 audit[2914]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2914 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:42:03.184000 audit[2914]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff99a7aee0 a2=0 a3=7fff99a7aecc items=0 ppid=2781 pid=2914 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:03.184000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Oct 2 20:42:03.190000 audit[2916]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2916 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:42:03.190000 audit[2916]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7ffe7b485e40 a2=0 a3=7ffe7b485e2c items=0 ppid=2781 pid=2916 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:03.190000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 2 20:42:03.199000 audit[2919]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2919 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:42:03.199000 audit[2919]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe66918770 a2=0 a3=7ffe6691875c items=0 ppid=2781 pid=2919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:03.199000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 2 20:42:03.213000 audit[2924]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2924 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:42:03.213000 audit[2924]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcec5a7970 a2=0 a3=7ffcec5a795c items=0 ppid=2781 pid=2924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:03.213000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Oct 2 20:42:03.219000 audit[2926]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2926 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 20:42:03.219000 audit[2926]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7ffc3443fc80 a2=0 a3=7ffc3443fc6c items=0 ppid=2781 pid=2926 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:03.219000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Oct 2 20:42:03.246000 audit[2928]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2928 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 20:42:03.246000 audit[2928]: SYSCALL arch=c000003e syscall=46 success=yes exit=4956 a0=3 a1=7fffedcc8460 a2=0 a3=7fffedcc844c items=0 ppid=2781 pid=2928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:03.246000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 20:42:03.260000 audit[2928]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2928 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 20:42:03.260000 audit[2928]: SYSCALL arch=c000003e syscall=46 success=yes exit=5340 a0=3 a1=7fffedcc8460 a2=0 a3=7fffedcc844c items=0 ppid=2781 pid=2928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:03.260000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 20:42:03.262000 audit[2932]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2932 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:42:03.262000 audit[2932]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffcc5336c10 a2=0 a3=7ffcc5336bfc items=0 ppid=2781 pid=2932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:03.262000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Oct 2 20:42:03.265000 audit[2934]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2934 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:42:03.265000 audit[2934]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fffdb4297b0 a2=0 a3=7fffdb42979c items=0 ppid=2781 pid=2934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:03.265000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Oct 2 20:42:03.269000 audit[2937]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2937 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:42:03.269000 audit[2937]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffe8a7652f0 a2=0 a3=7ffe8a7652dc items=0 ppid=2781 pid=2937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:03.269000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Oct 2 20:42:03.270000 audit[2938]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2938 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:42:03.270000 audit[2938]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffeee03630 a2=0 a3=7fffeee0361c items=0 ppid=2781 pid=2938 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:03.270000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Oct 2 20:42:03.273000 audit[2940]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2940 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:42:03.273000 audit[2940]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffdeb82fb20 a2=0 a3=7ffdeb82fb0c items=0 ppid=2781 pid=2940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:03.273000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Oct 2 20:42:03.274000 audit[2941]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2941 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:42:03.274000 audit[2941]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe8aa583e0 a2=0 a3=7ffe8aa583cc items=0 ppid=2781 pid=2941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:03.274000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Oct 2 20:42:03.277000 audit[2943]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2943 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:42:03.277000 audit[2943]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffeb6292ae0 a2=0 a3=7ffeb6292acc items=0 ppid=2781 pid=2943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:03.277000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Oct 2 20:42:03.280000 audit[2946]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2946 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:42:03.280000 audit[2946]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffc60e355d0 a2=0 a3=7ffc60e355bc items=0 ppid=2781 pid=2946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:03.280000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Oct 2 20:42:03.282000 audit[2947]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2947 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:42:03.282000 audit[2947]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd0ff87d00 a2=0 a3=7ffd0ff87cec items=0 ppid=2781 pid=2947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:03.282000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Oct 2 20:42:03.284000 audit[2949]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2949 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:42:03.284000 audit[2949]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd97963c70 a2=0 a3=7ffd97963c5c items=0 ppid=2781 pid=2949 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:03.284000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Oct 2 20:42:03.285000 audit[2950]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2950 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:42:03.285000 audit[2950]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd69753a60 a2=0 a3=7ffd69753a4c items=0 ppid=2781 pid=2950 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:03.285000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Oct 2 20:42:03.288000 audit[2952]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2952 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:42:03.288000 audit[2952]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe86d7af50 a2=0 a3=7ffe86d7af3c items=0 ppid=2781 pid=2952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:03.288000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Oct 2 20:42:03.292000 audit[2955]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2955 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:42:03.292000 audit[2955]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc8ee29d70 a2=0 a3=7ffc8ee29d5c items=0 ppid=2781 pid=2955 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:03.292000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Oct 2 20:42:03.296000 audit[2958]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2958 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:42:03.296000 audit[2958]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd31d27240 a2=0 a3=7ffd31d2722c items=0 ppid=2781 pid=2958 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:03.296000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Oct 2 20:42:03.297000 audit[2959]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=2959 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:42:03.297000 audit[2959]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffe83f00ba0 a2=0 a3=7ffe83f00b8c items=0 ppid=2781 pid=2959 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:03.297000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Oct 2 20:42:03.300000 audit[2961]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=2961 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:42:03.300000 audit[2961]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffc6647bb70 a2=0 a3=7ffc6647bb5c items=0 ppid=2781 pid=2961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:03.300000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 2 20:42:03.303000 audit[2964]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=2964 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:42:03.303000 audit[2964]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7fff800825d0 a2=0 a3=7fff800825bc items=0 ppid=2781 pid=2964 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:03.303000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 2 20:42:03.304000 audit[2965]: NETFILTER_CFG table=filter:82 family=10 entries=1 op=nft_register_chain pid=2965 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:42:03.304000 audit[2965]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff2d272ca0 a2=0 a3=7fff2d272c8c items=0 ppid=2781 pid=2965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:03.304000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Oct 2 20:42:03.307000 audit[2967]: NETFILTER_CFG table=filter:83 family=10 entries=1 op=nft_register_rule pid=2967 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:42:03.307000 audit[2967]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffec2da30b0 a2=0 a3=7ffec2da309c items=0 ppid=2781 pid=2967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:03.307000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 2 20:42:03.311000 audit[2970]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_rule pid=2970 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:42:03.311000 audit[2970]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffef916fb40 a2=0 a3=7ffef916fb2c items=0 ppid=2781 pid=2970 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:03.311000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 2 20:42:03.312000 audit[2971]: NETFILTER_CFG table=nat:85 family=10 entries=1 op=nft_register_chain pid=2971 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:42:03.312000 audit[2971]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc6073db70 a2=0 a3=7ffc6073db5c items=0 ppid=2781 pid=2971 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:03.312000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Oct 2 20:42:03.314000 audit[2973]: NETFILTER_CFG table=nat:86 family=10 entries=2 op=nft_register_chain pid=2973 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 20:42:03.314000 audit[2973]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffedc1773c0 a2=0 a3=7ffedc1773ac items=0 ppid=2781 pid=2973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:03.314000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Oct 2 20:42:03.317000 audit[2975]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=2975 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Oct 2 20:42:03.317000 audit[2975]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7fff9442a470 a2=0 a3=7fff9442a45c items=0 ppid=2781 pid=2975 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:03.317000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 20:42:03.318000 audit[2975]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=2975 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Oct 2 20:42:03.318000 audit[2975]: SYSCALL arch=c000003e syscall=46 success=yes exit=1968 a0=3 a1=7fff9442a470 a2=0 a3=7fff9442a45c items=0 ppid=2781 pid=2975 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:03.318000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 20:42:03.448853 kubelet[2560]: I1002 20:42:03.448653 2560 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-qsnkx" podStartSLOduration=1.448568464 podCreationTimestamp="2023-10-02 20:42:02 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 20:42:03.448165746 +0000 UTC m=+15.110884562" watchObservedRunningTime="2023-10-02 20:42:03.448568464 +0000 UTC m=+15.111287267" Oct 2 20:42:05.196464 env[1465]: time="2023-10-02T20:42:05.196409321Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.29.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:42:05.197658 env[1465]: time="2023-10-02T20:42:05.197626014Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:343ea4f89a32c8f197173c5d9f1ad64eb033df452c5b89a65877d8d3cfa692b1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:42:05.200212 env[1465]: time="2023-10-02T20:42:05.200152694Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.29.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:42:05.202234 env[1465]: time="2023-10-02T20:42:05.202205127Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:89eef35e1bbe8c88792ce69c3f3f38fb9838e58602c570524350b5f3ab127582,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:42:05.203186 env[1465]: time="2023-10-02T20:42:05.203156263Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.29.0\" returns image reference \"sha256:343ea4f89a32c8f197173c5d9f1ad64eb033df452c5b89a65877d8d3cfa692b1\"" Oct 2 20:42:05.205024 env[1465]: time="2023-10-02T20:42:05.204970897Z" level=info msg="CreateContainer within sandbox \"329aa7ae0309a33dd24a30654221795f5034112ef3347b04d6022b4601ca0388\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Oct 2 20:42:05.211216 env[1465]: time="2023-10-02T20:42:05.211146134Z" level=info msg="CreateContainer within sandbox \"329aa7ae0309a33dd24a30654221795f5034112ef3347b04d6022b4601ca0388\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"2a66dc2a0127465e46d372358740f76fa98e48b04d8b8aede83098e4d809291f\"" Oct 2 20:42:05.211536 env[1465]: time="2023-10-02T20:42:05.211472493Z" level=info msg="StartContainer for \"2a66dc2a0127465e46d372358740f76fa98e48b04d8b8aede83098e4d809291f\"" Oct 2 20:42:05.239212 systemd[1]: Started cri-containerd-2a66dc2a0127465e46d372358740f76fa98e48b04d8b8aede83098e4d809291f.scope. Oct 2 20:42:05.246000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:05.246000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:05.246000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:05.246000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:05.246000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:05.246000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:05.246000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:05.246000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:05.246000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:05.246000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:05.246000 audit: BPF prog-id=117 op=LOAD Oct 2 20:42:05.246000 audit[2983]: AVC avc: denied { bpf } for pid=2983 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:05.246000 audit[2983]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=2814 pid=2983 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:05.246000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261363664633261303132373436356534366433373233353837343066 Oct 2 20:42:05.246000 audit[2983]: AVC avc: denied { perfmon } for pid=2983 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:05.246000 audit[2983]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=2814 pid=2983 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:05.246000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261363664633261303132373436356534366433373233353837343066 Oct 2 20:42:05.246000 audit[2983]: AVC avc: denied { bpf } for pid=2983 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:05.246000 audit[2983]: AVC avc: denied { bpf } for pid=2983 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:05.246000 audit[2983]: AVC avc: denied { bpf } for pid=2983 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:05.246000 audit[2983]: AVC avc: denied { perfmon } for pid=2983 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:05.246000 audit[2983]: AVC avc: denied { perfmon } for pid=2983 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:05.246000 audit[2983]: AVC avc: denied { perfmon } for pid=2983 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:05.246000 audit[2983]: AVC avc: denied { perfmon } for pid=2983 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:05.246000 audit[2983]: AVC avc: denied { perfmon } for pid=2983 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:05.246000 audit[2983]: AVC avc: denied { bpf } for pid=2983 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:05.246000 audit[2983]: AVC avc: denied { bpf } for pid=2983 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:05.246000 audit: BPF prog-id=118 op=LOAD Oct 2 20:42:05.246000 audit[2983]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000102df0 items=0 ppid=2814 pid=2983 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:05.246000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261363664633261303132373436356534366433373233353837343066 Oct 2 20:42:05.246000 audit[2983]: AVC avc: denied { bpf } for pid=2983 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:05.246000 audit[2983]: AVC avc: denied { bpf } for pid=2983 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:05.246000 audit[2983]: AVC avc: denied { perfmon } for pid=2983 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:05.246000 audit[2983]: AVC avc: denied { perfmon } for pid=2983 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:05.246000 audit[2983]: AVC avc: denied { perfmon } for pid=2983 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:05.246000 audit[2983]: AVC avc: denied { perfmon } for pid=2983 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:05.246000 audit[2983]: AVC avc: denied { perfmon } for pid=2983 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:05.246000 audit[2983]: AVC avc: denied { bpf } for pid=2983 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:05.246000 audit[2983]: AVC avc: denied { bpf } for pid=2983 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:05.246000 audit: BPF prog-id=119 op=LOAD Oct 2 20:42:05.246000 audit[2983]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000102e38 items=0 ppid=2814 pid=2983 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:05.246000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261363664633261303132373436356534366433373233353837343066 Oct 2 20:42:05.247000 audit: BPF prog-id=119 op=UNLOAD Oct 2 20:42:05.247000 audit: BPF prog-id=118 op=UNLOAD Oct 2 20:42:05.247000 audit[2983]: AVC avc: denied { bpf } for pid=2983 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:05.247000 audit[2983]: AVC avc: denied { bpf } for pid=2983 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:05.247000 audit[2983]: AVC avc: denied { bpf } for pid=2983 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:05.247000 audit[2983]: AVC avc: denied { perfmon } for pid=2983 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:05.247000 audit[2983]: AVC avc: denied { perfmon } for pid=2983 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:05.247000 audit[2983]: AVC avc: denied { perfmon } for pid=2983 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:05.247000 audit[2983]: AVC avc: denied { perfmon } for pid=2983 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:05.247000 audit[2983]: AVC avc: denied { perfmon } for pid=2983 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:05.247000 audit[2983]: AVC avc: denied { bpf } for pid=2983 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:05.247000 audit[2983]: AVC avc: denied { bpf } for pid=2983 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:05.247000 audit: BPF prog-id=120 op=LOAD Oct 2 20:42:05.247000 audit[2983]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000103248 items=0 ppid=2814 pid=2983 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:05.247000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261363664633261303132373436356534366433373233353837343066 Oct 2 20:42:05.267549 env[1465]: time="2023-10-02T20:42:05.267512140Z" level=info msg="StartContainer for \"2a66dc2a0127465e46d372358740f76fa98e48b04d8b8aede83098e4d809291f\" returns successfully" Oct 2 20:42:05.460410 kubelet[2560]: I1002 20:42:05.460221 2560 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="tigera-operator/tigera-operator-59c686f986-hzc55" podStartSLOduration=1.270062655 podCreationTimestamp="2023-10-02 20:42:02 +0000 UTC" firstStartedPulling="2023-10-02 20:42:03.01335403 +0000 UTC m=+14.676072783" lastFinishedPulling="2023-10-02 20:42:05.203422638 +0000 UTC m=+16.866141425" observedRunningTime="2023-10-02 20:42:05.459873389 +0000 UTC m=+17.122592222" watchObservedRunningTime="2023-10-02 20:42:05.460131297 +0000 UTC m=+17.122850102" Oct 2 20:42:07.143000 audit[3026]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=3026 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 20:42:07.171776 kernel: kauditd_printk_skb: 372 callbacks suppressed Oct 2 20:42:07.171823 kernel: audit: type=1325 audit(1696279327.143:1054): table=filter:89 family=2 entries=15 op=nft_register_rule pid=3026 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 20:42:07.143000 audit[3026]: SYSCALL arch=c000003e syscall=46 success=yes exit=5660 a0=3 a1=7ffe761a6210 a2=0 a3=7ffe761a61fc items=0 ppid=2781 pid=3026 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:07.328316 kernel: audit: type=1300 audit(1696279327.143:1054): arch=c000003e syscall=46 success=yes exit=5660 a0=3 a1=7ffe761a6210 a2=0 a3=7ffe761a61fc items=0 ppid=2781 pid=3026 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:07.328359 kernel: audit: type=1327 audit(1696279327.143:1054): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 20:42:07.143000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 20:42:07.358861 kubelet[2560]: I1002 20:42:07.358841 2560 topology_manager.go:212] "Topology Admit Handler" Oct 2 20:42:07.363116 systemd[1]: Created slice kubepods-besteffort-pod6b2b6ac5_7bc3_4bf2_ab89_544a6af864a0.slice. Oct 2 20:42:07.370413 kubelet[2560]: I1002 20:42:07.370392 2560 topology_manager.go:212] "Topology Admit Handler" Oct 2 20:42:07.373566 systemd[1]: Created slice kubepods-besteffort-podeb305c08_5f86_49c5_bc27_158decf78d58.slice. Oct 2 20:42:07.143000 audit[3026]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=3026 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 20:42:07.419828 kubelet[2560]: I1002 20:42:07.419782 2560 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/6b2b6ac5-7bc3-4bf2-ab89-544a6af864a0-typha-certs\") pod \"calico-typha-844d85954d-6jd4r\" (UID: \"6b2b6ac5-7bc3-4bf2-ab89-544a6af864a0\") " pod="calico-system/calico-typha-844d85954d-6jd4r" Oct 2 20:42:07.419828 kubelet[2560]: I1002 20:42:07.419811 2560 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/eb305c08-5f86-49c5-bc27-158decf78d58-lib-modules\") pod \"calico-node-xcgrf\" (UID: \"eb305c08-5f86-49c5-bc27-158decf78d58\") " pod="calico-system/calico-node-xcgrf" Oct 2 20:42:07.419828 kubelet[2560]: I1002 20:42:07.419830 2560 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/eb305c08-5f86-49c5-bc27-158decf78d58-policysync\") pod \"calico-node-xcgrf\" (UID: \"eb305c08-5f86-49c5-bc27-158decf78d58\") " pod="calico-system/calico-node-xcgrf" Oct 2 20:42:07.419984 kubelet[2560]: I1002 20:42:07.419847 2560 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/eb305c08-5f86-49c5-bc27-158decf78d58-node-certs\") pod \"calico-node-xcgrf\" (UID: \"eb305c08-5f86-49c5-bc27-158decf78d58\") " pod="calico-system/calico-node-xcgrf" Oct 2 20:42:07.419984 kubelet[2560]: I1002 20:42:07.419896 2560 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-52482\" (UniqueName: \"kubernetes.io/projected/eb305c08-5f86-49c5-bc27-158decf78d58-kube-api-access-52482\") pod \"calico-node-xcgrf\" (UID: \"eb305c08-5f86-49c5-bc27-158decf78d58\") " pod="calico-system/calico-node-xcgrf" Oct 2 20:42:07.420054 kubelet[2560]: I1002 20:42:07.419986 2560 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/eb305c08-5f86-49c5-bc27-158decf78d58-var-lib-calico\") pod \"calico-node-xcgrf\" (UID: \"eb305c08-5f86-49c5-bc27-158decf78d58\") " pod="calico-system/calico-node-xcgrf" Oct 2 20:42:07.420054 kubelet[2560]: I1002 20:42:07.420021 2560 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/eb305c08-5f86-49c5-bc27-158decf78d58-cni-bin-dir\") pod \"calico-node-xcgrf\" (UID: \"eb305c08-5f86-49c5-bc27-158decf78d58\") " pod="calico-system/calico-node-xcgrf" Oct 2 20:42:07.420054 kubelet[2560]: I1002 20:42:07.420040 2560 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/eb305c08-5f86-49c5-bc27-158decf78d58-cni-net-dir\") pod \"calico-node-xcgrf\" (UID: \"eb305c08-5f86-49c5-bc27-158decf78d58\") " pod="calico-system/calico-node-xcgrf" Oct 2 20:42:07.420148 kubelet[2560]: I1002 20:42:07.420060 2560 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/eb305c08-5f86-49c5-bc27-158decf78d58-cni-log-dir\") pod \"calico-node-xcgrf\" (UID: \"eb305c08-5f86-49c5-bc27-158decf78d58\") " pod="calico-system/calico-node-xcgrf" Oct 2 20:42:07.420148 kubelet[2560]: I1002 20:42:07.420102 2560 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/eb305c08-5f86-49c5-bc27-158decf78d58-flexvol-driver-host\") pod \"calico-node-xcgrf\" (UID: \"eb305c08-5f86-49c5-bc27-158decf78d58\") " pod="calico-system/calico-node-xcgrf" Oct 2 20:42:07.420148 kubelet[2560]: I1002 20:42:07.420136 2560 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/6b2b6ac5-7bc3-4bf2-ab89-544a6af864a0-tigera-ca-bundle\") pod \"calico-typha-844d85954d-6jd4r\" (UID: \"6b2b6ac5-7bc3-4bf2-ab89-544a6af864a0\") " pod="calico-system/calico-typha-844d85954d-6jd4r" Oct 2 20:42:07.420284 kubelet[2560]: I1002 20:42:07.420164 2560 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/eb305c08-5f86-49c5-bc27-158decf78d58-tigera-ca-bundle\") pod \"calico-node-xcgrf\" (UID: \"eb305c08-5f86-49c5-bc27-158decf78d58\") " pod="calico-system/calico-node-xcgrf" Oct 2 20:42:07.420284 kubelet[2560]: I1002 20:42:07.420203 2560 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/eb305c08-5f86-49c5-bc27-158decf78d58-var-run-calico\") pod \"calico-node-xcgrf\" (UID: \"eb305c08-5f86-49c5-bc27-158decf78d58\") " pod="calico-system/calico-node-xcgrf" Oct 2 20:42:07.420284 kubelet[2560]: I1002 20:42:07.420282 2560 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-7zspd\" (UniqueName: \"kubernetes.io/projected/6b2b6ac5-7bc3-4bf2-ab89-544a6af864a0-kube-api-access-7zspd\") pod \"calico-typha-844d85954d-6jd4r\" (UID: \"6b2b6ac5-7bc3-4bf2-ab89-544a6af864a0\") " pod="calico-system/calico-typha-844d85954d-6jd4r" Oct 2 20:42:07.420391 kubelet[2560]: I1002 20:42:07.420328 2560 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/eb305c08-5f86-49c5-bc27-158decf78d58-xtables-lock\") pod \"calico-node-xcgrf\" (UID: \"eb305c08-5f86-49c5-bc27-158decf78d58\") " pod="calico-system/calico-node-xcgrf" Oct 2 20:42:07.143000 audit[3026]: SYSCALL arch=c000003e syscall=46 success=yes exit=2572 a0=3 a1=7ffe761a6210 a2=0 a3=31030 items=0 ppid=2781 pid=3026 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:07.521034 kubelet[2560]: E1002 20:42:07.521007 2560 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 20:42:07.521034 kubelet[2560]: W1002 20:42:07.521019 2560 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 20:42:07.521034 kubelet[2560]: E1002 20:42:07.521035 2560 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 20:42:07.521473 kubelet[2560]: E1002 20:42:07.521437 2560 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 20:42:07.521473 kubelet[2560]: W1002 20:42:07.521443 2560 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 20:42:07.521473 kubelet[2560]: E1002 20:42:07.521451 2560 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 20:42:07.521569 kubelet[2560]: E1002 20:42:07.521561 2560 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 20:42:07.521594 kubelet[2560]: W1002 20:42:07.521570 2560 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 20:42:07.521594 kubelet[2560]: E1002 20:42:07.521582 2560 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 20:42:07.522342 kubelet[2560]: E1002 20:42:07.522334 2560 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 20:42:07.522342 kubelet[2560]: W1002 20:42:07.522341 2560 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 20:42:07.522409 kubelet[2560]: E1002 20:42:07.522350 2560 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 20:42:07.522502 kubelet[2560]: E1002 20:42:07.522495 2560 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 20:42:07.522502 kubelet[2560]: W1002 20:42:07.522500 2560 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 20:42:07.522570 kubelet[2560]: E1002 20:42:07.522507 2560 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 20:42:07.526337 kubelet[2560]: E1002 20:42:07.526326 2560 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 20:42:07.526337 kubelet[2560]: W1002 20:42:07.526333 2560 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 20:42:07.526423 kubelet[2560]: E1002 20:42:07.526341 2560 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 20:42:07.526518 kubelet[2560]: E1002 20:42:07.526510 2560 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 20:42:07.526518 kubelet[2560]: W1002 20:42:07.526516 2560 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 20:42:07.526595 kubelet[2560]: E1002 20:42:07.526524 2560 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 20:42:07.551683 kernel: audit: type=1325 audit(1696279327.143:1055): table=nat:90 family=2 entries=12 op=nft_register_rule pid=3026 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 20:42:07.551712 kernel: audit: type=1300 audit(1696279327.143:1055): arch=c000003e syscall=46 success=yes exit=2572 a0=3 a1=7ffe761a6210 a2=0 a3=31030 items=0 ppid=2781 pid=3026 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:07.551725 kernel: audit: type=1327 audit(1696279327.143:1055): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 20:42:07.143000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 20:42:07.400000 audit[3028]: NETFILTER_CFG table=filter:91 family=2 entries=16 op=nft_register_rule pid=3028 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 20:42:07.400000 audit[3028]: SYSCALL arch=c000003e syscall=46 success=yes exit=5660 a0=3 a1=7ffde80e6d20 a2=0 a3=7ffde80e6d0c items=0 ppid=2781 pid=3028 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:07.670928 env[1465]: time="2023-10-02T20:42:07.670903310Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-844d85954d-6jd4r,Uid:6b2b6ac5-7bc3-4bf2-ab89-544a6af864a0,Namespace:calico-system,Attempt:0,}" Oct 2 20:42:07.675102 env[1465]: time="2023-10-02T20:42:07.675086304Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-xcgrf,Uid:eb305c08-5f86-49c5-bc27-158decf78d58,Namespace:calico-system,Attempt:0,}" Oct 2 20:42:07.676970 env[1465]: time="2023-10-02T20:42:07.676942530Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 20:42:07.676970 env[1465]: time="2023-10-02T20:42:07.676962799Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 20:42:07.677045 env[1465]: time="2023-10-02T20:42:07.676978809Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 20:42:07.677072 env[1465]: time="2023-10-02T20:42:07.677057015Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/43282b2100e26e7fc3b47376e3f4cd13ca8604e749e21e27179bfe358f878e11 pid=3048 runtime=io.containerd.runc.v2 Oct 2 20:42:07.680265 env[1465]: time="2023-10-02T20:42:07.680211429Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 20:42:07.680265 env[1465]: time="2023-10-02T20:42:07.680231163Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 20:42:07.680265 env[1465]: time="2023-10-02T20:42:07.680237943Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 20:42:07.680381 env[1465]: time="2023-10-02T20:42:07.680297266Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/89b879e5876491c86efa6aa53ad0d774c4b4ee2084a79afcfe232e9b5b664a84 pid=3072 runtime=io.containerd.runc.v2 Oct 2 20:42:07.699621 systemd[1]: Started cri-containerd-89b879e5876491c86efa6aa53ad0d774c4b4ee2084a79afcfe232e9b5b664a84.scope. Oct 2 20:42:07.768261 kernel: audit: type=1325 audit(1696279327.400:1056): table=filter:91 family=2 entries=16 op=nft_register_rule pid=3028 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 20:42:07.768337 kernel: audit: type=1300 audit(1696279327.400:1056): arch=c000003e syscall=46 success=yes exit=5660 a0=3 a1=7ffde80e6d20 a2=0 a3=7ffde80e6d0c items=0 ppid=2781 pid=3028 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:07.768374 kernel: audit: type=1327 audit(1696279327.400:1056): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 20:42:07.400000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 20:42:07.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:07.827964 systemd[1]: Started cri-containerd-43282b2100e26e7fc3b47376e3f4cd13ca8604e749e21e27179bfe358f878e11.scope. Oct 2 20:42:07.890185 kernel: audit: type=1400 audit(1696279327.772:1057): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:07.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:07.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:07.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:07.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:07.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:07.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:07.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:07.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:07.825000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:07.825000 audit: BPF prog-id=121 op=LOAD Oct 2 20:42:07.825000 audit[3082]: AVC avc: denied { bpf } for pid=3082 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:07.825000 audit[3082]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=3072 pid=3082 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:07.825000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839623837396535383736343931633836656661366161353361643064 Oct 2 20:42:07.825000 audit[3082]: AVC avc: denied { perfmon } for pid=3082 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:07.825000 audit[3082]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=3072 pid=3082 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:07.825000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839623837396535383736343931633836656661366161353361643064 Oct 2 20:42:07.825000 audit[3082]: AVC avc: denied { bpf } for pid=3082 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:07.825000 audit[3082]: AVC avc: denied { bpf } for pid=3082 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:07.825000 audit[3082]: AVC avc: denied { bpf } for pid=3082 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:07.825000 audit[3082]: AVC avc: denied { perfmon } for pid=3082 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:07.825000 audit[3082]: AVC avc: denied { perfmon } for pid=3082 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:07.825000 audit[3082]: AVC avc: denied { perfmon } for pid=3082 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:07.825000 audit[3082]: AVC avc: denied { perfmon } for pid=3082 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:07.825000 audit[3082]: AVC avc: denied { perfmon } for pid=3082 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:07.825000 audit[3082]: AVC avc: denied { bpf } for pid=3082 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:07.611000 audit[3028]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=3028 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 20:42:07.611000 audit[3028]: SYSCALL arch=c000003e syscall=46 success=yes exit=2572 a0=3 a1=7ffde80e6d20 a2=0 a3=31030 items=0 ppid=2781 pid=3028 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:07.611000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 20:42:07.831000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:07.831000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:07.831000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:07.831000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:07.831000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:07.831000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:07.831000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:07.831000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:07.831000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:07.825000 audit[3082]: AVC avc: denied { bpf } for pid=3082 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:07.825000 audit: BPF prog-id=122 op=LOAD Oct 2 20:42:07.889000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:07.889000 audit: BPF prog-id=123 op=LOAD Oct 2 20:42:07.825000 audit[3082]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0002bd410 items=0 ppid=3072 pid=3082 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:07.825000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839623837396535383736343931633836656661366161353361643064 Oct 2 20:42:07.889000 audit[3082]: AVC avc: denied { bpf } for pid=3082 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:07.889000 audit[3082]: AVC avc: denied { bpf } for pid=3082 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:07.889000 audit[3082]: AVC avc: denied { perfmon } for pid=3082 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:07.889000 audit[3082]: AVC avc: denied { perfmon } for pid=3082 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:07.889000 audit[3082]: AVC avc: denied { perfmon } for pid=3082 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:07.889000 audit[3082]: AVC avc: denied { perfmon } for pid=3082 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:07.889000 audit[3082]: AVC avc: denied { perfmon } for pid=3082 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:07.889000 audit[3082]: AVC avc: denied { bpf } for pid=3082 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:07.889000 audit[3082]: AVC avc: denied { bpf } for pid=3082 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:07.889000 audit: BPF prog-id=124 op=LOAD Oct 2 20:42:07.889000 audit[3082]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0002bd458 items=0 ppid=3072 pid=3082 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:07.889000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839623837396535383736343931633836656661366161353361643064 Oct 2 20:42:07.889000 audit: BPF prog-id=124 op=UNLOAD Oct 2 20:42:07.889000 audit: BPF prog-id=122 op=UNLOAD Oct 2 20:42:07.889000 audit[3082]: AVC avc: denied { bpf } for pid=3082 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:07.889000 audit[3082]: AVC avc: denied { bpf } for pid=3082 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:07.889000 audit[3082]: AVC avc: denied { bpf } for pid=3082 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:07.889000 audit[3082]: AVC avc: denied { perfmon } for pid=3082 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:07.889000 audit[3082]: AVC avc: denied { perfmon } for pid=3082 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:07.889000 audit[3082]: AVC avc: denied { perfmon } for pid=3082 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:07.889000 audit[3082]: AVC avc: denied { perfmon } for pid=3082 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:07.889000 audit[3082]: AVC avc: denied { perfmon } for pid=3082 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:07.889000 audit[3082]: AVC avc: denied { bpf } for pid=3082 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:07.889000 audit[3059]: AVC avc: denied { bpf } for pid=3059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:07.889000 audit[3059]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3048 pid=3059 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:07.889000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433323832623231303065323665376663336234373337366533663463 Oct 2 20:42:07.889000 audit[3059]: AVC avc: denied { perfmon } for pid=3059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:07.889000 audit[3082]: AVC avc: denied { bpf } for pid=3082 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:07.889000 audit: BPF prog-id=125 op=LOAD Oct 2 20:42:07.889000 audit[3082]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0002bd868 items=0 ppid=3072 pid=3082 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:07.889000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839623837396535383736343931633836656661366161353361643064 Oct 2 20:42:07.889000 audit[3059]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3048 pid=3059 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:07.889000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433323832623231303065323665376663336234373337366533663463 Oct 2 20:42:07.889000 audit[3059]: AVC avc: denied { bpf } for pid=3059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:07.889000 audit[3059]: AVC avc: denied { bpf } for pid=3059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:07.889000 audit[3059]: AVC avc: denied { bpf } for pid=3059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:07.889000 audit[3059]: AVC avc: denied { perfmon } for pid=3059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:07.889000 audit[3059]: AVC avc: denied { perfmon } for pid=3059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:07.889000 audit[3059]: AVC avc: denied { perfmon } for pid=3059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:07.889000 audit[3059]: AVC avc: denied { perfmon } for pid=3059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:07.889000 audit[3059]: AVC avc: denied { perfmon } for pid=3059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:07.889000 audit[3059]: AVC avc: denied { bpf } for pid=3059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:07.889000 audit[3059]: AVC avc: denied { bpf } for pid=3059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:07.889000 audit: BPF prog-id=126 op=LOAD Oct 2 20:42:07.889000 audit[3059]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0002a0700 items=0 ppid=3048 pid=3059 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:07.889000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433323832623231303065323665376663336234373337366533663463 Oct 2 20:42:07.889000 audit[3059]: AVC avc: denied { bpf } for pid=3059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:07.889000 audit[3059]: AVC avc: denied { bpf } for pid=3059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:07.889000 audit[3059]: AVC avc: denied { perfmon } for pid=3059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:07.889000 audit[3059]: AVC avc: denied { perfmon } for pid=3059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:07.889000 audit[3059]: AVC avc: denied { perfmon } for pid=3059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:07.889000 audit[3059]: AVC avc: denied { perfmon } for pid=3059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:07.889000 audit[3059]: AVC avc: denied { perfmon } for pid=3059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:07.889000 audit[3059]: AVC avc: denied { bpf } for pid=3059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:07.889000 audit[3059]: AVC avc: denied { bpf } for pid=3059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:07.889000 audit: BPF prog-id=127 op=LOAD Oct 2 20:42:07.889000 audit[3059]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0002a0748 items=0 ppid=3048 pid=3059 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:07.889000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433323832623231303065323665376663336234373337366533663463 Oct 2 20:42:07.889000 audit: BPF prog-id=127 op=UNLOAD Oct 2 20:42:07.889000 audit: BPF prog-id=126 op=UNLOAD Oct 2 20:42:07.889000 audit[3059]: AVC avc: denied { bpf } for pid=3059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:07.889000 audit[3059]: AVC avc: denied { bpf } for pid=3059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:07.889000 audit[3059]: AVC avc: denied { bpf } for pid=3059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:07.889000 audit[3059]: AVC avc: denied { perfmon } for pid=3059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:07.889000 audit[3059]: AVC avc: denied { perfmon } for pid=3059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:07.889000 audit[3059]: AVC avc: denied { perfmon } for pid=3059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:07.889000 audit[3059]: AVC avc: denied { perfmon } for pid=3059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:07.889000 audit[3059]: AVC avc: denied { perfmon } for pid=3059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:07.889000 audit[3059]: AVC avc: denied { bpf } for pid=3059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:07.889000 audit[3059]: AVC avc: denied { bpf } for pid=3059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:07.889000 audit: BPF prog-id=128 op=LOAD Oct 2 20:42:07.889000 audit[3059]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0002a0b58 items=0 ppid=3048 pid=3059 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:07.889000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433323832623231303065323665376663336234373337366533663463 Oct 2 20:42:07.908158 env[1465]: time="2023-10-02T20:42:07.908128147Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-xcgrf,Uid:eb305c08-5f86-49c5-bc27-158decf78d58,Namespace:calico-system,Attempt:0,} returns sandbox id \"89b879e5876491c86efa6aa53ad0d774c4b4ee2084a79afcfe232e9b5b664a84\"" Oct 2 20:42:07.908858 env[1465]: time="2023-10-02T20:42:07.908846554Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.25.0\"" Oct 2 20:42:07.919846 env[1465]: time="2023-10-02T20:42:07.919820151Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-844d85954d-6jd4r,Uid:6b2b6ac5-7bc3-4bf2-ab89-544a6af864a0,Namespace:calico-system,Attempt:0,} returns sandbox id \"43282b2100e26e7fc3b47376e3f4cd13ca8604e749e21e27179bfe358f878e11\"" Oct 2 20:42:09.424212 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1708000602.mount: Deactivated successfully. Oct 2 20:42:11.356728 env[1465]: time="2023-10-02T20:42:11.356702279Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:42:11.357507 env[1465]: time="2023-10-02T20:42:11.357495624Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ed8b7bbb113fecfcce8e15c7d7232b3fe31ed6f37b04df455f6a3f2bc8695d72,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:42:11.359054 env[1465]: time="2023-10-02T20:42:11.359012952Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:42:11.359951 env[1465]: time="2023-10-02T20:42:11.359908128Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:182a323c25a3503be8c504892a12a55d99a42c3a582cb8e93a1ecc7c193a44c5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:42:11.360884 env[1465]: time="2023-10-02T20:42:11.360841819Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.25.0\" returns image reference \"sha256:ed8b7bbb113fecfcce8e15c7d7232b3fe31ed6f37b04df455f6a3f2bc8695d72\"" Oct 2 20:42:11.361086 env[1465]: time="2023-10-02T20:42:11.361034419Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.25.0\"" Oct 2 20:42:11.361847 env[1465]: time="2023-10-02T20:42:11.361773613Z" level=info msg="CreateContainer within sandbox \"89b879e5876491c86efa6aa53ad0d774c4b4ee2084a79afcfe232e9b5b664a84\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Oct 2 20:42:11.367162 env[1465]: time="2023-10-02T20:42:11.367117959Z" level=info msg="CreateContainer within sandbox \"89b879e5876491c86efa6aa53ad0d774c4b4ee2084a79afcfe232e9b5b664a84\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"3d7b5bdd227f4e9045ebeb331bf01a594556ec8c3c4a26d262c4aafe20f710dc\"" Oct 2 20:42:11.367438 env[1465]: time="2023-10-02T20:42:11.367385691Z" level=info msg="StartContainer for \"3d7b5bdd227f4e9045ebeb331bf01a594556ec8c3c4a26d262c4aafe20f710dc\"" Oct 2 20:42:11.389397 systemd[1]: Started cri-containerd-3d7b5bdd227f4e9045ebeb331bf01a594556ec8c3c4a26d262c4aafe20f710dc.scope. Oct 2 20:42:11.396000 audit[3129]: AVC avc: denied { perfmon } for pid=3129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:11.396000 audit[3129]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3072 pid=3129 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:11.396000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364376235626464323237663465393034356562656233333162663031 Oct 2 20:42:11.396000 audit[3129]: AVC avc: denied { bpf } for pid=3129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:11.396000 audit[3129]: AVC avc: denied { bpf } for pid=3129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:11.396000 audit[3129]: AVC avc: denied { bpf } for pid=3129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:11.396000 audit[3129]: AVC avc: denied { perfmon } for pid=3129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:11.396000 audit[3129]: AVC avc: denied { perfmon } for pid=3129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:11.396000 audit[3129]: AVC avc: denied { perfmon } for pid=3129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:11.396000 audit[3129]: AVC avc: denied { perfmon } for pid=3129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:11.396000 audit[3129]: AVC avc: denied { perfmon } for pid=3129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:11.396000 audit[3129]: AVC avc: denied { bpf } for pid=3129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:11.396000 audit[3129]: AVC avc: denied { bpf } for pid=3129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:11.396000 audit: BPF prog-id=129 op=LOAD Oct 2 20:42:11.396000 audit[3129]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c00032dc10 items=0 ppid=3072 pid=3129 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:11.396000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364376235626464323237663465393034356562656233333162663031 Oct 2 20:42:11.396000 audit[3129]: AVC avc: denied { bpf } for pid=3129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:11.396000 audit[3129]: AVC avc: denied { bpf } for pid=3129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:11.396000 audit[3129]: AVC avc: denied { perfmon } for pid=3129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:11.396000 audit[3129]: AVC avc: denied { perfmon } for pid=3129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:11.396000 audit[3129]: AVC avc: denied { perfmon } for pid=3129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:11.396000 audit[3129]: AVC avc: denied { perfmon } for pid=3129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:11.396000 audit[3129]: AVC avc: denied { perfmon } for pid=3129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:11.396000 audit[3129]: AVC avc: denied { bpf } for pid=3129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:11.396000 audit[3129]: AVC avc: denied { bpf } for pid=3129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:11.396000 audit: BPF prog-id=130 op=LOAD Oct 2 20:42:11.396000 audit[3129]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c00032dc58 items=0 ppid=3072 pid=3129 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:11.396000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364376235626464323237663465393034356562656233333162663031 Oct 2 20:42:11.397000 audit: BPF prog-id=130 op=UNLOAD Oct 2 20:42:11.397000 audit: BPF prog-id=129 op=UNLOAD Oct 2 20:42:11.397000 audit[3129]: AVC avc: denied { bpf } for pid=3129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:11.397000 audit[3129]: AVC avc: denied { bpf } for pid=3129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:11.397000 audit[3129]: AVC avc: denied { bpf } for pid=3129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:11.397000 audit[3129]: AVC avc: denied { perfmon } for pid=3129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:11.397000 audit[3129]: AVC avc: denied { perfmon } for pid=3129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:11.397000 audit[3129]: AVC avc: denied { perfmon } for pid=3129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:11.397000 audit[3129]: AVC avc: denied { perfmon } for pid=3129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:11.397000 audit[3129]: AVC avc: denied { perfmon } for pid=3129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:11.397000 audit[3129]: AVC avc: denied { bpf } for pid=3129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:11.397000 audit[3129]: AVC avc: denied { bpf } for pid=3129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:11.397000 audit: BPF prog-id=131 op=LOAD Oct 2 20:42:11.397000 audit[3129]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c00032dce8 items=0 ppid=3072 pid=3129 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:11.397000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364376235626464323237663465393034356562656233333162663031 Oct 2 20:42:11.415477 env[1465]: time="2023-10-02T20:42:11.415449791Z" level=info msg="StartContainer for \"3d7b5bdd227f4e9045ebeb331bf01a594556ec8c3c4a26d262c4aafe20f710dc\" returns successfully" Oct 2 20:42:11.420756 systemd[1]: cri-containerd-3d7b5bdd227f4e9045ebeb331bf01a594556ec8c3c4a26d262c4aafe20f710dc.scope: Deactivated successfully. Oct 2 20:42:11.431000 audit: BPF prog-id=131 op=UNLOAD Oct 2 20:42:11.434333 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-3d7b5bdd227f4e9045ebeb331bf01a594556ec8c3c4a26d262c4aafe20f710dc-rootfs.mount: Deactivated successfully. Oct 2 20:42:11.655034 env[1465]: time="2023-10-02T20:42:11.654907581Z" level=info msg="shim disconnected" id=3d7b5bdd227f4e9045ebeb331bf01a594556ec8c3c4a26d262c4aafe20f710dc Oct 2 20:42:11.655034 env[1465]: time="2023-10-02T20:42:11.654995755Z" level=warning msg="cleaning up after shim disconnected" id=3d7b5bdd227f4e9045ebeb331bf01a594556ec8c3c4a26d262c4aafe20f710dc namespace=k8s.io Oct 2 20:42:11.655034 env[1465]: time="2023-10-02T20:42:11.655021862Z" level=info msg="cleaning up dead shim" Oct 2 20:42:11.684572 env[1465]: time="2023-10-02T20:42:11.684453343Z" level=warning msg="cleanup warnings time=\"2023-10-02T20:42:11Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3173 runtime=io.containerd.runc.v2\n" Oct 2 20:42:12.888634 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2567847503.mount: Deactivated successfully. Oct 2 20:42:14.485511 env[1465]: time="2023-10-02T20:42:14.485458643Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:42:14.486069 env[1465]: time="2023-10-02T20:42:14.486017913Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7b60c7012b1c9f468779a685b9b50ddfd754f2d92ea6769a681942aafb2d113f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:42:14.487599 env[1465]: time="2023-10-02T20:42:14.487558625Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:42:14.489541 env[1465]: time="2023-10-02T20:42:14.489504437Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:7fb0e011ffae9f88333b7a7488dae37f1d534b46d2b11a0fe2b5d129df58789c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:42:14.489933 env[1465]: time="2023-10-02T20:42:14.489888737Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.25.0\" returns image reference \"sha256:7b60c7012b1c9f468779a685b9b50ddfd754f2d92ea6769a681942aafb2d113f\"" Oct 2 20:42:14.490285 env[1465]: time="2023-10-02T20:42:14.490241323Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.25.0\"" Oct 2 20:42:14.491827 env[1465]: time="2023-10-02T20:42:14.491693668Z" level=info msg="CreateContainer within sandbox \"43282b2100e26e7fc3b47376e3f4cd13ca8604e749e21e27179bfe358f878e11\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Oct 2 20:42:14.496214 env[1465]: time="2023-10-02T20:42:14.496198151Z" level=info msg="CreateContainer within sandbox \"43282b2100e26e7fc3b47376e3f4cd13ca8604e749e21e27179bfe358f878e11\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"8cbb67dada388d26e40cd582fdb7111cbb65c30b44a2b566d2f4b6223a631e45\"" Oct 2 20:42:14.496652 env[1465]: time="2023-10-02T20:42:14.496570337Z" level=info msg="StartContainer for \"8cbb67dada388d26e40cd582fdb7111cbb65c30b44a2b566d2f4b6223a631e45\"" Oct 2 20:42:14.519085 systemd[1]: Started cri-containerd-8cbb67dada388d26e40cd582fdb7111cbb65c30b44a2b566d2f4b6223a631e45.scope. Oct 2 20:42:14.524000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:14.551250 kernel: kauditd_printk_skb: 160 callbacks suppressed Oct 2 20:42:14.551289 kernel: audit: type=1400 audit(1696279334.524:1101): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:14.524000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:14.677820 kernel: audit: type=1400 audit(1696279334.524:1102): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:14.677863 kernel: audit: type=1400 audit(1696279334.524:1103): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:14.524000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:14.524000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:14.804806 kernel: audit: type=1400 audit(1696279334.524:1104): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:14.804848 kernel: audit: type=1400 audit(1696279334.524:1105): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:14.524000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:14.524000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:14.932426 kernel: audit: type=1400 audit(1696279334.524:1106): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:14.932462 kernel: audit: type=1400 audit(1696279334.524:1107): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:14.524000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:14.524000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:15.060284 kernel: audit: type=1400 audit(1696279334.524:1108): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:15.060326 kernel: audit: type=1400 audit(1696279334.524:1109): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:14.524000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:15.123772 kernel: audit: type=1400 audit(1696279334.614:1110): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:14.614000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:14.614000 audit: BPF prog-id=132 op=LOAD Oct 2 20:42:14.614000 audit[3192]: AVC avc: denied { bpf } for pid=3192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:14.614000 audit[3192]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=3048 pid=3192 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:14.614000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863626236376461646133383864323665343063643538326664623731 Oct 2 20:42:14.614000 audit[3192]: AVC avc: denied { perfmon } for pid=3192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:14.614000 audit[3192]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=3048 pid=3192 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:14.614000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863626236376461646133383864323665343063643538326664623731 Oct 2 20:42:14.614000 audit[3192]: AVC avc: denied { bpf } for pid=3192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:14.614000 audit[3192]: AVC avc: denied { bpf } for pid=3192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:14.614000 audit[3192]: AVC avc: denied { bpf } for pid=3192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:14.614000 audit[3192]: AVC avc: denied { perfmon } for pid=3192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:14.614000 audit[3192]: AVC avc: denied { perfmon } for pid=3192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:14.614000 audit[3192]: AVC avc: denied { perfmon } for pid=3192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:14.614000 audit[3192]: AVC avc: denied { perfmon } for pid=3192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:14.614000 audit[3192]: AVC avc: denied { perfmon } for pid=3192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:14.614000 audit[3192]: AVC avc: denied { bpf } for pid=3192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:14.614000 audit[3192]: AVC avc: denied { bpf } for pid=3192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:14.614000 audit: BPF prog-id=133 op=LOAD Oct 2 20:42:14.614000 audit[3192]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0001c5090 items=0 ppid=3048 pid=3192 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:14.614000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863626236376461646133383864323665343063643538326664623731 Oct 2 20:42:14.740000 audit[3192]: AVC avc: denied { bpf } for pid=3192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:14.740000 audit[3192]: AVC avc: denied { bpf } for pid=3192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:14.740000 audit[3192]: AVC avc: denied { perfmon } for pid=3192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:14.740000 audit[3192]: AVC avc: denied { perfmon } for pid=3192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:14.740000 audit[3192]: AVC avc: denied { perfmon } for pid=3192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:14.740000 audit[3192]: AVC avc: denied { perfmon } for pid=3192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:14.740000 audit[3192]: AVC avc: denied { perfmon } for pid=3192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:14.740000 audit[3192]: AVC avc: denied { bpf } for pid=3192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:14.740000 audit[3192]: AVC avc: denied { bpf } for pid=3192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:14.740000 audit: BPF prog-id=134 op=LOAD Oct 2 20:42:14.740000 audit[3192]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0001c50d8 items=0 ppid=3048 pid=3192 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:14.740000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863626236376461646133383864323665343063643538326664623731 Oct 2 20:42:14.867000 audit: BPF prog-id=134 op=UNLOAD Oct 2 20:42:14.867000 audit: BPF prog-id=133 op=UNLOAD Oct 2 20:42:14.867000 audit[3192]: AVC avc: denied { bpf } for pid=3192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:14.867000 audit[3192]: AVC avc: denied { bpf } for pid=3192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:14.867000 audit[3192]: AVC avc: denied { bpf } for pid=3192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:14.867000 audit[3192]: AVC avc: denied { perfmon } for pid=3192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:14.867000 audit[3192]: AVC avc: denied { perfmon } for pid=3192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:14.867000 audit[3192]: AVC avc: denied { perfmon } for pid=3192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:14.867000 audit[3192]: AVC avc: denied { perfmon } for pid=3192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:14.867000 audit[3192]: AVC avc: denied { perfmon } for pid=3192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:14.867000 audit[3192]: AVC avc: denied { bpf } for pid=3192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:14.867000 audit[3192]: AVC avc: denied { bpf } for pid=3192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:14.867000 audit: BPF prog-id=135 op=LOAD Oct 2 20:42:14.867000 audit[3192]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0001c54e8 items=0 ppid=3048 pid=3192 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:14.867000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863626236376461646133383864323665343063643538326664623731 Oct 2 20:42:15.204835 env[1465]: time="2023-10-02T20:42:15.204783202Z" level=info msg="StartContainer for \"8cbb67dada388d26e40cd582fdb7111cbb65c30b44a2b566d2f4b6223a631e45\" returns successfully" Oct 2 20:42:15.491819 kubelet[2560]: I1002 20:42:15.491766 2560 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-typha-844d85954d-6jd4r" podStartSLOduration=1.922000578 podCreationTimestamp="2023-10-02 20:42:07 +0000 UTC" firstStartedPulling="2023-10-02 20:42:07.920433008 +0000 UTC m=+19.583151764" lastFinishedPulling="2023-10-02 20:42:14.49011856 +0000 UTC m=+26.152837315" observedRunningTime="2023-10-02 20:42:15.491137599 +0000 UTC m=+27.153856444" watchObservedRunningTime="2023-10-02 20:42:15.491686129 +0000 UTC m=+27.154404927" Oct 2 20:42:15.529000 audit[3238]: NETFILTER_CFG table=filter:93 family=2 entries=15 op=nft_register_rule pid=3238 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 20:42:15.529000 audit[3238]: SYSCALL arch=c000003e syscall=46 success=yes exit=4956 a0=3 a1=7ffe00ea8ed0 a2=0 a3=7ffe00ea8ebc items=0 ppid=2781 pid=3238 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:15.529000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 20:42:15.531000 audit[3238]: NETFILTER_CFG table=nat:94 family=2 entries=19 op=nft_register_chain pid=3238 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 20:42:15.531000 audit[3238]: SYSCALL arch=c000003e syscall=46 success=yes exit=6068 a0=3 a1=7ffe00ea8ed0 a2=0 a3=7ffe00ea8ebc items=0 ppid=2781 pid=3238 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:15.531000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 20:42:15.944138 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2835807987.mount: Deactivated successfully. Oct 2 20:42:19.054024 env[1465]: time="2023-10-02T20:42:19.053996125Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:42:19.054632 env[1465]: time="2023-10-02T20:42:19.054602846Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d70a5947d57e5ab3340d126a38e6ae51bd9e8e0b342daa2012e78d8868bed5b7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:42:19.055785 env[1465]: time="2023-10-02T20:42:19.055771654Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:42:19.056452 env[1465]: time="2023-10-02T20:42:19.056438535Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:34bf454be8cd5b9a35ab29c2479ff68a26497c2c87eb606e4bfe57c7fbeeff35,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:42:19.056851 env[1465]: time="2023-10-02T20:42:19.056806501Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.25.0\" returns image reference \"sha256:d70a5947d57e5ab3340d126a38e6ae51bd9e8e0b342daa2012e78d8868bed5b7\"" Oct 2 20:42:19.057923 env[1465]: time="2023-10-02T20:42:19.057891531Z" level=info msg="CreateContainer within sandbox \"89b879e5876491c86efa6aa53ad0d774c4b4ee2084a79afcfe232e9b5b664a84\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Oct 2 20:42:19.063788 env[1465]: time="2023-10-02T20:42:19.063769531Z" level=info msg="CreateContainer within sandbox \"89b879e5876491c86efa6aa53ad0d774c4b4ee2084a79afcfe232e9b5b664a84\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"8f28b1f6717e162ae1a19c4ec9fb0133cc1d2826eff1413f65c1c758e00c2be8\"" Oct 2 20:42:19.064129 env[1465]: time="2023-10-02T20:42:19.064071046Z" level=info msg="StartContainer for \"8f28b1f6717e162ae1a19c4ec9fb0133cc1d2826eff1413f65c1c758e00c2be8\"" Oct 2 20:42:19.064080 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4279845324.mount: Deactivated successfully. Oct 2 20:42:19.114438 systemd[1]: Started cri-containerd-8f28b1f6717e162ae1a19c4ec9fb0133cc1d2826eff1413f65c1c758e00c2be8.scope. Oct 2 20:42:19.120000 audit[3247]: AVC avc: denied { perfmon } for pid=3247 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:19.120000 audit[3247]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3072 pid=3247 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:19.120000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866323862316636373137653136326165316131396334656339666230 Oct 2 20:42:19.120000 audit[3247]: AVC avc: denied { bpf } for pid=3247 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:19.120000 audit[3247]: AVC avc: denied { bpf } for pid=3247 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:19.120000 audit[3247]: AVC avc: denied { bpf } for pid=3247 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:19.120000 audit[3247]: AVC avc: denied { perfmon } for pid=3247 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:19.120000 audit[3247]: AVC avc: denied { perfmon } for pid=3247 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:19.120000 audit[3247]: AVC avc: denied { perfmon } for pid=3247 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:19.120000 audit[3247]: AVC avc: denied { perfmon } for pid=3247 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:19.120000 audit[3247]: AVC avc: denied { perfmon } for pid=3247 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:19.120000 audit[3247]: AVC avc: denied { bpf } for pid=3247 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:19.120000 audit[3247]: AVC avc: denied { bpf } for pid=3247 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:19.120000 audit: BPF prog-id=136 op=LOAD Oct 2 20:42:19.120000 audit[3247]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0000fdcb0 items=0 ppid=3072 pid=3247 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:19.120000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866323862316636373137653136326165316131396334656339666230 Oct 2 20:42:19.120000 audit[3247]: AVC avc: denied { bpf } for pid=3247 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:19.120000 audit[3247]: AVC avc: denied { bpf } for pid=3247 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:19.120000 audit[3247]: AVC avc: denied { perfmon } for pid=3247 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:19.120000 audit[3247]: AVC avc: denied { perfmon } for pid=3247 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:19.120000 audit[3247]: AVC avc: denied { perfmon } for pid=3247 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:19.120000 audit[3247]: AVC avc: denied { perfmon } for pid=3247 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:19.120000 audit[3247]: AVC avc: denied { perfmon } for pid=3247 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:19.120000 audit[3247]: AVC avc: denied { bpf } for pid=3247 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:19.120000 audit[3247]: AVC avc: denied { bpf } for pid=3247 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:19.120000 audit: BPF prog-id=137 op=LOAD Oct 2 20:42:19.120000 audit[3247]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0000fdcf8 items=0 ppid=3072 pid=3247 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:19.120000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866323862316636373137653136326165316131396334656339666230 Oct 2 20:42:19.120000 audit: BPF prog-id=137 op=UNLOAD Oct 2 20:42:19.120000 audit: BPF prog-id=136 op=UNLOAD Oct 2 20:42:19.120000 audit[3247]: AVC avc: denied { bpf } for pid=3247 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:19.120000 audit[3247]: AVC avc: denied { bpf } for pid=3247 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:19.120000 audit[3247]: AVC avc: denied { bpf } for pid=3247 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:19.120000 audit[3247]: AVC avc: denied { perfmon } for pid=3247 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:19.120000 audit[3247]: AVC avc: denied { perfmon } for pid=3247 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:19.120000 audit[3247]: AVC avc: denied { perfmon } for pid=3247 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:19.120000 audit[3247]: AVC avc: denied { perfmon } for pid=3247 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:19.120000 audit[3247]: AVC avc: denied { perfmon } for pid=3247 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:19.120000 audit[3247]: AVC avc: denied { bpf } for pid=3247 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:19.120000 audit[3247]: AVC avc: denied { bpf } for pid=3247 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:19.120000 audit: BPF prog-id=138 op=LOAD Oct 2 20:42:19.120000 audit[3247]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0000fdd88 items=0 ppid=3072 pid=3247 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:19.120000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866323862316636373137653136326165316131396334656339666230 Oct 2 20:42:19.140681 env[1465]: time="2023-10-02T20:42:19.140627156Z" level=info msg="StartContainer for \"8f28b1f6717e162ae1a19c4ec9fb0133cc1d2826eff1413f65c1c758e00c2be8\" returns successfully" Oct 2 20:42:19.835167 kubelet[2560]: I1002 20:42:19.835152 2560 kubelet_node_status.go:493] "Fast updating node status as it just became ready" Oct 2 20:42:19.835186 systemd[1]: cri-containerd-8f28b1f6717e162ae1a19c4ec9fb0133cc1d2826eff1413f65c1c758e00c2be8.scope: Deactivated successfully. Oct 2 20:42:19.843185 kubelet[2560]: I1002 20:42:19.843165 2560 topology_manager.go:212] "Topology Admit Handler" Oct 2 20:42:19.843969 kubelet[2560]: I1002 20:42:19.843952 2560 topology_manager.go:212] "Topology Admit Handler" Oct 2 20:42:19.844130 kubelet[2560]: I1002 20:42:19.844120 2560 topology_manager.go:212] "Topology Admit Handler" Oct 2 20:42:19.845412 kubelet[2560]: I1002 20:42:19.845398 2560 topology_manager.go:212] "Topology Admit Handler" Oct 2 20:42:19.846545 systemd[1]: Created slice kubepods-besteffort-pod2387d29a_95e7_4eb9_8cfe_b4e8aff25581.slice. Oct 2 20:42:19.848890 systemd[1]: Created slice kubepods-burstable-pod9de43226_098c_464a_95b6_db65cb90ac57.slice. Oct 2 20:42:19.849000 audit: BPF prog-id=138 op=UNLOAD Oct 2 20:42:19.851188 systemd[1]: Created slice kubepods-burstable-poda33dface_dd92_4003_8618_14f32fa71c10.slice. Oct 2 20:42:19.853770 systemd[1]: Created slice kubepods-besteffort-podb998aa5b_fd4c_4592_9f7b_c4ba1d884d60.slice. Oct 2 20:42:19.877105 kernel: kauditd_printk_skb: 96 callbacks suppressed Oct 2 20:42:19.877165 kernel: audit: type=1334 audit(1696279339.849:1127): prog-id=138 op=UNLOAD Oct 2 20:42:19.894021 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-8f28b1f6717e162ae1a19c4ec9fb0133cc1d2826eff1413f65c1c758e00c2be8-rootfs.mount: Deactivated successfully. Oct 2 20:42:19.967816 kubelet[2560]: I1002 20:42:19.967717 2560 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/b998aa5b-fd4c-4592-9f7b-c4ba1d884d60-registration-dir\") pod \"csi-node-driver-bvcrg\" (UID: \"b998aa5b-fd4c-4592-9f7b-c4ba1d884d60\") " pod="calico-system/csi-node-driver-bvcrg" Oct 2 20:42:19.968168 kubelet[2560]: I1002 20:42:19.967905 2560 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/b998aa5b-fd4c-4592-9f7b-c4ba1d884d60-varrun\") pod \"csi-node-driver-bvcrg\" (UID: \"b998aa5b-fd4c-4592-9f7b-c4ba1d884d60\") " pod="calico-system/csi-node-driver-bvcrg" Oct 2 20:42:19.968168 kubelet[2560]: I1002 20:42:19.968078 2560 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/a33dface-dd92-4003-8618-14f32fa71c10-config-volume\") pod \"coredns-5d78c9869d-4vfjd\" (UID: \"a33dface-dd92-4003-8618-14f32fa71c10\") " pod="kube-system/coredns-5d78c9869d-4vfjd" Oct 2 20:42:19.968168 kubelet[2560]: I1002 20:42:19.968149 2560 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/9de43226-098c-464a-95b6-db65cb90ac57-config-volume\") pod \"coredns-5d78c9869d-srpmn\" (UID: \"9de43226-098c-464a-95b6-db65cb90ac57\") " pod="kube-system/coredns-5d78c9869d-srpmn" Oct 2 20:42:19.968554 kubelet[2560]: I1002 20:42:19.968279 2560 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"etccalico\" (UniqueName: \"kubernetes.io/host-path/b998aa5b-fd4c-4592-9f7b-c4ba1d884d60-etccalico\") pod \"csi-node-driver-bvcrg\" (UID: \"b998aa5b-fd4c-4592-9f7b-c4ba1d884d60\") " pod="calico-system/csi-node-driver-bvcrg" Oct 2 20:42:19.968554 kubelet[2560]: I1002 20:42:19.968502 2560 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/b998aa5b-fd4c-4592-9f7b-c4ba1d884d60-socket-dir\") pod \"csi-node-driver-bvcrg\" (UID: \"b998aa5b-fd4c-4592-9f7b-c4ba1d884d60\") " pod="calico-system/csi-node-driver-bvcrg" Oct 2 20:42:19.968757 kubelet[2560]: I1002 20:42:19.968624 2560 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/b998aa5b-fd4c-4592-9f7b-c4ba1d884d60-kubelet-dir\") pod \"csi-node-driver-bvcrg\" (UID: \"b998aa5b-fd4c-4592-9f7b-c4ba1d884d60\") " pod="calico-system/csi-node-driver-bvcrg" Oct 2 20:42:19.968757 kubelet[2560]: I1002 20:42:19.968733 2560 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-vxrfd\" (UniqueName: \"kubernetes.io/projected/b998aa5b-fd4c-4592-9f7b-c4ba1d884d60-kube-api-access-vxrfd\") pod \"csi-node-driver-bvcrg\" (UID: \"b998aa5b-fd4c-4592-9f7b-c4ba1d884d60\") " pod="calico-system/csi-node-driver-bvcrg" Oct 2 20:42:19.968973 kubelet[2560]: I1002 20:42:19.968820 2560 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-d5s8d\" (UniqueName: \"kubernetes.io/projected/2387d29a-95e7-4eb9-8cfe-b4e8aff25581-kube-api-access-d5s8d\") pod \"calico-kube-controllers-7bd445fdb4-54jrf\" (UID: \"2387d29a-95e7-4eb9-8cfe-b4e8aff25581\") " pod="calico-system/calico-kube-controllers-7bd445fdb4-54jrf" Oct 2 20:42:19.968973 kubelet[2560]: I1002 20:42:19.968927 2560 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-qkncd\" (UniqueName: \"kubernetes.io/projected/a33dface-dd92-4003-8618-14f32fa71c10-kube-api-access-qkncd\") pod \"coredns-5d78c9869d-4vfjd\" (UID: \"a33dface-dd92-4003-8618-14f32fa71c10\") " pod="kube-system/coredns-5d78c9869d-4vfjd" Oct 2 20:42:19.969167 kubelet[2560]: I1002 20:42:19.969010 2560 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-hnhk8\" (UniqueName: \"kubernetes.io/projected/9de43226-098c-464a-95b6-db65cb90ac57-kube-api-access-hnhk8\") pod \"coredns-5d78c9869d-srpmn\" (UID: \"9de43226-098c-464a-95b6-db65cb90ac57\") " pod="kube-system/coredns-5d78c9869d-srpmn" Oct 2 20:42:20.149745 env[1465]: time="2023-10-02T20:42:20.149614484Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-7bd445fdb4-54jrf,Uid:2387d29a-95e7-4eb9-8cfe-b4e8aff25581,Namespace:calico-system,Attempt:0,}" Oct 2 20:42:20.151763 env[1465]: time="2023-10-02T20:42:20.151690961Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-srpmn,Uid:9de43226-098c-464a-95b6-db65cb90ac57,Namespace:kube-system,Attempt:0,}" Oct 2 20:42:20.153652 env[1465]: time="2023-10-02T20:42:20.153560191Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-4vfjd,Uid:a33dface-dd92-4003-8618-14f32fa71c10,Namespace:kube-system,Attempt:0,}" Oct 2 20:42:20.155663 env[1465]: time="2023-10-02T20:42:20.155565003Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-bvcrg,Uid:b998aa5b-fd4c-4592-9f7b-c4ba1d884d60,Namespace:calico-system,Attempt:0,}" Oct 2 20:42:20.548956 env[1465]: time="2023-10-02T20:42:20.548719799Z" level=info msg="shim disconnected" id=8f28b1f6717e162ae1a19c4ec9fb0133cc1d2826eff1413f65c1c758e00c2be8 Oct 2 20:42:20.548956 env[1465]: time="2023-10-02T20:42:20.548822082Z" level=warning msg="cleaning up after shim disconnected" id=8f28b1f6717e162ae1a19c4ec9fb0133cc1d2826eff1413f65c1c758e00c2be8 namespace=k8s.io Oct 2 20:42:20.548956 env[1465]: time="2023-10-02T20:42:20.548864328Z" level=info msg="cleaning up dead shim" Oct 2 20:42:20.575469 env[1465]: time="2023-10-02T20:42:20.575411809Z" level=warning msg="cleanup warnings time=\"2023-10-02T20:42:20Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3311 runtime=io.containerd.runc.v2\n" Oct 2 20:42:20.589657 env[1465]: time="2023-10-02T20:42:20.589581913Z" level=error msg="Failed to destroy network for sandbox \"58e4ce0768a9e32892a49ca8bfc51affa0ba35ba180829fb653b1f0bdfcda91b\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 20:42:20.589772 env[1465]: time="2023-10-02T20:42:20.589724945Z" level=error msg="Failed to destroy network for sandbox \"c3ee07f19ba23087509f30712461d2855f8b13ee077da5bca6f87f1812e41e10\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 20:42:20.589882 env[1465]: time="2023-10-02T20:42:20.589867142Z" level=error msg="encountered an error cleaning up failed sandbox \"58e4ce0768a9e32892a49ca8bfc51affa0ba35ba180829fb653b1f0bdfcda91b\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 20:42:20.589920 env[1465]: time="2023-10-02T20:42:20.589897150Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-4vfjd,Uid:a33dface-dd92-4003-8618-14f32fa71c10,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"58e4ce0768a9e32892a49ca8bfc51affa0ba35ba180829fb653b1f0bdfcda91b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 20:42:20.589951 env[1465]: time="2023-10-02T20:42:20.589911438Z" level=error msg="encountered an error cleaning up failed sandbox \"c3ee07f19ba23087509f30712461d2855f8b13ee077da5bca6f87f1812e41e10\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 20:42:20.589973 env[1465]: time="2023-10-02T20:42:20.589942741Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-7bd445fdb4-54jrf,Uid:2387d29a-95e7-4eb9-8cfe-b4e8aff25581,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"c3ee07f19ba23087509f30712461d2855f8b13ee077da5bca6f87f1812e41e10\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 20:42:20.590064 kubelet[2560]: E1002 20:42:20.590054 2560 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c3ee07f19ba23087509f30712461d2855f8b13ee077da5bca6f87f1812e41e10\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 20:42:20.590102 kubelet[2560]: E1002 20:42:20.590090 2560 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c3ee07f19ba23087509f30712461d2855f8b13ee077da5bca6f87f1812e41e10\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-7bd445fdb4-54jrf" Oct 2 20:42:20.590128 kubelet[2560]: E1002 20:42:20.590105 2560 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c3ee07f19ba23087509f30712461d2855f8b13ee077da5bca6f87f1812e41e10\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-7bd445fdb4-54jrf" Oct 2 20:42:20.590128 kubelet[2560]: E1002 20:42:20.590054 2560 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"58e4ce0768a9e32892a49ca8bfc51affa0ba35ba180829fb653b1f0bdfcda91b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 20:42:20.590168 kubelet[2560]: E1002 20:42:20.590136 2560 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-7bd445fdb4-54jrf_calico-system(2387d29a-95e7-4eb9-8cfe-b4e8aff25581)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-7bd445fdb4-54jrf_calico-system(2387d29a-95e7-4eb9-8cfe-b4e8aff25581)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"c3ee07f19ba23087509f30712461d2855f8b13ee077da5bca6f87f1812e41e10\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-7bd445fdb4-54jrf" podUID=2387d29a-95e7-4eb9-8cfe-b4e8aff25581 Oct 2 20:42:20.590168 kubelet[2560]: E1002 20:42:20.590161 2560 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"58e4ce0768a9e32892a49ca8bfc51affa0ba35ba180829fb653b1f0bdfcda91b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5d78c9869d-4vfjd" Oct 2 20:42:20.590224 kubelet[2560]: E1002 20:42:20.590174 2560 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"58e4ce0768a9e32892a49ca8bfc51affa0ba35ba180829fb653b1f0bdfcda91b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5d78c9869d-4vfjd" Oct 2 20:42:20.590224 kubelet[2560]: E1002 20:42:20.590198 2560 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-5d78c9869d-4vfjd_kube-system(a33dface-dd92-4003-8618-14f32fa71c10)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-5d78c9869d-4vfjd_kube-system(a33dface-dd92-4003-8618-14f32fa71c10)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"58e4ce0768a9e32892a49ca8bfc51affa0ba35ba180829fb653b1f0bdfcda91b\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5d78c9869d-4vfjd" podUID=a33dface-dd92-4003-8618-14f32fa71c10 Oct 2 20:42:20.592673 env[1465]: time="2023-10-02T20:42:20.592646734Z" level=error msg="Failed to destroy network for sandbox \"9878722848151e028e979d6d76f332cc2b0da6cd9447888e3a3b2e0a5ece4e26\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 20:42:20.592779 env[1465]: time="2023-10-02T20:42:20.592758589Z" level=error msg="Failed to destroy network for sandbox \"e30e1877a62cbfde374cf219d5c071c2cd32c392aadd6613d048f41c023b4686\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 20:42:20.592834 env[1465]: time="2023-10-02T20:42:20.592819455Z" level=error msg="encountered an error cleaning up failed sandbox \"9878722848151e028e979d6d76f332cc2b0da6cd9447888e3a3b2e0a5ece4e26\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 20:42:20.592861 env[1465]: time="2023-10-02T20:42:20.592844957Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-srpmn,Uid:9de43226-098c-464a-95b6-db65cb90ac57,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"9878722848151e028e979d6d76f332cc2b0da6cd9447888e3a3b2e0a5ece4e26\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 20:42:20.592915 env[1465]: time="2023-10-02T20:42:20.592901923Z" level=error msg="encountered an error cleaning up failed sandbox \"e30e1877a62cbfde374cf219d5c071c2cd32c392aadd6613d048f41c023b4686\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 20:42:20.592940 env[1465]: time="2023-10-02T20:42:20.592925211Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-bvcrg,Uid:b998aa5b-fd4c-4592-9f7b-c4ba1d884d60,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"e30e1877a62cbfde374cf219d5c071c2cd32c392aadd6613d048f41c023b4686\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 20:42:20.592963 kubelet[2560]: E1002 20:42:20.592924 2560 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9878722848151e028e979d6d76f332cc2b0da6cd9447888e3a3b2e0a5ece4e26\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 20:42:20.592963 kubelet[2560]: E1002 20:42:20.592948 2560 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9878722848151e028e979d6d76f332cc2b0da6cd9447888e3a3b2e0a5ece4e26\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5d78c9869d-srpmn" Oct 2 20:42:20.592963 kubelet[2560]: E1002 20:42:20.592960 2560 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9878722848151e028e979d6d76f332cc2b0da6cd9447888e3a3b2e0a5ece4e26\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5d78c9869d-srpmn" Oct 2 20:42:20.593026 kubelet[2560]: E1002 20:42:20.592984 2560 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-5d78c9869d-srpmn_kube-system(9de43226-098c-464a-95b6-db65cb90ac57)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-5d78c9869d-srpmn_kube-system(9de43226-098c-464a-95b6-db65cb90ac57)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"9878722848151e028e979d6d76f332cc2b0da6cd9447888e3a3b2e0a5ece4e26\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5d78c9869d-srpmn" podUID=9de43226-098c-464a-95b6-db65cb90ac57 Oct 2 20:42:20.593026 kubelet[2560]: E1002 20:42:20.593015 2560 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e30e1877a62cbfde374cf219d5c071c2cd32c392aadd6613d048f41c023b4686\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 20:42:20.593087 kubelet[2560]: E1002 20:42:20.593034 2560 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e30e1877a62cbfde374cf219d5c071c2cd32c392aadd6613d048f41c023b4686\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-bvcrg" Oct 2 20:42:20.593087 kubelet[2560]: E1002 20:42:20.593046 2560 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e30e1877a62cbfde374cf219d5c071c2cd32c392aadd6613d048f41c023b4686\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-bvcrg" Oct 2 20:42:20.593087 kubelet[2560]: E1002 20:42:20.593068 2560 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-bvcrg_calico-system(b998aa5b-fd4c-4592-9f7b-c4ba1d884d60)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-bvcrg_calico-system(b998aa5b-fd4c-4592-9f7b-c4ba1d884d60)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"e30e1877a62cbfde374cf219d5c071c2cd32c392aadd6613d048f41c023b4686\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-bvcrg" podUID=b998aa5b-fd4c-4592-9f7b-c4ba1d884d60 Oct 2 20:42:21.095783 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-e30e1877a62cbfde374cf219d5c071c2cd32c392aadd6613d048f41c023b4686-shm.mount: Deactivated successfully. Oct 2 20:42:21.096042 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-58e4ce0768a9e32892a49ca8bfc51affa0ba35ba180829fb653b1f0bdfcda91b-shm.mount: Deactivated successfully. Oct 2 20:42:21.096076 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-9878722848151e028e979d6d76f332cc2b0da6cd9447888e3a3b2e0a5ece4e26-shm.mount: Deactivated successfully. Oct 2 20:42:21.096106 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-c3ee07f19ba23087509f30712461d2855f8b13ee077da5bca6f87f1812e41e10-shm.mount: Deactivated successfully. Oct 2 20:42:21.497792 kubelet[2560]: I1002 20:42:21.497730 2560 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="9878722848151e028e979d6d76f332cc2b0da6cd9447888e3a3b2e0a5ece4e26" Oct 2 20:42:21.499177 env[1465]: time="2023-10-02T20:42:21.499109047Z" level=info msg="StopPodSandbox for \"9878722848151e028e979d6d76f332cc2b0da6cd9447888e3a3b2e0a5ece4e26\"" Oct 2 20:42:21.504452 kubelet[2560]: I1002 20:42:21.504388 2560 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="58e4ce0768a9e32892a49ca8bfc51affa0ba35ba180829fb653b1f0bdfcda91b" Oct 2 20:42:21.504715 env[1465]: time="2023-10-02T20:42:21.504616999Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.25.0\"" Oct 2 20:42:21.505545 env[1465]: time="2023-10-02T20:42:21.505466132Z" level=info msg="StopPodSandbox for \"58e4ce0768a9e32892a49ca8bfc51affa0ba35ba180829fb653b1f0bdfcda91b\"" Oct 2 20:42:21.507147 kubelet[2560]: I1002 20:42:21.507101 2560 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="c3ee07f19ba23087509f30712461d2855f8b13ee077da5bca6f87f1812e41e10" Oct 2 20:42:21.508517 env[1465]: time="2023-10-02T20:42:21.508493650Z" level=info msg="StopPodSandbox for \"c3ee07f19ba23087509f30712461d2855f8b13ee077da5bca6f87f1812e41e10\"" Oct 2 20:42:21.508734 kubelet[2560]: I1002 20:42:21.508702 2560 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="e30e1877a62cbfde374cf219d5c071c2cd32c392aadd6613d048f41c023b4686" Oct 2 20:42:21.508983 env[1465]: time="2023-10-02T20:42:21.508967296Z" level=info msg="StopPodSandbox for \"e30e1877a62cbfde374cf219d5c071c2cd32c392aadd6613d048f41c023b4686\"" Oct 2 20:42:21.521051 env[1465]: time="2023-10-02T20:42:21.521001092Z" level=error msg="StopPodSandbox for \"9878722848151e028e979d6d76f332cc2b0da6cd9447888e3a3b2e0a5ece4e26\" failed" error="failed to destroy network for sandbox \"9878722848151e028e979d6d76f332cc2b0da6cd9447888e3a3b2e0a5ece4e26\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 20:42:21.521255 kubelet[2560]: E1002 20:42:21.521241 2560 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"9878722848151e028e979d6d76f332cc2b0da6cd9447888e3a3b2e0a5ece4e26\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="9878722848151e028e979d6d76f332cc2b0da6cd9447888e3a3b2e0a5ece4e26" Oct 2 20:42:21.521317 kubelet[2560]: E1002 20:42:21.521287 2560 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:9878722848151e028e979d6d76f332cc2b0da6cd9447888e3a3b2e0a5ece4e26} Oct 2 20:42:21.521349 kubelet[2560]: E1002 20:42:21.521323 2560 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"9de43226-098c-464a-95b6-db65cb90ac57\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"9878722848151e028e979d6d76f332cc2b0da6cd9447888e3a3b2e0a5ece4e26\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 2 20:42:21.521349 kubelet[2560]: E1002 20:42:21.521343 2560 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"9de43226-098c-464a-95b6-db65cb90ac57\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"9878722848151e028e979d6d76f332cc2b0da6cd9447888e3a3b2e0a5ece4e26\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5d78c9869d-srpmn" podUID=9de43226-098c-464a-95b6-db65cb90ac57 Oct 2 20:42:21.521617 env[1465]: time="2023-10-02T20:42:21.521573910Z" level=error msg="StopPodSandbox for \"58e4ce0768a9e32892a49ca8bfc51affa0ba35ba180829fb653b1f0bdfcda91b\" failed" error="failed to destroy network for sandbox \"58e4ce0768a9e32892a49ca8bfc51affa0ba35ba180829fb653b1f0bdfcda91b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 20:42:21.521671 kubelet[2560]: E1002 20:42:21.521664 2560 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"58e4ce0768a9e32892a49ca8bfc51affa0ba35ba180829fb653b1f0bdfcda91b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="58e4ce0768a9e32892a49ca8bfc51affa0ba35ba180829fb653b1f0bdfcda91b" Oct 2 20:42:21.521710 kubelet[2560]: E1002 20:42:21.521676 2560 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:58e4ce0768a9e32892a49ca8bfc51affa0ba35ba180829fb653b1f0bdfcda91b} Oct 2 20:42:21.521710 kubelet[2560]: E1002 20:42:21.521693 2560 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"a33dface-dd92-4003-8618-14f32fa71c10\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"58e4ce0768a9e32892a49ca8bfc51affa0ba35ba180829fb653b1f0bdfcda91b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 2 20:42:21.521710 kubelet[2560]: E1002 20:42:21.521707 2560 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"a33dface-dd92-4003-8618-14f32fa71c10\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"58e4ce0768a9e32892a49ca8bfc51affa0ba35ba180829fb653b1f0bdfcda91b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5d78c9869d-4vfjd" podUID=a33dface-dd92-4003-8618-14f32fa71c10 Oct 2 20:42:21.524106 env[1465]: time="2023-10-02T20:42:21.524086335Z" level=error msg="StopPodSandbox for \"e30e1877a62cbfde374cf219d5c071c2cd32c392aadd6613d048f41c023b4686\" failed" error="failed to destroy network for sandbox \"e30e1877a62cbfde374cf219d5c071c2cd32c392aadd6613d048f41c023b4686\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 20:42:21.524152 env[1465]: time="2023-10-02T20:42:21.524134839Z" level=error msg="StopPodSandbox for \"c3ee07f19ba23087509f30712461d2855f8b13ee077da5bca6f87f1812e41e10\" failed" error="failed to destroy network for sandbox \"c3ee07f19ba23087509f30712461d2855f8b13ee077da5bca6f87f1812e41e10\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 2 20:42:21.524213 kubelet[2560]: E1002 20:42:21.524206 2560 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"c3ee07f19ba23087509f30712461d2855f8b13ee077da5bca6f87f1812e41e10\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="c3ee07f19ba23087509f30712461d2855f8b13ee077da5bca6f87f1812e41e10" Oct 2 20:42:21.524239 kubelet[2560]: E1002 20:42:21.524211 2560 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"e30e1877a62cbfde374cf219d5c071c2cd32c392aadd6613d048f41c023b4686\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="e30e1877a62cbfde374cf219d5c071c2cd32c392aadd6613d048f41c023b4686" Oct 2 20:42:21.524239 kubelet[2560]: E1002 20:42:21.524221 2560 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:c3ee07f19ba23087509f30712461d2855f8b13ee077da5bca6f87f1812e41e10} Oct 2 20:42:21.524239 kubelet[2560]: E1002 20:42:21.524226 2560 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:e30e1877a62cbfde374cf219d5c071c2cd32c392aadd6613d048f41c023b4686} Oct 2 20:42:21.524297 kubelet[2560]: E1002 20:42:21.524243 2560 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"2387d29a-95e7-4eb9-8cfe-b4e8aff25581\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c3ee07f19ba23087509f30712461d2855f8b13ee077da5bca6f87f1812e41e10\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 2 20:42:21.524297 kubelet[2560]: E1002 20:42:21.524246 2560 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"b998aa5b-fd4c-4592-9f7b-c4ba1d884d60\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e30e1877a62cbfde374cf219d5c071c2cd32c392aadd6613d048f41c023b4686\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 2 20:42:21.524297 kubelet[2560]: E1002 20:42:21.524259 2560 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"2387d29a-95e7-4eb9-8cfe-b4e8aff25581\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c3ee07f19ba23087509f30712461d2855f8b13ee077da5bca6f87f1812e41e10\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-7bd445fdb4-54jrf" podUID=2387d29a-95e7-4eb9-8cfe-b4e8aff25581 Oct 2 20:42:21.524405 kubelet[2560]: E1002 20:42:21.524261 2560 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"b998aa5b-fd4c-4592-9f7b-c4ba1d884d60\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e30e1877a62cbfde374cf219d5c071c2cd32c392aadd6613d048f41c023b4686\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-bvcrg" podUID=b998aa5b-fd4c-4592-9f7b-c4ba1d884d60 Oct 2 20:42:26.563539 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount329212890.mount: Deactivated successfully. Oct 2 20:42:26.586957 env[1465]: time="2023-10-02T20:42:26.586910030Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:42:26.587441 env[1465]: time="2023-10-02T20:42:26.587394281Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:08616d26b8e74867402274687491e5978ba4a6ded94e9f5ecc3e364024e5683e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:42:26.587982 env[1465]: time="2023-10-02T20:42:26.587943956Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:42:26.588938 env[1465]: time="2023-10-02T20:42:26.588896781Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:e898f4b7b55c908c88dad008ae939024e71ed93c5effbb10cca891b658b2f001,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:42:26.589062 env[1465]: time="2023-10-02T20:42:26.589022560Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.25.0\" returns image reference \"sha256:08616d26b8e74867402274687491e5978ba4a6ded94e9f5ecc3e364024e5683e\"" Oct 2 20:42:26.590264 env[1465]: time="2023-10-02T20:42:26.590226777Z" level=info msg="CreateContainer within sandbox \"89b879e5876491c86efa6aa53ad0d774c4b4ee2084a79afcfe232e9b5b664a84\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Oct 2 20:42:26.595402 env[1465]: time="2023-10-02T20:42:26.595339734Z" level=info msg="CreateContainer within sandbox \"89b879e5876491c86efa6aa53ad0d774c4b4ee2084a79afcfe232e9b5b664a84\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"4bb4aba1ce915470254e5dee4fa48569be0fe8eeb33d2675542c011dae2681c7\"" Oct 2 20:42:26.595677 env[1465]: time="2023-10-02T20:42:26.595650565Z" level=info msg="StartContainer for \"4bb4aba1ce915470254e5dee4fa48569be0fe8eeb33d2675542c011dae2681c7\"" Oct 2 20:42:26.617285 systemd[1]: Started cri-containerd-4bb4aba1ce915470254e5dee4fa48569be0fe8eeb33d2675542c011dae2681c7.scope. Oct 2 20:42:26.624000 audit[3645]: AVC avc: denied { perfmon } for pid=3645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:26.624000 audit[3645]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=3072 pid=3645 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:26.786780 kernel: audit: type=1400 audit(1696279346.624:1128): avc: denied { perfmon } for pid=3645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:26.786827 kernel: audit: type=1300 audit(1696279346.624:1128): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=3072 pid=3645 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:26.786844 kernel: audit: type=1327 audit(1696279346.624:1128): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3462623461626131636539313534373032353465356465653466613438 Oct 2 20:42:26.624000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3462623461626131636539313534373032353465356465653466613438 Oct 2 20:42:26.879620 kernel: audit: type=1400 audit(1696279346.624:1129): avc: denied { bpf } for pid=3645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:26.624000 audit[3645]: AVC avc: denied { bpf } for pid=3645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:26.942937 kernel: audit: type=1400 audit(1696279346.624:1129): avc: denied { bpf } for pid=3645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:26.624000 audit[3645]: AVC avc: denied { bpf } for pid=3645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:27.006173 kernel: audit: type=1400 audit(1696279346.624:1129): avc: denied { bpf } for pid=3645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:26.624000 audit[3645]: AVC avc: denied { bpf } for pid=3645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:27.069386 kernel: audit: type=1400 audit(1696279346.624:1129): avc: denied { perfmon } for pid=3645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:26.624000 audit[3645]: AVC avc: denied { perfmon } for pid=3645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:27.132939 kernel: audit: type=1400 audit(1696279346.624:1129): avc: denied { perfmon } for pid=3645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:26.624000 audit[3645]: AVC avc: denied { perfmon } for pid=3645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:27.152586 env[1465]: time="2023-10-02T20:42:27.152562103Z" level=info msg="StartContainer for \"4bb4aba1ce915470254e5dee4fa48569be0fe8eeb33d2675542c011dae2681c7\" returns successfully" Oct 2 20:42:27.196739 kernel: audit: type=1400 audit(1696279346.624:1129): avc: denied { perfmon } for pid=3645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:26.624000 audit[3645]: AVC avc: denied { perfmon } for pid=3645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:27.260371 kernel: audit: type=1400 audit(1696279346.624:1129): avc: denied { perfmon } for pid=3645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:26.624000 audit[3645]: AVC avc: denied { perfmon } for pid=3645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:26.624000 audit[3645]: AVC avc: denied { perfmon } for pid=3645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:26.624000 audit[3645]: AVC avc: denied { bpf } for pid=3645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:26.624000 audit[3645]: AVC avc: denied { bpf } for pid=3645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:26.624000 audit: BPF prog-id=139 op=LOAD Oct 2 20:42:26.624000 audit[3645]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001479d8 a2=78 a3=c0003be460 items=0 ppid=3072 pid=3645 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:26.624000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3462623461626131636539313534373032353465356465653466613438 Oct 2 20:42:26.785000 audit[3645]: AVC avc: denied { bpf } for pid=3645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:26.785000 audit[3645]: AVC avc: denied { bpf } for pid=3645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:26.785000 audit[3645]: AVC avc: denied { perfmon } for pid=3645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:26.785000 audit[3645]: AVC avc: denied { perfmon } for pid=3645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:26.785000 audit[3645]: AVC avc: denied { perfmon } for pid=3645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:26.785000 audit[3645]: AVC avc: denied { perfmon } for pid=3645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:26.785000 audit[3645]: AVC avc: denied { perfmon } for pid=3645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:26.785000 audit[3645]: AVC avc: denied { bpf } for pid=3645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:26.785000 audit[3645]: AVC avc: denied { bpf } for pid=3645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:26.785000 audit: BPF prog-id=140 op=LOAD Oct 2 20:42:26.785000 audit[3645]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000147770 a2=78 a3=c0003be4a8 items=0 ppid=3072 pid=3645 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:26.785000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3462623461626131636539313534373032353465356465653466613438 Oct 2 20:42:26.941000 audit: BPF prog-id=140 op=UNLOAD Oct 2 20:42:26.941000 audit: BPF prog-id=139 op=UNLOAD Oct 2 20:42:26.941000 audit[3645]: AVC avc: denied { bpf } for pid=3645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:26.941000 audit[3645]: AVC avc: denied { bpf } for pid=3645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:26.941000 audit[3645]: AVC avc: denied { bpf } for pid=3645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:26.941000 audit[3645]: AVC avc: denied { perfmon } for pid=3645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:26.941000 audit[3645]: AVC avc: denied { perfmon } for pid=3645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:26.941000 audit[3645]: AVC avc: denied { perfmon } for pid=3645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:26.941000 audit[3645]: AVC avc: denied { perfmon } for pid=3645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:26.941000 audit[3645]: AVC avc: denied { perfmon } for pid=3645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:26.941000 audit[3645]: AVC avc: denied { bpf } for pid=3645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:26.941000 audit[3645]: AVC avc: denied { bpf } for pid=3645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:26.941000 audit: BPF prog-id=141 op=LOAD Oct 2 20:42:26.941000 audit[3645]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000147c30 a2=78 a3=c0003be538 items=0 ppid=3072 pid=3645 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:26.941000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3462623461626131636539313534373032353465356465653466613438 Oct 2 20:42:27.407999 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Oct 2 20:42:27.408031 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Oct 2 20:42:27.527440 kubelet[2560]: I1002 20:42:27.527420 2560 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-xcgrf" podStartSLOduration=1.846936093 podCreationTimestamp="2023-10-02 20:42:07 +0000 UTC" firstStartedPulling="2023-10-02 20:42:07.908710183 +0000 UTC m=+19.571428938" lastFinishedPulling="2023-10-02 20:42:26.589166523 +0000 UTC m=+38.251885277" observedRunningTime="2023-10-02 20:42:27.526943836 +0000 UTC m=+39.189662591" watchObservedRunningTime="2023-10-02 20:42:27.527392432 +0000 UTC m=+39.190111184" Oct 2 20:42:28.565000 audit[3835]: AVC avc: denied { write } for pid=3835 comm="tee" name="fd" dev="proc" ino=38171 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 20:42:28.565000 audit[3835]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff0caff962 a2=241 a3=1b6 items=1 ppid=3800 pid=3835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:28.565000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Oct 2 20:42:28.565000 audit: PATH item=0 name="/dev/fd/63" inode=38168 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 20:42:28.565000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 20:42:28.565000 audit[3834]: AVC avc: denied { write } for pid=3834 comm="tee" name="fd" dev="proc" ino=39265 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 20:42:28.565000 audit[3834]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffc05b0961 a2=241 a3=1b6 items=1 ppid=3802 pid=3834 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:28.565000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Oct 2 20:42:28.565000 audit: PATH item=0 name="/dev/fd/63" inode=32448 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 20:42:28.565000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 20:42:28.565000 audit[3836]: AVC avc: denied { write } for pid=3836 comm="tee" name="fd" dev="proc" ino=21144 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 20:42:28.565000 audit[3837]: AVC avc: denied { write } for pid=3837 comm="tee" name="fd" dev="proc" ino=31100 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 20:42:28.565000 audit[3837]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe17a91972 a2=241 a3=1b6 items=1 ppid=3801 pid=3837 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:28.565000 audit[3836]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd14c5d971 a2=241 a3=1b6 items=1 ppid=3804 pid=3836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:28.565000 audit: CWD cwd="/etc/service/enabled/bird/log" Oct 2 20:42:28.565000 audit: CWD cwd="/etc/service/enabled/felix/log" Oct 2 20:42:28.565000 audit: PATH item=0 name="/dev/fd/63" inode=31097 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 20:42:28.565000 audit: PATH item=0 name="/dev/fd/63" inode=21141 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 20:42:28.565000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 20:42:28.565000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 20:42:28.565000 audit[3840]: AVC avc: denied { write } for pid=3840 comm="tee" name="fd" dev="proc" ino=23391 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 20:42:28.565000 audit[3840]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcffd83973 a2=241 a3=1b6 items=1 ppid=3803 pid=3840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:28.565000 audit: CWD cwd="/etc/service/enabled/cni/log" Oct 2 20:42:28.565000 audit: PATH item=0 name="/dev/fd/63" inode=23388 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 20:42:28.565000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 20:42:28.566000 audit[3847]: AVC avc: denied { write } for pid=3847 comm="tee" name="fd" dev="proc" ino=38175 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 20:42:28.566000 audit[3847]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffc6f6b971 a2=241 a3=1b6 items=1 ppid=3810 pid=3847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:28.566000 audit: CWD cwd="/etc/service/enabled/confd/log" Oct 2 20:42:28.566000 audit: PATH item=0 name="/dev/fd/63" inode=36133 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 20:42:28.566000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 20:42:28.566000 audit[3852]: AVC avc: denied { write } for pid=3852 comm="tee" name="fd" dev="proc" ino=29656 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 20:42:28.566000 audit[3852]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe2b0b5971 a2=241 a3=1b6 items=1 ppid=3807 pid=3852 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:28.566000 audit: CWD cwd="/etc/service/enabled/bird6/log" Oct 2 20:42:28.566000 audit: PATH item=0 name="/dev/fd/63" inode=32449 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 20:42:28.566000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 20:42:28.678000 audit[3991]: AVC avc: denied { bpf } for pid=3991 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:28.678000 audit[3991]: AVC avc: denied { bpf } for pid=3991 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:28.678000 audit[3991]: AVC avc: denied { perfmon } for pid=3991 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:28.678000 audit[3991]: AVC avc: denied { perfmon } for pid=3991 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:28.678000 audit[3991]: AVC avc: denied { perfmon } for pid=3991 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:28.678000 audit[3991]: AVC avc: denied { perfmon } for pid=3991 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:28.678000 audit[3991]: AVC avc: denied { perfmon } for pid=3991 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:28.678000 audit[3991]: AVC avc: denied { bpf } for pid=3991 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:28.678000 audit[3991]: AVC avc: denied { bpf } for pid=3991 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:28.678000 audit: BPF prog-id=142 op=LOAD Oct 2 20:42:28.678000 audit[3991]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff0140ce50 a2=70 a3=7f414767e000 items=0 ppid=3812 pid=3991 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:28.678000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 20:42:28.678000 audit: BPF prog-id=142 op=UNLOAD Oct 2 20:42:28.678000 audit[3991]: AVC avc: denied { bpf } for pid=3991 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:28.678000 audit[3991]: AVC avc: denied { bpf } for pid=3991 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:28.678000 audit[3991]: AVC avc: denied { perfmon } for pid=3991 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:28.678000 audit[3991]: AVC avc: denied { perfmon } for pid=3991 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:28.678000 audit[3991]: AVC avc: denied { perfmon } for pid=3991 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:28.678000 audit[3991]: AVC avc: denied { perfmon } for pid=3991 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:28.678000 audit[3991]: AVC avc: denied { perfmon } for pid=3991 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:28.678000 audit[3991]: AVC avc: denied { bpf } for pid=3991 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:28.678000 audit[3991]: AVC avc: denied { bpf } for pid=3991 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:28.678000 audit: BPF prog-id=143 op=LOAD Oct 2 20:42:28.678000 audit[3991]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff0140ce50 a2=70 a3=6e items=0 ppid=3812 pid=3991 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:28.678000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 20:42:28.679000 audit: BPF prog-id=143 op=UNLOAD Oct 2 20:42:28.679000 audit[3991]: AVC avc: denied { perfmon } for pid=3991 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:28.679000 audit[3991]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7fff0140ce00 a2=70 a3=7fff0140ce50 items=0 ppid=3812 pid=3991 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:28.679000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 20:42:28.679000 audit[3991]: AVC avc: denied { bpf } for pid=3991 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:28.679000 audit[3991]: AVC avc: denied { bpf } for pid=3991 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:28.679000 audit[3991]: AVC avc: denied { perfmon } for pid=3991 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:28.679000 audit[3991]: AVC avc: denied { perfmon } for pid=3991 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:28.679000 audit[3991]: AVC avc: denied { perfmon } for pid=3991 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:28.679000 audit[3991]: AVC avc: denied { perfmon } for pid=3991 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:28.679000 audit[3991]: AVC avc: denied { perfmon } for pid=3991 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:28.679000 audit[3991]: AVC avc: denied { bpf } for pid=3991 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:28.679000 audit[3991]: AVC avc: denied { bpf } for pid=3991 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:28.679000 audit: BPF prog-id=144 op=LOAD Oct 2 20:42:28.679000 audit[3991]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7fff0140cde0 a2=70 a3=7fff0140ce50 items=0 ppid=3812 pid=3991 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:28.679000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 20:42:28.679000 audit: BPF prog-id=144 op=UNLOAD Oct 2 20:42:28.679000 audit[3991]: AVC avc: denied { bpf } for pid=3991 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:28.679000 audit[3991]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff0140cec0 a2=70 a3=0 items=0 ppid=3812 pid=3991 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:28.679000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 20:42:28.679000 audit[3991]: AVC avc: denied { bpf } for pid=3991 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:28.679000 audit[3991]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff0140ceb0 a2=70 a3=0 items=0 ppid=3812 pid=3991 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:28.679000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 20:42:28.679000 audit[3991]: AVC avc: denied { bpf } for pid=3991 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:28.679000 audit[3991]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=0 a1=7fff0140cef0 a2=70 a3=0 items=0 ppid=3812 pid=3991 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:28.679000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 20:42:28.681000 audit[3991]: AVC avc: denied { bpf } for pid=3991 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:28.681000 audit[3991]: AVC avc: denied { bpf } for pid=3991 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:28.681000 audit[3991]: AVC avc: denied { bpf } for pid=3991 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:28.681000 audit[3991]: AVC avc: denied { perfmon } for pid=3991 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:28.681000 audit[3991]: AVC avc: denied { perfmon } for pid=3991 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:28.681000 audit[3991]: AVC avc: denied { perfmon } for pid=3991 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:28.681000 audit[3991]: AVC avc: denied { perfmon } for pid=3991 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:28.681000 audit[3991]: AVC avc: denied { perfmon } for pid=3991 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:28.681000 audit[3991]: AVC avc: denied { bpf } for pid=3991 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:28.681000 audit[3991]: AVC avc: denied { bpf } for pid=3991 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:28.681000 audit: BPF prog-id=145 op=LOAD Oct 2 20:42:28.681000 audit[3991]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7fff0140ce10 a2=70 a3=ffffffff items=0 ppid=3812 pid=3991 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:28.681000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 20:42:28.687000 audit[3995]: AVC avc: denied { bpf } for pid=3995 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:28.687000 audit[3995]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd9934a0d0 a2=70 a3=fff80800 items=0 ppid=3812 pid=3995 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:28.687000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 2 20:42:28.687000 audit[3995]: AVC avc: denied { bpf } for pid=3995 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:28.687000 audit[3995]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd99349fa0 a2=70 a3=3 items=0 ppid=3812 pid=3995 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:28.687000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 2 20:42:28.707000 audit: BPF prog-id=145 op=UNLOAD Oct 2 20:42:28.877000 audit[4051]: NETFILTER_CFG table=mangle:95 family=2 entries=19 op=nft_register_chain pid=4051 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 20:42:28.877000 audit[4051]: SYSCALL arch=c000003e syscall=46 success=yes exit=6800 a0=3 a1=7ffe59023cd0 a2=0 a3=7ffe59023cbc items=0 ppid=3812 pid=4051 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:28.877000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 20:42:28.885000 audit[4049]: NETFILTER_CFG table=raw:96 family=2 entries=19 op=nft_register_chain pid=4049 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 20:42:28.885000 audit[4049]: SYSCALL arch=c000003e syscall=46 success=yes exit=6132 a0=3 a1=7ffeee738c10 a2=0 a3=5635697e9000 items=0 ppid=3812 pid=4049 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:28.885000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 20:42:28.887000 audit[4050]: NETFILTER_CFG table=nat:97 family=2 entries=16 op=nft_register_chain pid=4050 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 20:42:28.887000 audit[4050]: SYSCALL arch=c000003e syscall=46 success=yes exit=5188 a0=3 a1=7fff2a7d1fb0 a2=0 a3=55787436b000 items=0 ppid=3812 pid=4050 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:28.887000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 20:42:28.898000 audit[4054]: NETFILTER_CFG table=filter:98 family=2 entries=39 op=nft_register_chain pid=4054 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 20:42:28.898000 audit[4054]: SYSCALL arch=c000003e syscall=46 success=yes exit=18472 a0=3 a1=7ffca4b00c80 a2=0 a3=7ffca4b00c6c items=0 ppid=3812 pid=4054 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:28.898000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 20:42:29.648051 systemd-networkd[1309]: vxlan.calico: Link UP Oct 2 20:42:29.648054 systemd-networkd[1309]: vxlan.calico: Gained carrier Oct 2 20:42:31.575515 systemd-networkd[1309]: vxlan.calico: Gained IPv6LL Oct 2 20:42:33.397023 env[1465]: time="2023-10-02T20:42:33.396890766Z" level=info msg="StopPodSandbox for \"e30e1877a62cbfde374cf219d5c071c2cd32c392aadd6613d048f41c023b4686\"" Oct 2 20:42:33.482639 env[1465]: 2023-10-02 20:42:33.463 [INFO][4106] k8s.go 576: Cleaning up netns ContainerID="e30e1877a62cbfde374cf219d5c071c2cd32c392aadd6613d048f41c023b4686" Oct 2 20:42:33.482639 env[1465]: 2023-10-02 20:42:33.463 [INFO][4106] dataplane_linux.go 524: Deleting workload's device in netns. ContainerID="e30e1877a62cbfde374cf219d5c071c2cd32c392aadd6613d048f41c023b4686" iface="eth0" netns="/var/run/netns/cni-4181c481-670f-ce96-75a5-65852804b8be" Oct 2 20:42:33.482639 env[1465]: 2023-10-02 20:42:33.463 [INFO][4106] dataplane_linux.go 535: Entered netns, deleting veth. ContainerID="e30e1877a62cbfde374cf219d5c071c2cd32c392aadd6613d048f41c023b4686" iface="eth0" netns="/var/run/netns/cni-4181c481-670f-ce96-75a5-65852804b8be" Oct 2 20:42:33.482639 env[1465]: 2023-10-02 20:42:33.463 [INFO][4106] dataplane_linux.go 562: Workload's veth was already gone. Nothing to do. ContainerID="e30e1877a62cbfde374cf219d5c071c2cd32c392aadd6613d048f41c023b4686" iface="eth0" netns="/var/run/netns/cni-4181c481-670f-ce96-75a5-65852804b8be" Oct 2 20:42:33.482639 env[1465]: 2023-10-02 20:42:33.463 [INFO][4106] k8s.go 583: Releasing IP address(es) ContainerID="e30e1877a62cbfde374cf219d5c071c2cd32c392aadd6613d048f41c023b4686" Oct 2 20:42:33.482639 env[1465]: 2023-10-02 20:42:33.463 [INFO][4106] utils.go 196: Calico CNI releasing IP address ContainerID="e30e1877a62cbfde374cf219d5c071c2cd32c392aadd6613d048f41c023b4686" Oct 2 20:42:33.482639 env[1465]: 2023-10-02 20:42:33.475 [INFO][4121] ipam_plugin.go 416: Releasing address using handleID ContainerID="e30e1877a62cbfde374cf219d5c071c2cd32c392aadd6613d048f41c023b4686" HandleID="k8s-pod-network.e30e1877a62cbfde374cf219d5c071c2cd32c392aadd6613d048f41c023b4686" Workload="ci--3510.3.0--a--0ae5c90d19-k8s-csi--node--driver--bvcrg-eth0" Oct 2 20:42:33.482639 env[1465]: time="2023-10-02T20:42:33Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 20:42:33.482639 env[1465]: time="2023-10-02T20:42:33Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 20:42:33.482639 env[1465]: 2023-10-02 20:42:33.480 [WARNING][4121] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="e30e1877a62cbfde374cf219d5c071c2cd32c392aadd6613d048f41c023b4686" HandleID="k8s-pod-network.e30e1877a62cbfde374cf219d5c071c2cd32c392aadd6613d048f41c023b4686" Workload="ci--3510.3.0--a--0ae5c90d19-k8s-csi--node--driver--bvcrg-eth0" Oct 2 20:42:33.482639 env[1465]: 2023-10-02 20:42:33.480 [INFO][4121] ipam_plugin.go 444: Releasing address using workloadID ContainerID="e30e1877a62cbfde374cf219d5c071c2cd32c392aadd6613d048f41c023b4686" HandleID="k8s-pod-network.e30e1877a62cbfde374cf219d5c071c2cd32c392aadd6613d048f41c023b4686" Workload="ci--3510.3.0--a--0ae5c90d19-k8s-csi--node--driver--bvcrg-eth0" Oct 2 20:42:33.482639 env[1465]: time="2023-10-02T20:42:33Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 20:42:33.482639 env[1465]: 2023-10-02 20:42:33.481 [INFO][4106] k8s.go 589: Teardown processing complete. ContainerID="e30e1877a62cbfde374cf219d5c071c2cd32c392aadd6613d048f41c023b4686" Oct 2 20:42:33.483064 env[1465]: time="2023-10-02T20:42:33.482707912Z" level=info msg="TearDown network for sandbox \"e30e1877a62cbfde374cf219d5c071c2cd32c392aadd6613d048f41c023b4686\" successfully" Oct 2 20:42:33.483064 env[1465]: time="2023-10-02T20:42:33.482730856Z" level=info msg="StopPodSandbox for \"e30e1877a62cbfde374cf219d5c071c2cd32c392aadd6613d048f41c023b4686\" returns successfully" Oct 2 20:42:33.483302 env[1465]: time="2023-10-02T20:42:33.483288839Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-bvcrg,Uid:b998aa5b-fd4c-4592-9f7b-c4ba1d884d60,Namespace:calico-system,Attempt:1,}" Oct 2 20:42:33.483838 systemd[1]: run-netns-cni\x2d4181c481\x2d670f\x2dce96\x2d75a5\x2d65852804b8be.mount: Deactivated successfully. Oct 2 20:42:33.621323 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Oct 2 20:42:33.621422 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali37ed14ac24e: link becomes ready Oct 2 20:42:33.660876 systemd-networkd[1309]: cali37ed14ac24e: Link UP Oct 2 20:42:33.660879 systemd-networkd[1309]: cali37ed14ac24e: Gained carrier Oct 2 20:42:33.666568 env[1465]: 2023-10-02 20:42:33.504 [INFO][4134] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.0--a--0ae5c90d19-k8s-csi--node--driver--bvcrg-eth0 csi-node-driver- calico-system b998aa5b-fd4c-4592-9f7b-c4ba1d884d60 688 0 2023-10-02 20:42:19 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:759544bff5 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s ci-3510.3.0-a-0ae5c90d19 csi-node-driver-bvcrg eth0 default [] [] [kns.calico-system ksa.calico-system.default] cali37ed14ac24e [] []}} ContainerID="1c7bc4319a26a675ea3f6ad2078506009a82d3ed613e8d484d7f6f673796bffd" Namespace="calico-system" Pod="csi-node-driver-bvcrg" WorkloadEndpoint="ci--3510.3.0--a--0ae5c90d19-k8s-csi--node--driver--bvcrg-" Oct 2 20:42:33.666568 env[1465]: 2023-10-02 20:42:33.505 [INFO][4134] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="1c7bc4319a26a675ea3f6ad2078506009a82d3ed613e8d484d7f6f673796bffd" Namespace="calico-system" Pod="csi-node-driver-bvcrg" WorkloadEndpoint="ci--3510.3.0--a--0ae5c90d19-k8s-csi--node--driver--bvcrg-eth0" Oct 2 20:42:33.666568 env[1465]: 2023-10-02 20:42:33.523 [INFO][4152] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="1c7bc4319a26a675ea3f6ad2078506009a82d3ed613e8d484d7f6f673796bffd" HandleID="k8s-pod-network.1c7bc4319a26a675ea3f6ad2078506009a82d3ed613e8d484d7f6f673796bffd" Workload="ci--3510.3.0--a--0ae5c90d19-k8s-csi--node--driver--bvcrg-eth0" Oct 2 20:42:33.666568 env[1465]: 2023-10-02 20:42:33.532 [INFO][4152] ipam_plugin.go 269: Auto assigning IP ContainerID="1c7bc4319a26a675ea3f6ad2078506009a82d3ed613e8d484d7f6f673796bffd" HandleID="k8s-pod-network.1c7bc4319a26a675ea3f6ad2078506009a82d3ed613e8d484d7f6f673796bffd" Workload="ci--3510.3.0--a--0ae5c90d19-k8s-csi--node--driver--bvcrg-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0004affd0), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.0-a-0ae5c90d19", "pod":"csi-node-driver-bvcrg", "timestamp":"2023-10-02 20:42:33.523349992 +0000 UTC"}, Hostname:"ci-3510.3.0-a-0ae5c90d19", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 2 20:42:33.666568 env[1465]: time="2023-10-02T20:42:33Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 20:42:33.666568 env[1465]: time="2023-10-02T20:42:33Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 20:42:33.666568 env[1465]: 2023-10-02 20:42:33.532 [INFO][4152] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.0-a-0ae5c90d19' Oct 2 20:42:33.666568 env[1465]: 2023-10-02 20:42:33.533 [INFO][4152] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.1c7bc4319a26a675ea3f6ad2078506009a82d3ed613e8d484d7f6f673796bffd" host="ci-3510.3.0-a-0ae5c90d19" Oct 2 20:42:33.666568 env[1465]: 2023-10-02 20:42:33.537 [INFO][4152] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.0-a-0ae5c90d19" Oct 2 20:42:33.666568 env[1465]: 2023-10-02 20:42:33.545 [INFO][4152] ipam.go 489: Trying affinity for 192.168.11.0/26 host="ci-3510.3.0-a-0ae5c90d19" Oct 2 20:42:33.666568 env[1465]: 2023-10-02 20:42:33.549 [INFO][4152] ipam.go 155: Attempting to load block cidr=192.168.11.0/26 host="ci-3510.3.0-a-0ae5c90d19" Oct 2 20:42:33.666568 env[1465]: 2023-10-02 20:42:33.553 [INFO][4152] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.11.0/26 host="ci-3510.3.0-a-0ae5c90d19" Oct 2 20:42:33.666568 env[1465]: 2023-10-02 20:42:33.553 [INFO][4152] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.11.0/26 handle="k8s-pod-network.1c7bc4319a26a675ea3f6ad2078506009a82d3ed613e8d484d7f6f673796bffd" host="ci-3510.3.0-a-0ae5c90d19" Oct 2 20:42:33.666568 env[1465]: 2023-10-02 20:42:33.557 [INFO][4152] ipam.go 1682: Creating new handle: k8s-pod-network.1c7bc4319a26a675ea3f6ad2078506009a82d3ed613e8d484d7f6f673796bffd Oct 2 20:42:33.666568 env[1465]: 2023-10-02 20:42:33.564 [INFO][4152] ipam.go 1203: Writing block in order to claim IPs block=192.168.11.0/26 handle="k8s-pod-network.1c7bc4319a26a675ea3f6ad2078506009a82d3ed613e8d484d7f6f673796bffd" host="ci-3510.3.0-a-0ae5c90d19" Oct 2 20:42:33.666568 env[1465]: 2023-10-02 20:42:33.573 [INFO][4152] ipam.go 1216: Successfully claimed IPs: [192.168.11.1/26] block=192.168.11.0/26 handle="k8s-pod-network.1c7bc4319a26a675ea3f6ad2078506009a82d3ed613e8d484d7f6f673796bffd" host="ci-3510.3.0-a-0ae5c90d19" Oct 2 20:42:33.666568 env[1465]: 2023-10-02 20:42:33.573 [INFO][4152] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.11.1/26] handle="k8s-pod-network.1c7bc4319a26a675ea3f6ad2078506009a82d3ed613e8d484d7f6f673796bffd" host="ci-3510.3.0-a-0ae5c90d19" Oct 2 20:42:33.666568 env[1465]: time="2023-10-02T20:42:33Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 20:42:33.666568 env[1465]: 2023-10-02 20:42:33.574 [INFO][4152] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.11.1/26] IPv6=[] ContainerID="1c7bc4319a26a675ea3f6ad2078506009a82d3ed613e8d484d7f6f673796bffd" HandleID="k8s-pod-network.1c7bc4319a26a675ea3f6ad2078506009a82d3ed613e8d484d7f6f673796bffd" Workload="ci--3510.3.0--a--0ae5c90d19-k8s-csi--node--driver--bvcrg-eth0" Oct 2 20:42:33.666999 env[1465]: 2023-10-02 20:42:33.580 [INFO][4134] k8s.go 383: Populated endpoint ContainerID="1c7bc4319a26a675ea3f6ad2078506009a82d3ed613e8d484d7f6f673796bffd" Namespace="calico-system" Pod="csi-node-driver-bvcrg" WorkloadEndpoint="ci--3510.3.0--a--0ae5c90d19-k8s-csi--node--driver--bvcrg-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--0ae5c90d19-k8s-csi--node--driver--bvcrg-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"b998aa5b-fd4c-4592-9f7b-c4ba1d884d60", ResourceVersion:"688", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 20, 42, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"759544bff5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-0ae5c90d19", ContainerID:"", Pod:"csi-node-driver-bvcrg", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.11.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali37ed14ac24e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 20:42:33.666999 env[1465]: 2023-10-02 20:42:33.580 [INFO][4134] k8s.go 384: Calico CNI using IPs: [192.168.11.1/32] ContainerID="1c7bc4319a26a675ea3f6ad2078506009a82d3ed613e8d484d7f6f673796bffd" Namespace="calico-system" Pod="csi-node-driver-bvcrg" WorkloadEndpoint="ci--3510.3.0--a--0ae5c90d19-k8s-csi--node--driver--bvcrg-eth0" Oct 2 20:42:33.666999 env[1465]: 2023-10-02 20:42:33.581 [INFO][4134] dataplane_linux.go 68: Setting the host side veth name to cali37ed14ac24e ContainerID="1c7bc4319a26a675ea3f6ad2078506009a82d3ed613e8d484d7f6f673796bffd" Namespace="calico-system" Pod="csi-node-driver-bvcrg" WorkloadEndpoint="ci--3510.3.0--a--0ae5c90d19-k8s-csi--node--driver--bvcrg-eth0" Oct 2 20:42:33.666999 env[1465]: 2023-10-02 20:42:33.649 [INFO][4134] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="1c7bc4319a26a675ea3f6ad2078506009a82d3ed613e8d484d7f6f673796bffd" Namespace="calico-system" Pod="csi-node-driver-bvcrg" WorkloadEndpoint="ci--3510.3.0--a--0ae5c90d19-k8s-csi--node--driver--bvcrg-eth0" Oct 2 20:42:33.666999 env[1465]: 2023-10-02 20:42:33.660 [INFO][4134] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="1c7bc4319a26a675ea3f6ad2078506009a82d3ed613e8d484d7f6f673796bffd" Namespace="calico-system" Pod="csi-node-driver-bvcrg" WorkloadEndpoint="ci--3510.3.0--a--0ae5c90d19-k8s-csi--node--driver--bvcrg-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--0ae5c90d19-k8s-csi--node--driver--bvcrg-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"b998aa5b-fd4c-4592-9f7b-c4ba1d884d60", ResourceVersion:"688", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 20, 42, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"759544bff5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-0ae5c90d19", ContainerID:"1c7bc4319a26a675ea3f6ad2078506009a82d3ed613e8d484d7f6f673796bffd", Pod:"csi-node-driver-bvcrg", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.11.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali37ed14ac24e", MAC:"12:8e:33:f1:16:10", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 20:42:33.666999 env[1465]: 2023-10-02 20:42:33.665 [INFO][4134] k8s.go 489: Wrote updated endpoint to datastore ContainerID="1c7bc4319a26a675ea3f6ad2078506009a82d3ed613e8d484d7f6f673796bffd" Namespace="calico-system" Pod="csi-node-driver-bvcrg" WorkloadEndpoint="ci--3510.3.0--a--0ae5c90d19-k8s-csi--node--driver--bvcrg-eth0" Oct 2 20:42:33.672067 env[1465]: time="2023-10-02T20:42:33.672010451Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 20:42:33.672067 env[1465]: time="2023-10-02T20:42:33.672030502Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 20:42:33.672067 env[1465]: time="2023-10-02T20:42:33.672038700Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 20:42:33.672184 env[1465]: time="2023-10-02T20:42:33.672100504Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/1c7bc4319a26a675ea3f6ad2078506009a82d3ed613e8d484d7f6f673796bffd pid=4193 runtime=io.containerd.runc.v2 Oct 2 20:42:33.671000 audit[4199]: NETFILTER_CFG table=filter:99 family=2 entries=36 op=nft_register_chain pid=4199 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 20:42:33.691188 systemd[1]: Started cri-containerd-1c7bc4319a26a675ea3f6ad2078506009a82d3ed613e8d484d7f6f673796bffd.scope. Oct 2 20:42:33.699091 kernel: kauditd_printk_skb: 151 callbacks suppressed Oct 2 20:42:33.699133 kernel: audit: type=1325 audit(1696279353.671:1159): table=filter:99 family=2 entries=36 op=nft_register_chain pid=4199 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 20:42:33.671000 audit[4199]: SYSCALL arch=c000003e syscall=46 success=yes exit=19908 a0=3 a1=7ffe62bf89f0 a2=0 a3=7ffe62bf89dc items=0 ppid=3812 pid=4199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:33.852113 kernel: audit: type=1300 audit(1696279353.671:1159): arch=c000003e syscall=46 success=yes exit=19908 a0=3 a1=7ffe62bf89f0 a2=0 a3=7ffe62bf89dc items=0 ppid=3812 pid=4199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:33.852186 kernel: audit: type=1327 audit(1696279353.671:1159): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 20:42:33.671000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 20:42:33.763000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:33.974461 kernel: audit: type=1400 audit(1696279353.763:1160): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:33.974485 kernel: audit: type=1400 audit(1696279353.763:1161): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:33.763000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:33.763000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:34.098259 kernel: audit: type=1400 audit(1696279353.763:1162): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:34.098283 kernel: audit: type=1400 audit(1696279353.763:1163): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:33.763000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:34.160552 kernel: audit: type=1400 audit(1696279353.763:1164): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:33.763000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:34.222858 kernel: audit: type=1400 audit(1696279353.763:1165): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:33.763000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:34.285206 kernel: audit: type=1400 audit(1696279353.763:1166): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:33.763000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:33.763000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:33.763000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:33.912000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:33.912000 audit: BPF prog-id=146 op=LOAD Oct 2 20:42:33.912000 audit[4205]: AVC avc: denied { bpf } for pid=4205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:33.912000 audit[4205]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=4193 pid=4205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:33.912000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163376263343331396132366136373565613366366164323037383530 Oct 2 20:42:33.912000 audit[4205]: AVC avc: denied { perfmon } for pid=4205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:33.912000 audit[4205]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=4193 pid=4205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:33.912000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163376263343331396132366136373565613366366164323037383530 Oct 2 20:42:33.912000 audit[4205]: AVC avc: denied { bpf } for pid=4205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:33.912000 audit[4205]: AVC avc: denied { bpf } for pid=4205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:33.912000 audit[4205]: AVC avc: denied { bpf } for pid=4205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:33.912000 audit[4205]: AVC avc: denied { perfmon } for pid=4205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:33.912000 audit[4205]: AVC avc: denied { perfmon } for pid=4205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:33.912000 audit[4205]: AVC avc: denied { perfmon } for pid=4205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:33.912000 audit[4205]: AVC avc: denied { perfmon } for pid=4205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:33.912000 audit[4205]: AVC avc: denied { perfmon } for pid=4205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:33.912000 audit[4205]: AVC avc: denied { bpf } for pid=4205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:33.912000 audit[4205]: AVC avc: denied { bpf } for pid=4205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:33.912000 audit: BPF prog-id=147 op=LOAD Oct 2 20:42:33.912000 audit[4205]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c0001ad290 items=0 ppid=4193 pid=4205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:33.912000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163376263343331396132366136373565613366366164323037383530 Oct 2 20:42:34.035000 audit[4205]: AVC avc: denied { bpf } for pid=4205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:34.035000 audit[4205]: AVC avc: denied { bpf } for pid=4205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:34.035000 audit[4205]: AVC avc: denied { perfmon } for pid=4205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:34.035000 audit[4205]: AVC avc: denied { perfmon } for pid=4205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:34.035000 audit[4205]: AVC avc: denied { perfmon } for pid=4205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:34.035000 audit[4205]: AVC avc: denied { perfmon } for pid=4205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:34.035000 audit[4205]: AVC avc: denied { perfmon } for pid=4205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:34.035000 audit[4205]: AVC avc: denied { bpf } for pid=4205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:34.035000 audit[4205]: AVC avc: denied { bpf } for pid=4205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:34.035000 audit: BPF prog-id=148 op=LOAD Oct 2 20:42:34.035000 audit[4205]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c0001ad2d8 items=0 ppid=4193 pid=4205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:34.035000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163376263343331396132366136373565613366366164323037383530 Oct 2 20:42:34.160000 audit: BPF prog-id=148 op=UNLOAD Oct 2 20:42:34.160000 audit: BPF prog-id=147 op=UNLOAD Oct 2 20:42:34.160000 audit[4205]: AVC avc: denied { bpf } for pid=4205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:34.160000 audit[4205]: AVC avc: denied { bpf } for pid=4205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:34.160000 audit[4205]: AVC avc: denied { bpf } for pid=4205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:34.160000 audit[4205]: AVC avc: denied { perfmon } for pid=4205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:34.160000 audit[4205]: AVC avc: denied { perfmon } for pid=4205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:34.160000 audit[4205]: AVC avc: denied { perfmon } for pid=4205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:34.160000 audit[4205]: AVC avc: denied { perfmon } for pid=4205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:34.160000 audit[4205]: AVC avc: denied { perfmon } for pid=4205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:34.160000 audit[4205]: AVC avc: denied { bpf } for pid=4205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:34.160000 audit[4205]: AVC avc: denied { bpf } for pid=4205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:34.160000 audit: BPF prog-id=149 op=LOAD Oct 2 20:42:34.160000 audit[4205]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c0001ad6e8 items=0 ppid=4193 pid=4205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:34.160000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163376263343331396132366136373565613366366164323037383530 Oct 2 20:42:34.365266 env[1465]: time="2023-10-02T20:42:34.365244286Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-bvcrg,Uid:b998aa5b-fd4c-4592-9f7b-c4ba1d884d60,Namespace:calico-system,Attempt:1,} returns sandbox id \"1c7bc4319a26a675ea3f6ad2078506009a82d3ed613e8d484d7f6f673796bffd\"" Oct 2 20:42:34.365962 env[1465]: time="2023-10-02T20:42:34.365949753Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\"" Oct 2 20:42:34.395878 env[1465]: time="2023-10-02T20:42:34.395852598Z" level=info msg="StopPodSandbox for \"58e4ce0768a9e32892a49ca8bfc51affa0ba35ba180829fb653b1f0bdfcda91b\"" Oct 2 20:42:34.449028 env[1465]: 2023-10-02 20:42:34.424 [INFO][4242] k8s.go 576: Cleaning up netns ContainerID="58e4ce0768a9e32892a49ca8bfc51affa0ba35ba180829fb653b1f0bdfcda91b" Oct 2 20:42:34.449028 env[1465]: 2023-10-02 20:42:34.424 [INFO][4242] dataplane_linux.go 524: Deleting workload's device in netns. ContainerID="58e4ce0768a9e32892a49ca8bfc51affa0ba35ba180829fb653b1f0bdfcda91b" iface="eth0" netns="/var/run/netns/cni-fde0b170-f3f8-6393-abaa-81b6ae070aef" Oct 2 20:42:34.449028 env[1465]: 2023-10-02 20:42:34.424 [INFO][4242] dataplane_linux.go 535: Entered netns, deleting veth. ContainerID="58e4ce0768a9e32892a49ca8bfc51affa0ba35ba180829fb653b1f0bdfcda91b" iface="eth0" netns="/var/run/netns/cni-fde0b170-f3f8-6393-abaa-81b6ae070aef" Oct 2 20:42:34.449028 env[1465]: 2023-10-02 20:42:34.424 [INFO][4242] dataplane_linux.go 562: Workload's veth was already gone. Nothing to do. ContainerID="58e4ce0768a9e32892a49ca8bfc51affa0ba35ba180829fb653b1f0bdfcda91b" iface="eth0" netns="/var/run/netns/cni-fde0b170-f3f8-6393-abaa-81b6ae070aef" Oct 2 20:42:34.449028 env[1465]: 2023-10-02 20:42:34.424 [INFO][4242] k8s.go 583: Releasing IP address(es) ContainerID="58e4ce0768a9e32892a49ca8bfc51affa0ba35ba180829fb653b1f0bdfcda91b" Oct 2 20:42:34.449028 env[1465]: 2023-10-02 20:42:34.424 [INFO][4242] utils.go 196: Calico CNI releasing IP address ContainerID="58e4ce0768a9e32892a49ca8bfc51affa0ba35ba180829fb653b1f0bdfcda91b" Oct 2 20:42:34.449028 env[1465]: 2023-10-02 20:42:34.439 [INFO][4257] ipam_plugin.go 416: Releasing address using handleID ContainerID="58e4ce0768a9e32892a49ca8bfc51affa0ba35ba180829fb653b1f0bdfcda91b" HandleID="k8s-pod-network.58e4ce0768a9e32892a49ca8bfc51affa0ba35ba180829fb653b1f0bdfcda91b" Workload="ci--3510.3.0--a--0ae5c90d19-k8s-coredns--5d78c9869d--4vfjd-eth0" Oct 2 20:42:34.449028 env[1465]: time="2023-10-02T20:42:34Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 20:42:34.449028 env[1465]: time="2023-10-02T20:42:34Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 20:42:34.449028 env[1465]: 2023-10-02 20:42:34.445 [WARNING][4257] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="58e4ce0768a9e32892a49ca8bfc51affa0ba35ba180829fb653b1f0bdfcda91b" HandleID="k8s-pod-network.58e4ce0768a9e32892a49ca8bfc51affa0ba35ba180829fb653b1f0bdfcda91b" Workload="ci--3510.3.0--a--0ae5c90d19-k8s-coredns--5d78c9869d--4vfjd-eth0" Oct 2 20:42:34.449028 env[1465]: 2023-10-02 20:42:34.445 [INFO][4257] ipam_plugin.go 444: Releasing address using workloadID ContainerID="58e4ce0768a9e32892a49ca8bfc51affa0ba35ba180829fb653b1f0bdfcda91b" HandleID="k8s-pod-network.58e4ce0768a9e32892a49ca8bfc51affa0ba35ba180829fb653b1f0bdfcda91b" Workload="ci--3510.3.0--a--0ae5c90d19-k8s-coredns--5d78c9869d--4vfjd-eth0" Oct 2 20:42:34.449028 env[1465]: time="2023-10-02T20:42:34Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 20:42:34.449028 env[1465]: 2023-10-02 20:42:34.447 [INFO][4242] k8s.go 589: Teardown processing complete. ContainerID="58e4ce0768a9e32892a49ca8bfc51affa0ba35ba180829fb653b1f0bdfcda91b" Oct 2 20:42:34.449641 env[1465]: time="2023-10-02T20:42:34.449094836Z" level=info msg="TearDown network for sandbox \"58e4ce0768a9e32892a49ca8bfc51affa0ba35ba180829fb653b1f0bdfcda91b\" successfully" Oct 2 20:42:34.449641 env[1465]: time="2023-10-02T20:42:34.449125816Z" level=info msg="StopPodSandbox for \"58e4ce0768a9e32892a49ca8bfc51affa0ba35ba180829fb653b1f0bdfcda91b\" returns successfully" Oct 2 20:42:34.449701 env[1465]: time="2023-10-02T20:42:34.449647215Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-4vfjd,Uid:a33dface-dd92-4003-8618-14f32fa71c10,Namespace:kube-system,Attempt:1,}" Oct 2 20:42:34.489177 systemd[1]: run-netns-cni\x2dfde0b170\x2df3f8\x2d6393\x2dabaa\x2d81b6ae070aef.mount: Deactivated successfully. Oct 2 20:42:34.566346 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali1ba7f3387c1: link becomes ready Oct 2 20:42:34.579787 systemd-networkd[1309]: cali1ba7f3387c1: Link UP Oct 2 20:42:34.579792 systemd-networkd[1309]: cali1ba7f3387c1: Gained carrier Oct 2 20:42:34.585927 env[1465]: 2023-10-02 20:42:34.498 [INFO][4272] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.0--a--0ae5c90d19-k8s-coredns--5d78c9869d--4vfjd-eth0 coredns-5d78c9869d- kube-system a33dface-dd92-4003-8618-14f32fa71c10 695 0 2023-10-02 20:42:02 +0000 UTC map[k8s-app:kube-dns pod-template-hash:5d78c9869d projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510.3.0-a-0ae5c90d19 coredns-5d78c9869d-4vfjd eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali1ba7f3387c1 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="712d3307a2d085bd10f06776fe02835814f2ebdd4aedcd4f1a364007353722e1" Namespace="kube-system" Pod="coredns-5d78c9869d-4vfjd" WorkloadEndpoint="ci--3510.3.0--a--0ae5c90d19-k8s-coredns--5d78c9869d--4vfjd-" Oct 2 20:42:34.585927 env[1465]: 2023-10-02 20:42:34.498 [INFO][4272] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="712d3307a2d085bd10f06776fe02835814f2ebdd4aedcd4f1a364007353722e1" Namespace="kube-system" Pod="coredns-5d78c9869d-4vfjd" WorkloadEndpoint="ci--3510.3.0--a--0ae5c90d19-k8s-coredns--5d78c9869d--4vfjd-eth0" Oct 2 20:42:34.585927 env[1465]: 2023-10-02 20:42:34.513 [INFO][4295] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="712d3307a2d085bd10f06776fe02835814f2ebdd4aedcd4f1a364007353722e1" HandleID="k8s-pod-network.712d3307a2d085bd10f06776fe02835814f2ebdd4aedcd4f1a364007353722e1" Workload="ci--3510.3.0--a--0ae5c90d19-k8s-coredns--5d78c9869d--4vfjd-eth0" Oct 2 20:42:34.585927 env[1465]: 2023-10-02 20:42:34.519 [INFO][4295] ipam_plugin.go 269: Auto assigning IP ContainerID="712d3307a2d085bd10f06776fe02835814f2ebdd4aedcd4f1a364007353722e1" HandleID="k8s-pod-network.712d3307a2d085bd10f06776fe02835814f2ebdd4aedcd4f1a364007353722e1" Workload="ci--3510.3.0--a--0ae5c90d19-k8s-coredns--5d78c9869d--4vfjd-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00078bc10), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510.3.0-a-0ae5c90d19", "pod":"coredns-5d78c9869d-4vfjd", "timestamp":"2023-10-02 20:42:34.513318926 +0000 UTC"}, Hostname:"ci-3510.3.0-a-0ae5c90d19", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 2 20:42:34.585927 env[1465]: time="2023-10-02T20:42:34Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 20:42:34.585927 env[1465]: time="2023-10-02T20:42:34Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 20:42:34.585927 env[1465]: 2023-10-02 20:42:34.519 [INFO][4295] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.0-a-0ae5c90d19' Oct 2 20:42:34.585927 env[1465]: 2023-10-02 20:42:34.520 [INFO][4295] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.712d3307a2d085bd10f06776fe02835814f2ebdd4aedcd4f1a364007353722e1" host="ci-3510.3.0-a-0ae5c90d19" Oct 2 20:42:34.585927 env[1465]: 2023-10-02 20:42:34.523 [INFO][4295] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.0-a-0ae5c90d19" Oct 2 20:42:34.585927 env[1465]: 2023-10-02 20:42:34.526 [INFO][4295] ipam.go 489: Trying affinity for 192.168.11.0/26 host="ci-3510.3.0-a-0ae5c90d19" Oct 2 20:42:34.585927 env[1465]: 2023-10-02 20:42:34.527 [INFO][4295] ipam.go 155: Attempting to load block cidr=192.168.11.0/26 host="ci-3510.3.0-a-0ae5c90d19" Oct 2 20:42:34.585927 env[1465]: 2023-10-02 20:42:34.529 [INFO][4295] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.11.0/26 host="ci-3510.3.0-a-0ae5c90d19" Oct 2 20:42:34.585927 env[1465]: 2023-10-02 20:42:34.529 [INFO][4295] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.11.0/26 handle="k8s-pod-network.712d3307a2d085bd10f06776fe02835814f2ebdd4aedcd4f1a364007353722e1" host="ci-3510.3.0-a-0ae5c90d19" Oct 2 20:42:34.585927 env[1465]: 2023-10-02 20:42:34.530 [INFO][4295] ipam.go 1682: Creating new handle: k8s-pod-network.712d3307a2d085bd10f06776fe02835814f2ebdd4aedcd4f1a364007353722e1 Oct 2 20:42:34.585927 env[1465]: 2023-10-02 20:42:34.532 [INFO][4295] ipam.go 1203: Writing block in order to claim IPs block=192.168.11.0/26 handle="k8s-pod-network.712d3307a2d085bd10f06776fe02835814f2ebdd4aedcd4f1a364007353722e1" host="ci-3510.3.0-a-0ae5c90d19" Oct 2 20:42:34.585927 env[1465]: 2023-10-02 20:42:34.535 [INFO][4295] ipam.go 1216: Successfully claimed IPs: [192.168.11.2/26] block=192.168.11.0/26 handle="k8s-pod-network.712d3307a2d085bd10f06776fe02835814f2ebdd4aedcd4f1a364007353722e1" host="ci-3510.3.0-a-0ae5c90d19" Oct 2 20:42:34.585927 env[1465]: 2023-10-02 20:42:34.535 [INFO][4295] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.11.2/26] handle="k8s-pod-network.712d3307a2d085bd10f06776fe02835814f2ebdd4aedcd4f1a364007353722e1" host="ci-3510.3.0-a-0ae5c90d19" Oct 2 20:42:34.585927 env[1465]: time="2023-10-02T20:42:34Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 20:42:34.585927 env[1465]: 2023-10-02 20:42:34.535 [INFO][4295] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.11.2/26] IPv6=[] ContainerID="712d3307a2d085bd10f06776fe02835814f2ebdd4aedcd4f1a364007353722e1" HandleID="k8s-pod-network.712d3307a2d085bd10f06776fe02835814f2ebdd4aedcd4f1a364007353722e1" Workload="ci--3510.3.0--a--0ae5c90d19-k8s-coredns--5d78c9869d--4vfjd-eth0" Oct 2 20:42:34.586702 env[1465]: 2023-10-02 20:42:34.536 [INFO][4272] k8s.go 383: Populated endpoint ContainerID="712d3307a2d085bd10f06776fe02835814f2ebdd4aedcd4f1a364007353722e1" Namespace="kube-system" Pod="coredns-5d78c9869d-4vfjd" WorkloadEndpoint="ci--3510.3.0--a--0ae5c90d19-k8s-coredns--5d78c9869d--4vfjd-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--0ae5c90d19-k8s-coredns--5d78c9869d--4vfjd-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"a33dface-dd92-4003-8618-14f32fa71c10", ResourceVersion:"695", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 20, 42, 2, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-0ae5c90d19", ContainerID:"", Pod:"coredns-5d78c9869d-4vfjd", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.11.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali1ba7f3387c1", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 20:42:34.586702 env[1465]: 2023-10-02 20:42:34.536 [INFO][4272] k8s.go 384: Calico CNI using IPs: [192.168.11.2/32] ContainerID="712d3307a2d085bd10f06776fe02835814f2ebdd4aedcd4f1a364007353722e1" Namespace="kube-system" Pod="coredns-5d78c9869d-4vfjd" WorkloadEndpoint="ci--3510.3.0--a--0ae5c90d19-k8s-coredns--5d78c9869d--4vfjd-eth0" Oct 2 20:42:34.586702 env[1465]: 2023-10-02 20:42:34.536 [INFO][4272] dataplane_linux.go 68: Setting the host side veth name to cali1ba7f3387c1 ContainerID="712d3307a2d085bd10f06776fe02835814f2ebdd4aedcd4f1a364007353722e1" Namespace="kube-system" Pod="coredns-5d78c9869d-4vfjd" WorkloadEndpoint="ci--3510.3.0--a--0ae5c90d19-k8s-coredns--5d78c9869d--4vfjd-eth0" Oct 2 20:42:34.586702 env[1465]: 2023-10-02 20:42:34.565 [INFO][4272] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="712d3307a2d085bd10f06776fe02835814f2ebdd4aedcd4f1a364007353722e1" Namespace="kube-system" Pod="coredns-5d78c9869d-4vfjd" WorkloadEndpoint="ci--3510.3.0--a--0ae5c90d19-k8s-coredns--5d78c9869d--4vfjd-eth0" Oct 2 20:42:34.586702 env[1465]: 2023-10-02 20:42:34.579 [INFO][4272] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="712d3307a2d085bd10f06776fe02835814f2ebdd4aedcd4f1a364007353722e1" Namespace="kube-system" Pod="coredns-5d78c9869d-4vfjd" WorkloadEndpoint="ci--3510.3.0--a--0ae5c90d19-k8s-coredns--5d78c9869d--4vfjd-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--0ae5c90d19-k8s-coredns--5d78c9869d--4vfjd-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"a33dface-dd92-4003-8618-14f32fa71c10", ResourceVersion:"695", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 20, 42, 2, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-0ae5c90d19", ContainerID:"712d3307a2d085bd10f06776fe02835814f2ebdd4aedcd4f1a364007353722e1", Pod:"coredns-5d78c9869d-4vfjd", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.11.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali1ba7f3387c1", MAC:"52:fa:b0:a1:8f:7c", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 20:42:34.586702 env[1465]: 2023-10-02 20:42:34.584 [INFO][4272] k8s.go 489: Wrote updated endpoint to datastore ContainerID="712d3307a2d085bd10f06776fe02835814f2ebdd4aedcd4f1a364007353722e1" Namespace="kube-system" Pod="coredns-5d78c9869d-4vfjd" WorkloadEndpoint="ci--3510.3.0--a--0ae5c90d19-k8s-coredns--5d78c9869d--4vfjd-eth0" Oct 2 20:42:34.586911 env[1465]: time="2023-10-02T20:42:34.586770337Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 20:42:34.587236 env[1465]: time="2023-10-02T20:42:34.587210965Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 20:42:34.587398 kubelet[2560]: E1002 20:42:34.587380 2560 remote_image.go:167] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 20:42:34.587611 kubelet[2560]: E1002 20:42:34.587420 2560 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 20:42:34.587663 kubelet[2560]: E1002 20:42:34.587507 2560 kuberuntime_manager.go:1212] container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.25.0,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:etccalico,ReadOnly:false,MountPath:/etc/calico,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,},VolumeMount{Name:kube-api-access-vxrfd,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},} start failed in pod csi-node-driver-bvcrg_calico-system(b998aa5b-fd4c-4592-9f7b-c4ba1d884d60): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/csi:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/csi:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 20:42:34.587950 env[1465]: time="2023-10-02T20:42:34.587936640Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\"" Oct 2 20:42:34.593871 env[1465]: time="2023-10-02T20:42:34.593823891Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 20:42:34.593871 env[1465]: time="2023-10-02T20:42:34.593851240Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 20:42:34.593871 env[1465]: time="2023-10-02T20:42:34.593859776Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 20:42:34.594039 env[1465]: time="2023-10-02T20:42:34.593944150Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/712d3307a2d085bd10f06776fe02835814f2ebdd4aedcd4f1a364007353722e1 pid=4333 runtime=io.containerd.runc.v2 Oct 2 20:42:34.594000 audit[4339]: NETFILTER_CFG table=filter:100 family=2 entries=40 op=nft_register_chain pid=4339 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 20:42:34.594000 audit[4339]: SYSCALL arch=c000003e syscall=46 success=yes exit=21096 a0=3 a1=7ffc58d71670 a2=0 a3=7ffc58d7165c items=0 ppid=3812 pid=4339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:34.594000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 20:42:34.615237 systemd[1]: Started cri-containerd-712d3307a2d085bd10f06776fe02835814f2ebdd4aedcd4f1a364007353722e1.scope. Oct 2 20:42:34.620000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:34.620000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:34.620000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:34.620000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:34.620000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:34.620000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:34.620000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:34.620000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:34.620000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:34.620000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:34.620000 audit: BPF prog-id=150 op=LOAD Oct 2 20:42:34.621000 audit[4346]: AVC avc: denied { bpf } for pid=4346 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:34.621000 audit[4346]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4333 pid=4346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:34.621000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731326433333037613264303835626431306630363737366665303238 Oct 2 20:42:34.621000 audit[4346]: AVC avc: denied { perfmon } for pid=4346 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:34.621000 audit[4346]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=4333 pid=4346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:34.621000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731326433333037613264303835626431306630363737366665303238 Oct 2 20:42:34.621000 audit[4346]: AVC avc: denied { bpf } for pid=4346 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:34.621000 audit[4346]: AVC avc: denied { bpf } for pid=4346 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:34.621000 audit[4346]: AVC avc: denied { bpf } for pid=4346 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:34.621000 audit[4346]: AVC avc: denied { perfmon } for pid=4346 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:34.621000 audit[4346]: AVC avc: denied { perfmon } for pid=4346 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:34.621000 audit[4346]: AVC avc: denied { perfmon } for pid=4346 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:34.621000 audit[4346]: AVC avc: denied { perfmon } for pid=4346 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:34.621000 audit[4346]: AVC avc: denied { perfmon } for pid=4346 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:34.621000 audit[4346]: AVC avc: denied { bpf } for pid=4346 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:34.621000 audit[4346]: AVC avc: denied { bpf } for pid=4346 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:34.621000 audit: BPF prog-id=151 op=LOAD Oct 2 20:42:34.621000 audit[4346]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000304e30 items=0 ppid=4333 pid=4346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:34.621000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731326433333037613264303835626431306630363737366665303238 Oct 2 20:42:34.621000 audit[4346]: AVC avc: denied { bpf } for pid=4346 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:34.621000 audit[4346]: AVC avc: denied { bpf } for pid=4346 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:34.621000 audit[4346]: AVC avc: denied { perfmon } for pid=4346 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:34.621000 audit[4346]: AVC avc: denied { perfmon } for pid=4346 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:34.621000 audit[4346]: AVC avc: denied { perfmon } for pid=4346 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:34.621000 audit[4346]: AVC avc: denied { perfmon } for pid=4346 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:34.621000 audit[4346]: AVC avc: denied { perfmon } for pid=4346 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:34.621000 audit[4346]: AVC avc: denied { bpf } for pid=4346 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:34.621000 audit[4346]: AVC avc: denied { bpf } for pid=4346 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:34.621000 audit: BPF prog-id=152 op=LOAD Oct 2 20:42:34.621000 audit[4346]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000304e78 items=0 ppid=4333 pid=4346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:34.621000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731326433333037613264303835626431306630363737366665303238 Oct 2 20:42:34.621000 audit: BPF prog-id=152 op=UNLOAD Oct 2 20:42:34.621000 audit: BPF prog-id=151 op=UNLOAD Oct 2 20:42:34.621000 audit[4346]: AVC avc: denied { bpf } for pid=4346 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:34.621000 audit[4346]: AVC avc: denied { bpf } for pid=4346 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:34.621000 audit[4346]: AVC avc: denied { bpf } for pid=4346 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:34.621000 audit[4346]: AVC avc: denied { perfmon } for pid=4346 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:34.621000 audit[4346]: AVC avc: denied { perfmon } for pid=4346 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:34.621000 audit[4346]: AVC avc: denied { perfmon } for pid=4346 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:34.621000 audit[4346]: AVC avc: denied { perfmon } for pid=4346 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:34.621000 audit[4346]: AVC avc: denied { perfmon } for pid=4346 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:34.621000 audit[4346]: AVC avc: denied { bpf } for pid=4346 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:34.621000 audit[4346]: AVC avc: denied { bpf } for pid=4346 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:34.621000 audit: BPF prog-id=153 op=LOAD Oct 2 20:42:34.621000 audit[4346]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000305288 items=0 ppid=4333 pid=4346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:34.621000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731326433333037613264303835626431306630363737366665303238 Oct 2 20:42:34.642652 env[1465]: time="2023-10-02T20:42:34.642624028Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-4vfjd,Uid:a33dface-dd92-4003-8618-14f32fa71c10,Namespace:kube-system,Attempt:1,} returns sandbox id \"712d3307a2d085bd10f06776fe02835814f2ebdd4aedcd4f1a364007353722e1\"" Oct 2 20:42:34.644103 env[1465]: time="2023-10-02T20:42:34.644083062Z" level=info msg="CreateContainer within sandbox \"712d3307a2d085bd10f06776fe02835814f2ebdd4aedcd4f1a364007353722e1\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Oct 2 20:42:34.653194 env[1465]: time="2023-10-02T20:42:34.653171982Z" level=info msg="CreateContainer within sandbox \"712d3307a2d085bd10f06776fe02835814f2ebdd4aedcd4f1a364007353722e1\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"f2bc2a0bc6633c0668a65d72948c961b686b4b1d0fd9343a7faff51d8c0f5dbd\"" Oct 2 20:42:34.653447 env[1465]: time="2023-10-02T20:42:34.653410247Z" level=info msg="StartContainer for \"f2bc2a0bc6633c0668a65d72948c961b686b4b1d0fd9343a7faff51d8c0f5dbd\"" Oct 2 20:42:34.675765 systemd[1]: Started cri-containerd-f2bc2a0bc6633c0668a65d72948c961b686b4b1d0fd9343a7faff51d8c0f5dbd.scope. Oct 2 20:42:34.685000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:34.685000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:34.685000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:34.685000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:34.685000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:34.685000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:34.685000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:34.685000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:34.685000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:34.685000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:34.685000 audit: BPF prog-id=154 op=LOAD Oct 2 20:42:34.686000 audit[4376]: AVC avc: denied { bpf } for pid=4376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:34.686000 audit[4376]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4333 pid=4376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:34.686000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632626332613062633636333363303636386136356437323934386339 Oct 2 20:42:34.686000 audit[4376]: AVC avc: denied { perfmon } for pid=4376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:34.686000 audit[4376]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=4333 pid=4376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:34.686000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632626332613062633636333363303636386136356437323934386339 Oct 2 20:42:34.686000 audit[4376]: AVC avc: denied { bpf } for pid=4376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:34.686000 audit[4376]: AVC avc: denied { bpf } for pid=4376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:34.686000 audit[4376]: AVC avc: denied { bpf } for pid=4376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:34.686000 audit[4376]: AVC avc: denied { perfmon } for pid=4376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:34.686000 audit[4376]: AVC avc: denied { perfmon } for pid=4376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:34.686000 audit[4376]: AVC avc: denied { perfmon } for pid=4376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:34.686000 audit[4376]: AVC avc: denied { perfmon } for pid=4376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:34.686000 audit[4376]: AVC avc: denied { perfmon } for pid=4376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:34.686000 audit[4376]: AVC avc: denied { bpf } for pid=4376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:34.686000 audit[4376]: AVC avc: denied { bpf } for pid=4376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:34.686000 audit: BPF prog-id=155 op=LOAD Oct 2 20:42:34.686000 audit[4376]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003441f0 items=0 ppid=4333 pid=4376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:34.686000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632626332613062633636333363303636386136356437323934386339 Oct 2 20:42:34.686000 audit[4376]: AVC avc: denied { bpf } for pid=4376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:34.686000 audit[4376]: AVC avc: denied { bpf } for pid=4376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:34.686000 audit[4376]: AVC avc: denied { perfmon } for pid=4376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:34.686000 audit[4376]: AVC avc: denied { perfmon } for pid=4376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:34.686000 audit[4376]: AVC avc: denied { perfmon } for pid=4376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:34.686000 audit[4376]: AVC avc: denied { perfmon } for pid=4376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:34.686000 audit[4376]: AVC avc: denied { perfmon } for pid=4376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:34.686000 audit[4376]: AVC avc: denied { bpf } for pid=4376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:34.686000 audit[4376]: AVC avc: denied { bpf } for pid=4376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:34.686000 audit: BPF prog-id=156 op=LOAD Oct 2 20:42:34.686000 audit[4376]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000344238 items=0 ppid=4333 pid=4376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:34.686000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632626332613062633636333363303636386136356437323934386339 Oct 2 20:42:34.686000 audit: BPF prog-id=156 op=UNLOAD Oct 2 20:42:34.686000 audit: BPF prog-id=155 op=UNLOAD Oct 2 20:42:34.686000 audit[4376]: AVC avc: denied { bpf } for pid=4376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:34.686000 audit[4376]: AVC avc: denied { bpf } for pid=4376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:34.686000 audit[4376]: AVC avc: denied { bpf } for pid=4376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:34.686000 audit[4376]: AVC avc: denied { perfmon } for pid=4376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:34.686000 audit[4376]: AVC avc: denied { perfmon } for pid=4376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:34.686000 audit[4376]: AVC avc: denied { perfmon } for pid=4376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:34.686000 audit[4376]: AVC avc: denied { perfmon } for pid=4376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:34.686000 audit[4376]: AVC avc: denied { perfmon } for pid=4376 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:34.686000 audit[4376]: AVC avc: denied { bpf } for pid=4376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:34.686000 audit[4376]: AVC avc: denied { bpf } for pid=4376 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:34.686000 audit: BPF prog-id=157 op=LOAD Oct 2 20:42:34.686000 audit[4376]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000344648 items=0 ppid=4333 pid=4376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:34.686000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632626332613062633636333363303636386136356437323934386339 Oct 2 20:42:34.708321 env[1465]: time="2023-10-02T20:42:34.708246241Z" level=info msg="StartContainer for \"f2bc2a0bc6633c0668a65d72948c961b686b4b1d0fd9343a7faff51d8c0f5dbd\" returns successfully" Oct 2 20:42:34.830969 env[1465]: time="2023-10-02T20:42:34.830739790Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 20:42:34.833423 env[1465]: time="2023-10-02T20:42:34.833257845Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 20:42:34.833958 kubelet[2560]: E1002 20:42:34.833911 2560 remote_image.go:167] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 20:42:34.834204 kubelet[2560]: E1002 20:42:34.834006 2560 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 20:42:34.834395 kubelet[2560]: E1002 20:42:34.834205 2560 kuberuntime_manager.go:1212] container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-vxrfd,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},} start failed in pod csi-node-driver-bvcrg_calico-system(b998aa5b-fd4c-4592-9f7b-c4ba1d884d60): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 20:42:34.834395 kubelet[2560]: E1002 20:42:34.834386 2560 pod_workers.go:1294] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/csi-node-driver-bvcrg" podUID=b998aa5b-fd4c-4592-9f7b-c4ba1d884d60 Oct 2 20:42:34.839522 systemd-networkd[1309]: cali37ed14ac24e: Gained IPv6LL Oct 2 20:42:35.397375 env[1465]: time="2023-10-02T20:42:35.397226147Z" level=info msg="StopPodSandbox for \"c3ee07f19ba23087509f30712461d2855f8b13ee077da5bca6f87f1812e41e10\"" Oct 2 20:42:35.500283 env[1465]: 2023-10-02 20:42:35.462 [INFO][4437] k8s.go 576: Cleaning up netns ContainerID="c3ee07f19ba23087509f30712461d2855f8b13ee077da5bca6f87f1812e41e10" Oct 2 20:42:35.500283 env[1465]: 2023-10-02 20:42:35.463 [INFO][4437] dataplane_linux.go 524: Deleting workload's device in netns. ContainerID="c3ee07f19ba23087509f30712461d2855f8b13ee077da5bca6f87f1812e41e10" iface="eth0" netns="/var/run/netns/cni-bc5f5714-31ab-497a-9fb2-6c5ce2dfffbe" Oct 2 20:42:35.500283 env[1465]: 2023-10-02 20:42:35.463 [INFO][4437] dataplane_linux.go 535: Entered netns, deleting veth. ContainerID="c3ee07f19ba23087509f30712461d2855f8b13ee077da5bca6f87f1812e41e10" iface="eth0" netns="/var/run/netns/cni-bc5f5714-31ab-497a-9fb2-6c5ce2dfffbe" Oct 2 20:42:35.500283 env[1465]: 2023-10-02 20:42:35.464 [INFO][4437] dataplane_linux.go 562: Workload's veth was already gone. Nothing to do. ContainerID="c3ee07f19ba23087509f30712461d2855f8b13ee077da5bca6f87f1812e41e10" iface="eth0" netns="/var/run/netns/cni-bc5f5714-31ab-497a-9fb2-6c5ce2dfffbe" Oct 2 20:42:35.500283 env[1465]: 2023-10-02 20:42:35.464 [INFO][4437] k8s.go 583: Releasing IP address(es) ContainerID="c3ee07f19ba23087509f30712461d2855f8b13ee077da5bca6f87f1812e41e10" Oct 2 20:42:35.500283 env[1465]: 2023-10-02 20:42:35.464 [INFO][4437] utils.go 196: Calico CNI releasing IP address ContainerID="c3ee07f19ba23087509f30712461d2855f8b13ee077da5bca6f87f1812e41e10" Oct 2 20:42:35.500283 env[1465]: 2023-10-02 20:42:35.493 [INFO][4453] ipam_plugin.go 416: Releasing address using handleID ContainerID="c3ee07f19ba23087509f30712461d2855f8b13ee077da5bca6f87f1812e41e10" HandleID="k8s-pod-network.c3ee07f19ba23087509f30712461d2855f8b13ee077da5bca6f87f1812e41e10" Workload="ci--3510.3.0--a--0ae5c90d19-k8s-calico--kube--controllers--7bd445fdb4--54jrf-eth0" Oct 2 20:42:35.500283 env[1465]: time="2023-10-02T20:42:35Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 20:42:35.500283 env[1465]: time="2023-10-02T20:42:35Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 20:42:35.500283 env[1465]: 2023-10-02 20:42:35.497 [WARNING][4453] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="c3ee07f19ba23087509f30712461d2855f8b13ee077da5bca6f87f1812e41e10" HandleID="k8s-pod-network.c3ee07f19ba23087509f30712461d2855f8b13ee077da5bca6f87f1812e41e10" Workload="ci--3510.3.0--a--0ae5c90d19-k8s-calico--kube--controllers--7bd445fdb4--54jrf-eth0" Oct 2 20:42:35.500283 env[1465]: 2023-10-02 20:42:35.497 [INFO][4453] ipam_plugin.go 444: Releasing address using workloadID ContainerID="c3ee07f19ba23087509f30712461d2855f8b13ee077da5bca6f87f1812e41e10" HandleID="k8s-pod-network.c3ee07f19ba23087509f30712461d2855f8b13ee077da5bca6f87f1812e41e10" Workload="ci--3510.3.0--a--0ae5c90d19-k8s-calico--kube--controllers--7bd445fdb4--54jrf-eth0" Oct 2 20:42:35.500283 env[1465]: time="2023-10-02T20:42:35Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 20:42:35.500283 env[1465]: 2023-10-02 20:42:35.499 [INFO][4437] k8s.go 589: Teardown processing complete. ContainerID="c3ee07f19ba23087509f30712461d2855f8b13ee077da5bca6f87f1812e41e10" Oct 2 20:42:35.500996 env[1465]: time="2023-10-02T20:42:35.500386756Z" level=info msg="TearDown network for sandbox \"c3ee07f19ba23087509f30712461d2855f8b13ee077da5bca6f87f1812e41e10\" successfully" Oct 2 20:42:35.500996 env[1465]: time="2023-10-02T20:42:35.500411422Z" level=info msg="StopPodSandbox for \"c3ee07f19ba23087509f30712461d2855f8b13ee077da5bca6f87f1812e41e10\" returns successfully" Oct 2 20:42:35.501098 env[1465]: time="2023-10-02T20:42:35.501049020Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-7bd445fdb4-54jrf,Uid:2387d29a-95e7-4eb9-8cfe-b4e8aff25581,Namespace:calico-system,Attempt:1,}" Oct 2 20:42:35.501741 systemd[1]: run-netns-cni\x2dbc5f5714\x2d31ab\x2d497a\x2d9fb2\x2d6c5ce2dfffbe.mount: Deactivated successfully. Oct 2 20:42:35.540183 kubelet[2560]: E1002 20:42:35.540171 2560 pod_workers.go:1294] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-bvcrg" podUID=b998aa5b-fd4c-4592-9f7b-c4ba1d884d60 Oct 2 20:42:35.550468 kubelet[2560]: I1002 20:42:35.550402 2560 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-5d78c9869d-4vfjd" podStartSLOduration=33.550279703 podCreationTimestamp="2023-10-02 20:42:02 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 20:42:35.549558573 +0000 UTC m=+47.212277410" watchObservedRunningTime="2023-10-02 20:42:35.550279703 +0000 UTC m=+47.212998501" Oct 2 20:42:35.573000 audit[4500]: NETFILTER_CFG table=filter:101 family=2 entries=14 op=nft_register_rule pid=4500 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 20:42:35.573000 audit[4500]: SYSCALL arch=c000003e syscall=46 success=yes exit=4956 a0=3 a1=7ffd34845320 a2=0 a3=7ffd3484530c items=0 ppid=2781 pid=4500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:35.573000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 20:42:35.575000 audit[4500]: NETFILTER_CFG table=nat:102 family=2 entries=14 op=nft_register_rule pid=4500 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 20:42:35.575000 audit[4500]: SYSCALL arch=c000003e syscall=46 success=yes exit=3300 a0=3 a1=7ffd34845320 a2=0 a3=31030 items=0 ppid=2781 pid=4500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:35.575000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 20:42:35.611964 systemd-networkd[1309]: calic16b3d11f35: Link UP Oct 2 20:42:35.629000 audit[4513]: NETFILTER_CFG table=filter:103 family=2 entries=38 op=nft_register_chain pid=4513 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 20:42:35.629000 audit[4513]: SYSCALL arch=c000003e syscall=46 success=yes exit=19508 a0=3 a1=7ffcb0ee9370 a2=0 a3=7ffcb0ee935c items=0 ppid=3812 pid=4513 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:35.629000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 20:42:35.640039 systemd-networkd[1309]: calic16b3d11f35: Gained carrier Oct 2 20:42:35.640194 env[1465]: 2023-10-02 20:42:35.521 [INFO][4467] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.0--a--0ae5c90d19-k8s-calico--kube--controllers--7bd445fdb4--54jrf-eth0 calico-kube-controllers-7bd445fdb4- calico-system 2387d29a-95e7-4eb9-8cfe-b4e8aff25581 710 0 2023-10-02 20:42:07 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:7bd445fdb4 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s ci-3510.3.0-a-0ae5c90d19 calico-kube-controllers-7bd445fdb4-54jrf eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] calic16b3d11f35 [] []}} ContainerID="fb8f89fc0d211bf9fcc248c1a7f3992991b33c535bee8fe56e361e5af158a007" Namespace="calico-system" Pod="calico-kube-controllers-7bd445fdb4-54jrf" WorkloadEndpoint="ci--3510.3.0--a--0ae5c90d19-k8s-calico--kube--controllers--7bd445fdb4--54jrf-" Oct 2 20:42:35.640194 env[1465]: 2023-10-02 20:42:35.521 [INFO][4467] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="fb8f89fc0d211bf9fcc248c1a7f3992991b33c535bee8fe56e361e5af158a007" Namespace="calico-system" Pod="calico-kube-controllers-7bd445fdb4-54jrf" WorkloadEndpoint="ci--3510.3.0--a--0ae5c90d19-k8s-calico--kube--controllers--7bd445fdb4--54jrf-eth0" Oct 2 20:42:35.640194 env[1465]: 2023-10-02 20:42:35.534 [INFO][4488] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="fb8f89fc0d211bf9fcc248c1a7f3992991b33c535bee8fe56e361e5af158a007" HandleID="k8s-pod-network.fb8f89fc0d211bf9fcc248c1a7f3992991b33c535bee8fe56e361e5af158a007" Workload="ci--3510.3.0--a--0ae5c90d19-k8s-calico--kube--controllers--7bd445fdb4--54jrf-eth0" Oct 2 20:42:35.640194 env[1465]: 2023-10-02 20:42:35.540 [INFO][4488] ipam_plugin.go 269: Auto assigning IP ContainerID="fb8f89fc0d211bf9fcc248c1a7f3992991b33c535bee8fe56e361e5af158a007" HandleID="k8s-pod-network.fb8f89fc0d211bf9fcc248c1a7f3992991b33c535bee8fe56e361e5af158a007" Workload="ci--3510.3.0--a--0ae5c90d19-k8s-calico--kube--controllers--7bd445fdb4--54jrf-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0004b7080), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.0-a-0ae5c90d19", "pod":"calico-kube-controllers-7bd445fdb4-54jrf", "timestamp":"2023-10-02 20:42:35.534579595 +0000 UTC"}, Hostname:"ci-3510.3.0-a-0ae5c90d19", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 2 20:42:35.640194 env[1465]: time="2023-10-02T20:42:35Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 20:42:35.640194 env[1465]: time="2023-10-02T20:42:35Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 20:42:35.640194 env[1465]: 2023-10-02 20:42:35.540 [INFO][4488] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.0-a-0ae5c90d19' Oct 2 20:42:35.640194 env[1465]: 2023-10-02 20:42:35.544 [INFO][4488] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.fb8f89fc0d211bf9fcc248c1a7f3992991b33c535bee8fe56e361e5af158a007" host="ci-3510.3.0-a-0ae5c90d19" Oct 2 20:42:35.640194 env[1465]: 2023-10-02 20:42:35.554 [INFO][4488] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.0-a-0ae5c90d19" Oct 2 20:42:35.640194 env[1465]: 2023-10-02 20:42:35.562 [INFO][4488] ipam.go 489: Trying affinity for 192.168.11.0/26 host="ci-3510.3.0-a-0ae5c90d19" Oct 2 20:42:35.640194 env[1465]: 2023-10-02 20:42:35.567 [INFO][4488] ipam.go 155: Attempting to load block cidr=192.168.11.0/26 host="ci-3510.3.0-a-0ae5c90d19" Oct 2 20:42:35.640194 env[1465]: 2023-10-02 20:42:35.572 [INFO][4488] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.11.0/26 host="ci-3510.3.0-a-0ae5c90d19" Oct 2 20:42:35.640194 env[1465]: 2023-10-02 20:42:35.572 [INFO][4488] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.11.0/26 handle="k8s-pod-network.fb8f89fc0d211bf9fcc248c1a7f3992991b33c535bee8fe56e361e5af158a007" host="ci-3510.3.0-a-0ae5c90d19" Oct 2 20:42:35.640194 env[1465]: 2023-10-02 20:42:35.575 [INFO][4488] ipam.go 1682: Creating new handle: k8s-pod-network.fb8f89fc0d211bf9fcc248c1a7f3992991b33c535bee8fe56e361e5af158a007 Oct 2 20:42:35.640194 env[1465]: 2023-10-02 20:42:35.582 [INFO][4488] ipam.go 1203: Writing block in order to claim IPs block=192.168.11.0/26 handle="k8s-pod-network.fb8f89fc0d211bf9fcc248c1a7f3992991b33c535bee8fe56e361e5af158a007" host="ci-3510.3.0-a-0ae5c90d19" Oct 2 20:42:35.640194 env[1465]: 2023-10-02 20:42:35.593 [INFO][4488] ipam.go 1216: Successfully claimed IPs: [192.168.11.3/26] block=192.168.11.0/26 handle="k8s-pod-network.fb8f89fc0d211bf9fcc248c1a7f3992991b33c535bee8fe56e361e5af158a007" host="ci-3510.3.0-a-0ae5c90d19" Oct 2 20:42:35.640194 env[1465]: 2023-10-02 20:42:35.593 [INFO][4488] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.11.3/26] handle="k8s-pod-network.fb8f89fc0d211bf9fcc248c1a7f3992991b33c535bee8fe56e361e5af158a007" host="ci-3510.3.0-a-0ae5c90d19" Oct 2 20:42:35.640194 env[1465]: time="2023-10-02T20:42:35Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 20:42:35.640194 env[1465]: 2023-10-02 20:42:35.593 [INFO][4488] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.11.3/26] IPv6=[] ContainerID="fb8f89fc0d211bf9fcc248c1a7f3992991b33c535bee8fe56e361e5af158a007" HandleID="k8s-pod-network.fb8f89fc0d211bf9fcc248c1a7f3992991b33c535bee8fe56e361e5af158a007" Workload="ci--3510.3.0--a--0ae5c90d19-k8s-calico--kube--controllers--7bd445fdb4--54jrf-eth0" Oct 2 20:42:35.640695 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calic16b3d11f35: link becomes ready Oct 2 20:42:35.640722 env[1465]: 2023-10-02 20:42:35.595 [INFO][4467] k8s.go 383: Populated endpoint ContainerID="fb8f89fc0d211bf9fcc248c1a7f3992991b33c535bee8fe56e361e5af158a007" Namespace="calico-system" Pod="calico-kube-controllers-7bd445fdb4-54jrf" WorkloadEndpoint="ci--3510.3.0--a--0ae5c90d19-k8s-calico--kube--controllers--7bd445fdb4--54jrf-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--0ae5c90d19-k8s-calico--kube--controllers--7bd445fdb4--54jrf-eth0", GenerateName:"calico-kube-controllers-7bd445fdb4-", Namespace:"calico-system", SelfLink:"", UID:"2387d29a-95e7-4eb9-8cfe-b4e8aff25581", ResourceVersion:"710", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 20, 42, 7, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"7bd445fdb4", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-0ae5c90d19", ContainerID:"", Pod:"calico-kube-controllers-7bd445fdb4-54jrf", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.11.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calic16b3d11f35", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 20:42:35.640722 env[1465]: 2023-10-02 20:42:35.595 [INFO][4467] k8s.go 384: Calico CNI using IPs: [192.168.11.3/32] ContainerID="fb8f89fc0d211bf9fcc248c1a7f3992991b33c535bee8fe56e361e5af158a007" Namespace="calico-system" Pod="calico-kube-controllers-7bd445fdb4-54jrf" WorkloadEndpoint="ci--3510.3.0--a--0ae5c90d19-k8s-calico--kube--controllers--7bd445fdb4--54jrf-eth0" Oct 2 20:42:35.640722 env[1465]: 2023-10-02 20:42:35.595 [INFO][4467] dataplane_linux.go 68: Setting the host side veth name to calic16b3d11f35 ContainerID="fb8f89fc0d211bf9fcc248c1a7f3992991b33c535bee8fe56e361e5af158a007" Namespace="calico-system" Pod="calico-kube-controllers-7bd445fdb4-54jrf" WorkloadEndpoint="ci--3510.3.0--a--0ae5c90d19-k8s-calico--kube--controllers--7bd445fdb4--54jrf-eth0" Oct 2 20:42:35.640722 env[1465]: 2023-10-02 20:42:35.597 [INFO][4467] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="fb8f89fc0d211bf9fcc248c1a7f3992991b33c535bee8fe56e361e5af158a007" Namespace="calico-system" Pod="calico-kube-controllers-7bd445fdb4-54jrf" WorkloadEndpoint="ci--3510.3.0--a--0ae5c90d19-k8s-calico--kube--controllers--7bd445fdb4--54jrf-eth0" Oct 2 20:42:35.640722 env[1465]: 2023-10-02 20:42:35.612 [INFO][4467] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="fb8f89fc0d211bf9fcc248c1a7f3992991b33c535bee8fe56e361e5af158a007" Namespace="calico-system" Pod="calico-kube-controllers-7bd445fdb4-54jrf" WorkloadEndpoint="ci--3510.3.0--a--0ae5c90d19-k8s-calico--kube--controllers--7bd445fdb4--54jrf-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--0ae5c90d19-k8s-calico--kube--controllers--7bd445fdb4--54jrf-eth0", GenerateName:"calico-kube-controllers-7bd445fdb4-", Namespace:"calico-system", SelfLink:"", UID:"2387d29a-95e7-4eb9-8cfe-b4e8aff25581", ResourceVersion:"710", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 20, 42, 7, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"7bd445fdb4", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-0ae5c90d19", ContainerID:"fb8f89fc0d211bf9fcc248c1a7f3992991b33c535bee8fe56e361e5af158a007", Pod:"calico-kube-controllers-7bd445fdb4-54jrf", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.11.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calic16b3d11f35", MAC:"16:4a:30:af:7a:ff", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 20:42:35.640722 env[1465]: 2023-10-02 20:42:35.618 [INFO][4467] k8s.go 489: Wrote updated endpoint to datastore ContainerID="fb8f89fc0d211bf9fcc248c1a7f3992991b33c535bee8fe56e361e5af158a007" Namespace="calico-system" Pod="calico-kube-controllers-7bd445fdb4-54jrf" WorkloadEndpoint="ci--3510.3.0--a--0ae5c90d19-k8s-calico--kube--controllers--7bd445fdb4--54jrf-eth0" Oct 2 20:42:35.646029 env[1465]: time="2023-10-02T20:42:35.645997024Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 20:42:35.646029 env[1465]: time="2023-10-02T20:42:35.646017280Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 20:42:35.646162 env[1465]: time="2023-10-02T20:42:35.646025560Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 20:42:35.646162 env[1465]: time="2023-10-02T20:42:35.646099578Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/fb8f89fc0d211bf9fcc248c1a7f3992991b33c535bee8fe56e361e5af158a007 pid=4533 runtime=io.containerd.runc.v2 Oct 2 20:42:35.639000 audit[4514]: NETFILTER_CFG table=filter:104 family=2 entries=11 op=nft_register_rule pid=4514 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 20:42:35.639000 audit[4514]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffe39a303e0 a2=0 a3=7ffe39a303cc items=0 ppid=2781 pid=4514 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:35.639000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 20:42:35.663578 systemd[1]: Started cri-containerd-fb8f89fc0d211bf9fcc248c1a7f3992991b33c535bee8fe56e361e5af158a007.scope. Oct 2 20:42:35.668000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:35.668000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:35.668000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:35.668000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:35.668000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:35.668000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:35.668000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:35.668000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:35.668000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:35.668000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:35.668000 audit: BPF prog-id=158 op=LOAD Oct 2 20:42:35.668000 audit[4542]: AVC avc: denied { bpf } for pid=4542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:35.668000 audit[4542]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=4533 pid=4542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:35.668000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662386638396663306432313162663966636332343863316137663339 Oct 2 20:42:35.668000 audit[4542]: AVC avc: denied { perfmon } for pid=4542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:35.668000 audit[4542]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=c items=0 ppid=4533 pid=4542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:35.668000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662386638396663306432313162663966636332343863316137663339 Oct 2 20:42:35.668000 audit[4542]: AVC avc: denied { bpf } for pid=4542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:35.668000 audit[4542]: AVC avc: denied { bpf } for pid=4542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:35.668000 audit[4542]: AVC avc: denied { bpf } for pid=4542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:35.668000 audit[4542]: AVC avc: denied { perfmon } for pid=4542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:35.668000 audit[4542]: AVC avc: denied { perfmon } for pid=4542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:35.668000 audit[4542]: AVC avc: denied { perfmon } for pid=4542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:35.668000 audit[4542]: AVC avc: denied { perfmon } for pid=4542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:35.668000 audit[4542]: AVC avc: denied { perfmon } for pid=4542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:35.668000 audit[4542]: AVC avc: denied { bpf } for pid=4542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:35.668000 audit[4542]: AVC avc: denied { bpf } for pid=4542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:35.668000 audit: BPF prog-id=159 op=LOAD Oct 2 20:42:35.668000 audit[4542]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c0003048f0 items=0 ppid=4533 pid=4542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:35.668000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662386638396663306432313162663966636332343863316137663339 Oct 2 20:42:35.668000 audit[4542]: AVC avc: denied { bpf } for pid=4542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:35.668000 audit[4542]: AVC avc: denied { bpf } for pid=4542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:35.668000 audit[4542]: AVC avc: denied { perfmon } for pid=4542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:35.668000 audit[4542]: AVC avc: denied { perfmon } for pid=4542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:35.668000 audit[4542]: AVC avc: denied { perfmon } for pid=4542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:35.668000 audit[4542]: AVC avc: denied { perfmon } for pid=4542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:35.668000 audit[4542]: AVC avc: denied { perfmon } for pid=4542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:35.668000 audit[4542]: AVC avc: denied { bpf } for pid=4542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:35.668000 audit[4542]: AVC avc: denied { bpf } for pid=4542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:35.668000 audit: BPF prog-id=160 op=LOAD Oct 2 20:42:35.668000 audit[4542]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c000304938 items=0 ppid=4533 pid=4542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:35.668000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662386638396663306432313162663966636332343863316137663339 Oct 2 20:42:35.668000 audit: BPF prog-id=160 op=UNLOAD Oct 2 20:42:35.668000 audit: BPF prog-id=159 op=UNLOAD Oct 2 20:42:35.668000 audit[4542]: AVC avc: denied { bpf } for pid=4542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:35.668000 audit[4542]: AVC avc: denied { bpf } for pid=4542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:35.668000 audit[4542]: AVC avc: denied { bpf } for pid=4542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:35.668000 audit[4542]: AVC avc: denied { perfmon } for pid=4542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:35.668000 audit[4542]: AVC avc: denied { perfmon } for pid=4542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:35.668000 audit[4542]: AVC avc: denied { perfmon } for pid=4542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:35.668000 audit[4542]: AVC avc: denied { perfmon } for pid=4542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:35.668000 audit[4542]: AVC avc: denied { perfmon } for pid=4542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:35.668000 audit[4542]: AVC avc: denied { bpf } for pid=4542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:35.668000 audit[4542]: AVC avc: denied { bpf } for pid=4542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:35.668000 audit: BPF prog-id=161 op=LOAD Oct 2 20:42:35.668000 audit[4542]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c000304d48 items=0 ppid=4533 pid=4542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:35.668000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662386638396663306432313162663966636332343863316137663339 Oct 2 20:42:35.662000 audit[4514]: NETFILTER_CFG table=nat:105 family=2 entries=35 op=nft_register_chain pid=4514 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 20:42:35.662000 audit[4514]: SYSCALL arch=c000003e syscall=46 success=yes exit=13788 a0=3 a1=7ffe39a303e0 a2=0 a3=7ffe39a303cc items=0 ppid=2781 pid=4514 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:35.662000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 20:42:35.686634 env[1465]: time="2023-10-02T20:42:35.686611891Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-7bd445fdb4-54jrf,Uid:2387d29a-95e7-4eb9-8cfe-b4e8aff25581,Namespace:calico-system,Attempt:1,} returns sandbox id \"fb8f89fc0d211bf9fcc248c1a7f3992991b33c535bee8fe56e361e5af158a007\"" Oct 2 20:42:35.687281 env[1465]: time="2023-10-02T20:42:35.687269946Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.25.0\"" Oct 2 20:42:36.397343 env[1465]: time="2023-10-02T20:42:36.397229417Z" level=info msg="StopPodSandbox for \"9878722848151e028e979d6d76f332cc2b0da6cd9447888e3a3b2e0a5ece4e26\"" Oct 2 20:42:36.445892 env[1465]: 2023-10-02 20:42:36.423 [INFO][4582] k8s.go 576: Cleaning up netns ContainerID="9878722848151e028e979d6d76f332cc2b0da6cd9447888e3a3b2e0a5ece4e26" Oct 2 20:42:36.445892 env[1465]: 2023-10-02 20:42:36.423 [INFO][4582] dataplane_linux.go 524: Deleting workload's device in netns. ContainerID="9878722848151e028e979d6d76f332cc2b0da6cd9447888e3a3b2e0a5ece4e26" iface="eth0" netns="/var/run/netns/cni-f25a70df-c9fa-5612-1bdf-e6e98cc95ba5" Oct 2 20:42:36.445892 env[1465]: 2023-10-02 20:42:36.423 [INFO][4582] dataplane_linux.go 535: Entered netns, deleting veth. ContainerID="9878722848151e028e979d6d76f332cc2b0da6cd9447888e3a3b2e0a5ece4e26" iface="eth0" netns="/var/run/netns/cni-f25a70df-c9fa-5612-1bdf-e6e98cc95ba5" Oct 2 20:42:36.445892 env[1465]: 2023-10-02 20:42:36.423 [INFO][4582] dataplane_linux.go 562: Workload's veth was already gone. Nothing to do. ContainerID="9878722848151e028e979d6d76f332cc2b0da6cd9447888e3a3b2e0a5ece4e26" iface="eth0" netns="/var/run/netns/cni-f25a70df-c9fa-5612-1bdf-e6e98cc95ba5" Oct 2 20:42:36.445892 env[1465]: 2023-10-02 20:42:36.423 [INFO][4582] k8s.go 583: Releasing IP address(es) ContainerID="9878722848151e028e979d6d76f332cc2b0da6cd9447888e3a3b2e0a5ece4e26" Oct 2 20:42:36.445892 env[1465]: 2023-10-02 20:42:36.423 [INFO][4582] utils.go 196: Calico CNI releasing IP address ContainerID="9878722848151e028e979d6d76f332cc2b0da6cd9447888e3a3b2e0a5ece4e26" Oct 2 20:42:36.445892 env[1465]: 2023-10-02 20:42:36.437 [INFO][4594] ipam_plugin.go 416: Releasing address using handleID ContainerID="9878722848151e028e979d6d76f332cc2b0da6cd9447888e3a3b2e0a5ece4e26" HandleID="k8s-pod-network.9878722848151e028e979d6d76f332cc2b0da6cd9447888e3a3b2e0a5ece4e26" Workload="ci--3510.3.0--a--0ae5c90d19-k8s-coredns--5d78c9869d--srpmn-eth0" Oct 2 20:42:36.445892 env[1465]: time="2023-10-02T20:42:36Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 20:42:36.445892 env[1465]: time="2023-10-02T20:42:36Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 20:42:36.445892 env[1465]: 2023-10-02 20:42:36.442 [WARNING][4594] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="9878722848151e028e979d6d76f332cc2b0da6cd9447888e3a3b2e0a5ece4e26" HandleID="k8s-pod-network.9878722848151e028e979d6d76f332cc2b0da6cd9447888e3a3b2e0a5ece4e26" Workload="ci--3510.3.0--a--0ae5c90d19-k8s-coredns--5d78c9869d--srpmn-eth0" Oct 2 20:42:36.445892 env[1465]: 2023-10-02 20:42:36.442 [INFO][4594] ipam_plugin.go 444: Releasing address using workloadID ContainerID="9878722848151e028e979d6d76f332cc2b0da6cd9447888e3a3b2e0a5ece4e26" HandleID="k8s-pod-network.9878722848151e028e979d6d76f332cc2b0da6cd9447888e3a3b2e0a5ece4e26" Workload="ci--3510.3.0--a--0ae5c90d19-k8s-coredns--5d78c9869d--srpmn-eth0" Oct 2 20:42:36.445892 env[1465]: time="2023-10-02T20:42:36Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 20:42:36.445892 env[1465]: 2023-10-02 20:42:36.444 [INFO][4582] k8s.go 589: Teardown processing complete. ContainerID="9878722848151e028e979d6d76f332cc2b0da6cd9447888e3a3b2e0a5ece4e26" Oct 2 20:42:36.446579 env[1465]: time="2023-10-02T20:42:36.446002872Z" level=info msg="TearDown network for sandbox \"9878722848151e028e979d6d76f332cc2b0da6cd9447888e3a3b2e0a5ece4e26\" successfully" Oct 2 20:42:36.446579 env[1465]: time="2023-10-02T20:42:36.446031797Z" level=info msg="StopPodSandbox for \"9878722848151e028e979d6d76f332cc2b0da6cd9447888e3a3b2e0a5ece4e26\" returns successfully" Oct 2 20:42:36.446715 env[1465]: time="2023-10-02T20:42:36.446602491Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-srpmn,Uid:9de43226-098c-464a-95b6-db65cb90ac57,Namespace:kube-system,Attempt:1,}" Oct 2 20:42:36.488098 systemd[1]: run-netns-cni\x2df25a70df\x2dc9fa\x2d5612\x2d1bdf\x2de6e98cc95ba5.mount: Deactivated successfully. Oct 2 20:42:36.503431 systemd-networkd[1309]: cali1ba7f3387c1: Gained IPv6LL Oct 2 20:42:36.598322 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali8142879a14e: link becomes ready Oct 2 20:42:36.615835 systemd-networkd[1309]: cali8142879a14e: Link UP Oct 2 20:42:36.642960 systemd-networkd[1309]: cali8142879a14e: Gained carrier Oct 2 20:42:36.643324 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali8142879a14e: link becomes ready Oct 2 20:42:36.650560 env[1465]: 2023-10-02 20:42:36.494 [INFO][4607] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.0--a--0ae5c90d19-k8s-coredns--5d78c9869d--srpmn-eth0 coredns-5d78c9869d- kube-system 9de43226-098c-464a-95b6-db65cb90ac57 730 0 2023-10-02 20:42:02 +0000 UTC map[k8s-app:kube-dns pod-template-hash:5d78c9869d projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510.3.0-a-0ae5c90d19 coredns-5d78c9869d-srpmn eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali8142879a14e [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="e83e691eb740772345c1d62feb60bbf12a1138d6c4b663a4e7c80a9b62d3498b" Namespace="kube-system" Pod="coredns-5d78c9869d-srpmn" WorkloadEndpoint="ci--3510.3.0--a--0ae5c90d19-k8s-coredns--5d78c9869d--srpmn-" Oct 2 20:42:36.650560 env[1465]: 2023-10-02 20:42:36.495 [INFO][4607] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="e83e691eb740772345c1d62feb60bbf12a1138d6c4b663a4e7c80a9b62d3498b" Namespace="kube-system" Pod="coredns-5d78c9869d-srpmn" WorkloadEndpoint="ci--3510.3.0--a--0ae5c90d19-k8s-coredns--5d78c9869d--srpmn-eth0" Oct 2 20:42:36.650560 env[1465]: 2023-10-02 20:42:36.533 [INFO][4632] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="e83e691eb740772345c1d62feb60bbf12a1138d6c4b663a4e7c80a9b62d3498b" HandleID="k8s-pod-network.e83e691eb740772345c1d62feb60bbf12a1138d6c4b663a4e7c80a9b62d3498b" Workload="ci--3510.3.0--a--0ae5c90d19-k8s-coredns--5d78c9869d--srpmn-eth0" Oct 2 20:42:36.650560 env[1465]: 2023-10-02 20:42:36.543 [INFO][4632] ipam_plugin.go 269: Auto assigning IP ContainerID="e83e691eb740772345c1d62feb60bbf12a1138d6c4b663a4e7c80a9b62d3498b" HandleID="k8s-pod-network.e83e691eb740772345c1d62feb60bbf12a1138d6c4b663a4e7c80a9b62d3498b" Workload="ci--3510.3.0--a--0ae5c90d19-k8s-coredns--5d78c9869d--srpmn-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00011ff90), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510.3.0-a-0ae5c90d19", "pod":"coredns-5d78c9869d-srpmn", "timestamp":"2023-10-02 20:42:36.532979639 +0000 UTC"}, Hostname:"ci-3510.3.0-a-0ae5c90d19", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 2 20:42:36.650560 env[1465]: time="2023-10-02T20:42:36Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 20:42:36.650560 env[1465]: time="2023-10-02T20:42:36Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 20:42:36.650560 env[1465]: 2023-10-02 20:42:36.543 [INFO][4632] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.0-a-0ae5c90d19' Oct 2 20:42:36.650560 env[1465]: 2023-10-02 20:42:36.545 [INFO][4632] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.e83e691eb740772345c1d62feb60bbf12a1138d6c4b663a4e7c80a9b62d3498b" host="ci-3510.3.0-a-0ae5c90d19" Oct 2 20:42:36.650560 env[1465]: 2023-10-02 20:42:36.549 [INFO][4632] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.0-a-0ae5c90d19" Oct 2 20:42:36.650560 env[1465]: 2023-10-02 20:42:36.553 [INFO][4632] ipam.go 489: Trying affinity for 192.168.11.0/26 host="ci-3510.3.0-a-0ae5c90d19" Oct 2 20:42:36.650560 env[1465]: 2023-10-02 20:42:36.555 [INFO][4632] ipam.go 155: Attempting to load block cidr=192.168.11.0/26 host="ci-3510.3.0-a-0ae5c90d19" Oct 2 20:42:36.650560 env[1465]: 2023-10-02 20:42:36.557 [INFO][4632] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.11.0/26 host="ci-3510.3.0-a-0ae5c90d19" Oct 2 20:42:36.650560 env[1465]: 2023-10-02 20:42:36.557 [INFO][4632] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.11.0/26 handle="k8s-pod-network.e83e691eb740772345c1d62feb60bbf12a1138d6c4b663a4e7c80a9b62d3498b" host="ci-3510.3.0-a-0ae5c90d19" Oct 2 20:42:36.650560 env[1465]: 2023-10-02 20:42:36.559 [INFO][4632] ipam.go 1682: Creating new handle: k8s-pod-network.e83e691eb740772345c1d62feb60bbf12a1138d6c4b663a4e7c80a9b62d3498b Oct 2 20:42:36.650560 env[1465]: 2023-10-02 20:42:36.562 [INFO][4632] ipam.go 1203: Writing block in order to claim IPs block=192.168.11.0/26 handle="k8s-pod-network.e83e691eb740772345c1d62feb60bbf12a1138d6c4b663a4e7c80a9b62d3498b" host="ci-3510.3.0-a-0ae5c90d19" Oct 2 20:42:36.650560 env[1465]: 2023-10-02 20:42:36.567 [INFO][4632] ipam.go 1216: Successfully claimed IPs: [192.168.11.4/26] block=192.168.11.0/26 handle="k8s-pod-network.e83e691eb740772345c1d62feb60bbf12a1138d6c4b663a4e7c80a9b62d3498b" host="ci-3510.3.0-a-0ae5c90d19" Oct 2 20:42:36.650560 env[1465]: 2023-10-02 20:42:36.567 [INFO][4632] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.11.4/26] handle="k8s-pod-network.e83e691eb740772345c1d62feb60bbf12a1138d6c4b663a4e7c80a9b62d3498b" host="ci-3510.3.0-a-0ae5c90d19" Oct 2 20:42:36.650560 env[1465]: time="2023-10-02T20:42:36Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 20:42:36.650560 env[1465]: 2023-10-02 20:42:36.567 [INFO][4632] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.11.4/26] IPv6=[] ContainerID="e83e691eb740772345c1d62feb60bbf12a1138d6c4b663a4e7c80a9b62d3498b" HandleID="k8s-pod-network.e83e691eb740772345c1d62feb60bbf12a1138d6c4b663a4e7c80a9b62d3498b" Workload="ci--3510.3.0--a--0ae5c90d19-k8s-coredns--5d78c9869d--srpmn-eth0" Oct 2 20:42:36.651350 env[1465]: 2023-10-02 20:42:36.568 [INFO][4607] k8s.go 383: Populated endpoint ContainerID="e83e691eb740772345c1d62feb60bbf12a1138d6c4b663a4e7c80a9b62d3498b" Namespace="kube-system" Pod="coredns-5d78c9869d-srpmn" WorkloadEndpoint="ci--3510.3.0--a--0ae5c90d19-k8s-coredns--5d78c9869d--srpmn-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--0ae5c90d19-k8s-coredns--5d78c9869d--srpmn-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"9de43226-098c-464a-95b6-db65cb90ac57", ResourceVersion:"730", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 20, 42, 2, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-0ae5c90d19", ContainerID:"", Pod:"coredns-5d78c9869d-srpmn", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.11.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali8142879a14e", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 20:42:36.651350 env[1465]: 2023-10-02 20:42:36.569 [INFO][4607] k8s.go 384: Calico CNI using IPs: [192.168.11.4/32] ContainerID="e83e691eb740772345c1d62feb60bbf12a1138d6c4b663a4e7c80a9b62d3498b" Namespace="kube-system" Pod="coredns-5d78c9869d-srpmn" WorkloadEndpoint="ci--3510.3.0--a--0ae5c90d19-k8s-coredns--5d78c9869d--srpmn-eth0" Oct 2 20:42:36.651350 env[1465]: 2023-10-02 20:42:36.569 [INFO][4607] dataplane_linux.go 68: Setting the host side veth name to cali8142879a14e ContainerID="e83e691eb740772345c1d62feb60bbf12a1138d6c4b663a4e7c80a9b62d3498b" Namespace="kube-system" Pod="coredns-5d78c9869d-srpmn" WorkloadEndpoint="ci--3510.3.0--a--0ae5c90d19-k8s-coredns--5d78c9869d--srpmn-eth0" Oct 2 20:42:36.651350 env[1465]: 2023-10-02 20:42:36.597 [INFO][4607] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="e83e691eb740772345c1d62feb60bbf12a1138d6c4b663a4e7c80a9b62d3498b" Namespace="kube-system" Pod="coredns-5d78c9869d-srpmn" WorkloadEndpoint="ci--3510.3.0--a--0ae5c90d19-k8s-coredns--5d78c9869d--srpmn-eth0" Oct 2 20:42:36.651350 env[1465]: 2023-10-02 20:42:36.642 [INFO][4607] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="e83e691eb740772345c1d62feb60bbf12a1138d6c4b663a4e7c80a9b62d3498b" Namespace="kube-system" Pod="coredns-5d78c9869d-srpmn" WorkloadEndpoint="ci--3510.3.0--a--0ae5c90d19-k8s-coredns--5d78c9869d--srpmn-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--0ae5c90d19-k8s-coredns--5d78c9869d--srpmn-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"9de43226-098c-464a-95b6-db65cb90ac57", ResourceVersion:"730", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 20, 42, 2, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-0ae5c90d19", ContainerID:"e83e691eb740772345c1d62feb60bbf12a1138d6c4b663a4e7c80a9b62d3498b", Pod:"coredns-5d78c9869d-srpmn", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.11.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali8142879a14e", MAC:"ea:d7:59:6a:0d:6a", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 20:42:36.651350 env[1465]: 2023-10-02 20:42:36.649 [INFO][4607] k8s.go 489: Wrote updated endpoint to datastore ContainerID="e83e691eb740772345c1d62feb60bbf12a1138d6c4b663a4e7c80a9b62d3498b" Namespace="kube-system" Pod="coredns-5d78c9869d-srpmn" WorkloadEndpoint="ci--3510.3.0--a--0ae5c90d19-k8s-coredns--5d78c9869d--srpmn-eth0" Oct 2 20:42:36.658982 env[1465]: time="2023-10-02T20:42:36.658937117Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 20:42:36.658982 env[1465]: time="2023-10-02T20:42:36.658966483Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 20:42:36.658982 env[1465]: time="2023-10-02T20:42:36.658976422Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 20:42:36.659156 env[1465]: time="2023-10-02T20:42:36.659066208Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e83e691eb740772345c1d62feb60bbf12a1138d6c4b663a4e7c80a9b62d3498b pid=4672 runtime=io.containerd.runc.v2 Oct 2 20:42:36.658000 audit[4674]: NETFILTER_CFG table=filter:106 family=2 entries=38 op=nft_register_chain pid=4674 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 20:42:36.658000 audit[4674]: SYSCALL arch=c000003e syscall=46 success=yes exit=19088 a0=3 a1=7ffd97d35050 a2=0 a3=7ffd97d3503c items=0 ppid=3812 pid=4674 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:36.658000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 20:42:36.681721 systemd[1]: Started cri-containerd-e83e691eb740772345c1d62feb60bbf12a1138d6c4b663a4e7c80a9b62d3498b.scope. Oct 2 20:42:36.688000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:36.688000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:36.688000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:36.688000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:36.688000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:36.688000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:36.688000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:36.688000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:36.688000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:36.688000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:36.688000 audit: BPF prog-id=162 op=LOAD Oct 2 20:42:36.688000 audit[4684]: AVC avc: denied { bpf } for pid=4684 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:36.688000 audit[4684]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4672 pid=4684 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:36.688000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538336536393165623734303737323334356331643632666562363062 Oct 2 20:42:36.688000 audit[4684]: AVC avc: denied { perfmon } for pid=4684 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:36.688000 audit[4684]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=4672 pid=4684 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:36.688000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538336536393165623734303737323334356331643632666562363062 Oct 2 20:42:36.688000 audit[4684]: AVC avc: denied { bpf } for pid=4684 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:36.688000 audit[4684]: AVC avc: denied { bpf } for pid=4684 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:36.688000 audit[4684]: AVC avc: denied { bpf } for pid=4684 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:36.688000 audit[4684]: AVC avc: denied { perfmon } for pid=4684 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:36.688000 audit[4684]: AVC avc: denied { perfmon } for pid=4684 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:36.688000 audit[4684]: AVC avc: denied { perfmon } for pid=4684 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:36.688000 audit[4684]: AVC avc: denied { perfmon } for pid=4684 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:36.688000 audit[4684]: AVC avc: denied { perfmon } for pid=4684 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:36.688000 audit[4684]: AVC avc: denied { bpf } for pid=4684 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:36.688000 audit[4684]: AVC avc: denied { bpf } for pid=4684 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:36.688000 audit: BPF prog-id=163 op=LOAD Oct 2 20:42:36.688000 audit[4684]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000298a50 items=0 ppid=4672 pid=4684 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:36.688000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538336536393165623734303737323334356331643632666562363062 Oct 2 20:42:36.688000 audit[4684]: AVC avc: denied { bpf } for pid=4684 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:36.688000 audit[4684]: AVC avc: denied { bpf } for pid=4684 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:36.688000 audit[4684]: AVC avc: denied { perfmon } for pid=4684 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:36.688000 audit[4684]: AVC avc: denied { perfmon } for pid=4684 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:36.688000 audit[4684]: AVC avc: denied { perfmon } for pid=4684 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:36.688000 audit[4684]: AVC avc: denied { perfmon } for pid=4684 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:36.688000 audit[4684]: AVC avc: denied { perfmon } for pid=4684 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:36.688000 audit[4684]: AVC avc: denied { bpf } for pid=4684 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:36.688000 audit[4684]: AVC avc: denied { bpf } for pid=4684 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:36.688000 audit: BPF prog-id=164 op=LOAD Oct 2 20:42:36.688000 audit[4684]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000298a98 items=0 ppid=4672 pid=4684 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:36.688000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538336536393165623734303737323334356331643632666562363062 Oct 2 20:42:36.689000 audit: BPF prog-id=164 op=UNLOAD Oct 2 20:42:36.689000 audit: BPF prog-id=163 op=UNLOAD Oct 2 20:42:36.689000 audit[4684]: AVC avc: denied { bpf } for pid=4684 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:36.689000 audit[4684]: AVC avc: denied { bpf } for pid=4684 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:36.689000 audit[4684]: AVC avc: denied { bpf } for pid=4684 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:36.689000 audit[4684]: AVC avc: denied { perfmon } for pid=4684 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:36.689000 audit[4684]: AVC avc: denied { perfmon } for pid=4684 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:36.689000 audit[4684]: AVC avc: denied { perfmon } for pid=4684 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:36.689000 audit[4684]: AVC avc: denied { perfmon } for pid=4684 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:36.689000 audit[4684]: AVC avc: denied { perfmon } for pid=4684 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:36.689000 audit[4684]: AVC avc: denied { bpf } for pid=4684 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:36.689000 audit[4684]: AVC avc: denied { bpf } for pid=4684 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:36.689000 audit: BPF prog-id=165 op=LOAD Oct 2 20:42:36.689000 audit[4684]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000298ea8 items=0 ppid=4672 pid=4684 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:36.689000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538336536393165623734303737323334356331643632666562363062 Oct 2 20:42:36.725730 env[1465]: time="2023-10-02T20:42:36.725697736Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-srpmn,Uid:9de43226-098c-464a-95b6-db65cb90ac57,Namespace:kube-system,Attempt:1,} returns sandbox id \"e83e691eb740772345c1d62feb60bbf12a1138d6c4b663a4e7c80a9b62d3498b\"" Oct 2 20:42:36.727346 env[1465]: time="2023-10-02T20:42:36.727326400Z" level=info msg="CreateContainer within sandbox \"e83e691eb740772345c1d62feb60bbf12a1138d6c4b663a4e7c80a9b62d3498b\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Oct 2 20:42:36.732493 env[1465]: time="2023-10-02T20:42:36.732466974Z" level=info msg="CreateContainer within sandbox \"e83e691eb740772345c1d62feb60bbf12a1138d6c4b663a4e7c80a9b62d3498b\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"b9b181267b4846224c151ed7d2a73c108cfac361b4f0634048f24d19f8b8938e\"" Oct 2 20:42:36.732783 env[1465]: time="2023-10-02T20:42:36.732736496Z" level=info msg="StartContainer for \"b9b181267b4846224c151ed7d2a73c108cfac361b4f0634048f24d19f8b8938e\"" Oct 2 20:42:36.754427 systemd[1]: Started cri-containerd-b9b181267b4846224c151ed7d2a73c108cfac361b4f0634048f24d19f8b8938e.scope. Oct 2 20:42:36.763000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:36.763000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:36.763000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:36.763000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:36.763000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:36.763000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:36.763000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:36.763000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:36.763000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:36.763000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:36.763000 audit: BPF prog-id=166 op=LOAD Oct 2 20:42:36.764000 audit[4714]: AVC avc: denied { bpf } for pid=4714 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:36.764000 audit[4714]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=4672 pid=4714 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:36.764000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239623138313236376234383436323234633135316564376432613733 Oct 2 20:42:36.764000 audit[4714]: AVC avc: denied { perfmon } for pid=4714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:36.764000 audit[4714]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=c items=0 ppid=4672 pid=4714 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:36.764000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239623138313236376234383436323234633135316564376432613733 Oct 2 20:42:36.764000 audit[4714]: AVC avc: denied { bpf } for pid=4714 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:36.764000 audit[4714]: AVC avc: denied { bpf } for pid=4714 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:36.764000 audit[4714]: AVC avc: denied { bpf } for pid=4714 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:36.764000 audit[4714]: AVC avc: denied { perfmon } for pid=4714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:36.764000 audit[4714]: AVC avc: denied { perfmon } for pid=4714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:36.764000 audit[4714]: AVC avc: denied { perfmon } for pid=4714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:36.764000 audit[4714]: AVC avc: denied { perfmon } for pid=4714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:36.764000 audit[4714]: AVC avc: denied { perfmon } for pid=4714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:36.764000 audit[4714]: AVC avc: denied { bpf } for pid=4714 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:36.764000 audit[4714]: AVC avc: denied { bpf } for pid=4714 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:36.764000 audit: BPF prog-id=167 op=LOAD Oct 2 20:42:36.764000 audit[4714]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c000024d70 items=0 ppid=4672 pid=4714 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:36.764000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239623138313236376234383436323234633135316564376432613733 Oct 2 20:42:36.764000 audit[4714]: AVC avc: denied { bpf } for pid=4714 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:36.764000 audit[4714]: AVC avc: denied { bpf } for pid=4714 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:36.764000 audit[4714]: AVC avc: denied { perfmon } for pid=4714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:36.764000 audit[4714]: AVC avc: denied { perfmon } for pid=4714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:36.764000 audit[4714]: AVC avc: denied { perfmon } for pid=4714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:36.764000 audit[4714]: AVC avc: denied { perfmon } for pid=4714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:36.764000 audit[4714]: AVC avc: denied { perfmon } for pid=4714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:36.764000 audit[4714]: AVC avc: denied { bpf } for pid=4714 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:36.764000 audit[4714]: AVC avc: denied { bpf } for pid=4714 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:36.764000 audit: BPF prog-id=168 op=LOAD Oct 2 20:42:36.764000 audit[4714]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c000024db8 items=0 ppid=4672 pid=4714 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:36.764000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239623138313236376234383436323234633135316564376432613733 Oct 2 20:42:36.764000 audit: BPF prog-id=168 op=UNLOAD Oct 2 20:42:36.764000 audit: BPF prog-id=167 op=UNLOAD Oct 2 20:42:36.764000 audit[4714]: AVC avc: denied { bpf } for pid=4714 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:36.764000 audit[4714]: AVC avc: denied { bpf } for pid=4714 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:36.764000 audit[4714]: AVC avc: denied { bpf } for pid=4714 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:36.764000 audit[4714]: AVC avc: denied { perfmon } for pid=4714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:36.764000 audit[4714]: AVC avc: denied { perfmon } for pid=4714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:36.764000 audit[4714]: AVC avc: denied { perfmon } for pid=4714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:36.764000 audit[4714]: AVC avc: denied { perfmon } for pid=4714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:36.764000 audit[4714]: AVC avc: denied { perfmon } for pid=4714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:36.764000 audit[4714]: AVC avc: denied { bpf } for pid=4714 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:36.764000 audit[4714]: AVC avc: denied { bpf } for pid=4714 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:36.764000 audit: BPF prog-id=169 op=LOAD Oct 2 20:42:36.764000 audit[4714]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c0000251c8 items=0 ppid=4672 pid=4714 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:36.764000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239623138313236376234383436323234633135316564376432613733 Oct 2 20:42:36.789368 env[1465]: time="2023-10-02T20:42:36.789263126Z" level=info msg="StartContainer for \"b9b181267b4846224c151ed7d2a73c108cfac361b4f0634048f24d19f8b8938e\" returns successfully" Oct 2 20:42:37.335582 systemd-networkd[1309]: calic16b3d11f35: Gained IPv6LL Oct 2 20:42:37.553760 kubelet[2560]: I1002 20:42:37.553734 2560 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-5d78c9869d-srpmn" podStartSLOduration=35.553693918 podCreationTimestamp="2023-10-02 20:42:02 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 20:42:37.553474393 +0000 UTC m=+49.216193155" watchObservedRunningTime="2023-10-02 20:42:37.553693918 +0000 UTC m=+49.216412679" Oct 2 20:42:37.559000 audit[4766]: NETFILTER_CFG table=filter:107 family=2 entries=8 op=nft_register_rule pid=4766 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 20:42:37.559000 audit[4766]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffdb60b73f0 a2=0 a3=7ffdb60b73dc items=0 ppid=2781 pid=4766 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:37.559000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 20:42:37.560000 audit[4766]: NETFILTER_CFG table=nat:108 family=2 entries=44 op=nft_register_rule pid=4766 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 20:42:37.560000 audit[4766]: SYSCALL arch=c000003e syscall=46 success=yes exit=13788 a0=3 a1=7ffdb60b73f0 a2=0 a3=7ffdb60b73dc items=0 ppid=2781 pid=4766 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:37.560000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 20:42:37.848388 systemd-networkd[1309]: cali8142879a14e: Gained IPv6LL Oct 2 20:42:38.557000 audit[4802]: NETFILTER_CFG table=filter:109 family=2 entries=8 op=nft_register_rule pid=4802 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 20:42:38.557000 audit[4802]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffd03ba5010 a2=0 a3=7ffd03ba4ffc items=0 ppid=2781 pid=4802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:38.557000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 20:42:38.560000 audit[4802]: NETFILTER_CFG table=nat:110 family=2 entries=56 op=nft_register_chain pid=4802 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 20:42:38.560000 audit[4802]: SYSCALL arch=c000003e syscall=46 success=yes exit=19452 a0=3 a1=7ffd03ba5010 a2=0 a3=7ffd03ba4ffc items=0 ppid=2781 pid=4802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:38.560000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 20:42:38.883494 env[1465]: time="2023-10-02T20:42:38.883372571Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:42:38.884097 env[1465]: time="2023-10-02T20:42:38.884058154Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5e785d005ccc1ab22527a783835cf2741f6f5f385a8956144c661f8c23ae9d78,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:42:38.885398 env[1465]: time="2023-10-02T20:42:38.885381966Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:42:38.886252 env[1465]: time="2023-10-02T20:42:38.886238846Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:b764feb1777655aabce5988324b69b412d23e087436ee2414dff893a158fcdef,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 20:42:38.886709 env[1465]: time="2023-10-02T20:42:38.886694942Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.25.0\" returns image reference \"sha256:5e785d005ccc1ab22527a783835cf2741f6f5f385a8956144c661f8c23ae9d78\"" Oct 2 20:42:38.887943 env[1465]: time="2023-10-02T20:42:38.887902585Z" level=info msg="CreateContainer within sandbox \"fb8f89fc0d211bf9fcc248c1a7f3992991b33c535bee8fe56e361e5af158a007\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Oct 2 20:42:38.892085 env[1465]: time="2023-10-02T20:42:38.892034963Z" level=info msg="CreateContainer within sandbox \"fb8f89fc0d211bf9fcc248c1a7f3992991b33c535bee8fe56e361e5af158a007\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"d50ad0ef4bac7cb515432d6da72bd565cc954e36b14010ce1fdee7e05afe159f\"" Oct 2 20:42:38.892291 env[1465]: time="2023-10-02T20:42:38.892280093Z" level=info msg="StartContainer for \"d50ad0ef4bac7cb515432d6da72bd565cc954e36b14010ce1fdee7e05afe159f\"" Oct 2 20:42:38.915270 systemd[1]: Started cri-containerd-d50ad0ef4bac7cb515432d6da72bd565cc954e36b14010ce1fdee7e05afe159f.scope. Oct 2 20:42:38.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:38.945402 kernel: kauditd_printk_skb: 368 callbacks suppressed Oct 2 20:42:38.945472 kernel: audit: type=1400 audit(1696279358.918:1279): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:38.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:39.006339 kernel: audit: type=1400 audit(1696279358.918:1280): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:38.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:39.066386 kernel: audit: type=1400 audit(1696279358.918:1281): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:38.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:39.186387 kernel: audit: type=1400 audit(1696279358.918:1282): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:39.186415 kernel: audit: type=1400 audit(1696279358.918:1283): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:38.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:39.246572 kernel: audit: type=1400 audit(1696279358.918:1284): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:38.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:39.306776 kernel: audit: type=1400 audit(1696279358.918:1285): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:38.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:39.366968 kernel: audit: type=1400 audit(1696279358.918:1286): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:38.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:39.427097 kernel: audit: type=1400 audit(1696279358.918:1287): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:38.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:39.487217 kernel: audit: type=1400 audit(1696279359.005:1288): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:39.005000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:39.005000 audit: BPF prog-id=170 op=LOAD Oct 2 20:42:39.005000 audit[4813]: AVC avc: denied { bpf } for pid=4813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:39.005000 audit[4813]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4533 pid=4813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:39.005000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435306164306566346261633763623531353433326436646137326264 Oct 2 20:42:39.005000 audit[4813]: AVC avc: denied { perfmon } for pid=4813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:39.005000 audit[4813]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=4533 pid=4813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:39.005000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435306164306566346261633763623531353433326436646137326264 Oct 2 20:42:39.005000 audit[4813]: AVC avc: denied { bpf } for pid=4813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:39.005000 audit[4813]: AVC avc: denied { bpf } for pid=4813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:39.005000 audit[4813]: AVC avc: denied { bpf } for pid=4813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:39.005000 audit[4813]: AVC avc: denied { perfmon } for pid=4813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:39.005000 audit[4813]: AVC avc: denied { perfmon } for pid=4813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:39.005000 audit[4813]: AVC avc: denied { perfmon } for pid=4813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:39.005000 audit[4813]: AVC avc: denied { perfmon } for pid=4813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:39.005000 audit[4813]: AVC avc: denied { perfmon } for pid=4813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:39.005000 audit[4813]: AVC avc: denied { bpf } for pid=4813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:39.005000 audit[4813]: AVC avc: denied { bpf } for pid=4813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:39.005000 audit: BPF prog-id=171 op=LOAD Oct 2 20:42:39.005000 audit[4813]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000216690 items=0 ppid=4533 pid=4813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:39.005000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435306164306566346261633763623531353433326436646137326264 Oct 2 20:42:39.124000 audit[4813]: AVC avc: denied { bpf } for pid=4813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:39.124000 audit[4813]: AVC avc: denied { bpf } for pid=4813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:39.124000 audit[4813]: AVC avc: denied { perfmon } for pid=4813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:39.124000 audit[4813]: AVC avc: denied { perfmon } for pid=4813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:39.124000 audit[4813]: AVC avc: denied { perfmon } for pid=4813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:39.124000 audit[4813]: AVC avc: denied { perfmon } for pid=4813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:39.124000 audit[4813]: AVC avc: denied { perfmon } for pid=4813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:39.124000 audit[4813]: AVC avc: denied { bpf } for pid=4813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:39.124000 audit[4813]: AVC avc: denied { bpf } for pid=4813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:39.124000 audit: BPF prog-id=172 op=LOAD Oct 2 20:42:39.124000 audit[4813]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002166d8 items=0 ppid=4533 pid=4813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:39.124000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435306164306566346261633763623531353433326436646137326264 Oct 2 20:42:39.245000 audit: BPF prog-id=172 op=UNLOAD Oct 2 20:42:39.245000 audit: BPF prog-id=171 op=UNLOAD Oct 2 20:42:39.245000 audit[4813]: AVC avc: denied { bpf } for pid=4813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:39.245000 audit[4813]: AVC avc: denied { bpf } for pid=4813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:39.245000 audit[4813]: AVC avc: denied { bpf } for pid=4813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:39.245000 audit[4813]: AVC avc: denied { perfmon } for pid=4813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:39.245000 audit[4813]: AVC avc: denied { perfmon } for pid=4813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:39.245000 audit[4813]: AVC avc: denied { perfmon } for pid=4813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:39.245000 audit[4813]: AVC avc: denied { perfmon } for pid=4813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:39.245000 audit[4813]: AVC avc: denied { perfmon } for pid=4813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:39.245000 audit[4813]: AVC avc: denied { bpf } for pid=4813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:39.245000 audit[4813]: AVC avc: denied { bpf } for pid=4813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:39.245000 audit: BPF prog-id=173 op=LOAD Oct 2 20:42:39.245000 audit[4813]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000216ae8 items=0 ppid=4533 pid=4813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:39.245000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435306164306566346261633763623531353433326436646137326264 Oct 2 20:42:39.565235 env[1465]: time="2023-10-02T20:42:39.565208474Z" level=info msg="StartContainer for \"d50ad0ef4bac7cb515432d6da72bd565cc954e36b14010ce1fdee7e05afe159f\" returns successfully" Oct 2 20:42:40.572006 kubelet[2560]: I1002 20:42:40.571988 2560 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-7bd445fdb4-54jrf" podStartSLOduration=30.372247552 podCreationTimestamp="2023-10-02 20:42:07 +0000 UTC" firstStartedPulling="2023-10-02 20:42:35.687161057 +0000 UTC m=+47.349879813" lastFinishedPulling="2023-10-02 20:42:38.886876018 +0000 UTC m=+50.549594774" observedRunningTime="2023-10-02 20:42:40.571732998 +0000 UTC m=+52.234451755" watchObservedRunningTime="2023-10-02 20:42:40.571962513 +0000 UTC m=+52.234681268" Oct 2 20:42:42.059594 kubelet[2560]: I1002 20:42:42.059568 2560 topology_manager.go:212] "Topology Admit Handler" Oct 2 20:42:42.058000 audit[4877]: NETFILTER_CFG table=filter:111 family=2 entries=9 op=nft_register_rule pid=4877 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 20:42:42.058000 audit[4877]: SYSCALL arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7ffc91abba10 a2=0 a3=7ffc91abb9fc items=0 ppid=2781 pid=4877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:42.058000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 20:42:42.062201 kubelet[2560]: I1002 20:42:42.062184 2560 topology_manager.go:212] "Topology Admit Handler" Oct 2 20:42:42.063029 systemd[1]: Created slice kubepods-besteffort-pod262322ed_5deb_44a7_b4eb_407b14988ddd.slice. Oct 2 20:42:42.065830 systemd[1]: Created slice kubepods-besteffort-podfbc4e6de_1ede_4241_b504_4c2b83dbfccc.slice. Oct 2 20:42:42.059000 audit[4877]: NETFILTER_CFG table=nat:112 family=2 entries=20 op=nft_register_rule pid=4877 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 20:42:42.059000 audit[4877]: SYSCALL arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7ffc91abba10 a2=0 a3=7ffc91abb9fc items=0 ppid=2781 pid=4877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:42.059000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 20:42:42.070000 audit[4879]: NETFILTER_CFG table=filter:113 family=2 entries=10 op=nft_register_rule pid=4879 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 20:42:42.070000 audit[4879]: SYSCALL arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7ffebf19c680 a2=0 a3=7ffebf19c66c items=0 ppid=2781 pid=4879 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:42.070000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 20:42:42.075000 audit[4879]: NETFILTER_CFG table=nat:114 family=2 entries=20 op=nft_register_rule pid=4879 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 20:42:42.075000 audit[4879]: SYSCALL arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7ffebf19c680 a2=0 a3=7ffebf19c66c items=0 ppid=2781 pid=4879 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:42.075000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 20:42:42.208568 kubelet[2560]: I1002 20:42:42.208530 2560 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-rxs68\" (UniqueName: \"kubernetes.io/projected/262322ed-5deb-44a7-b4eb-407b14988ddd-kube-api-access-rxs68\") pod \"calico-apiserver-564cd8db77-6mhvq\" (UID: \"262322ed-5deb-44a7-b4eb-407b14988ddd\") " pod="calico-apiserver/calico-apiserver-564cd8db77-6mhvq" Oct 2 20:42:42.208763 kubelet[2560]: I1002 20:42:42.208596 2560 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-twprp\" (UniqueName: \"kubernetes.io/projected/fbc4e6de-1ede-4241-b504-4c2b83dbfccc-kube-api-access-twprp\") pod \"calico-apiserver-564cd8db77-77wn4\" (UID: \"fbc4e6de-1ede-4241-b504-4c2b83dbfccc\") " pod="calico-apiserver/calico-apiserver-564cd8db77-77wn4" Oct 2 20:42:42.208763 kubelet[2560]: I1002 20:42:42.208728 2560 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/fbc4e6de-1ede-4241-b504-4c2b83dbfccc-calico-apiserver-certs\") pod \"calico-apiserver-564cd8db77-77wn4\" (UID: \"fbc4e6de-1ede-4241-b504-4c2b83dbfccc\") " pod="calico-apiserver/calico-apiserver-564cd8db77-77wn4" Oct 2 20:42:42.208887 kubelet[2560]: I1002 20:42:42.208783 2560 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/262322ed-5deb-44a7-b4eb-407b14988ddd-calico-apiserver-certs\") pod \"calico-apiserver-564cd8db77-6mhvq\" (UID: \"262322ed-5deb-44a7-b4eb-407b14988ddd\") " pod="calico-apiserver/calico-apiserver-564cd8db77-6mhvq" Oct 2 20:42:42.365019 env[1465]: time="2023-10-02T20:42:42.364882397Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-564cd8db77-6mhvq,Uid:262322ed-5deb-44a7-b4eb-407b14988ddd,Namespace:calico-apiserver,Attempt:0,}" Oct 2 20:42:42.367582 env[1465]: time="2023-10-02T20:42:42.367537386Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-564cd8db77-77wn4,Uid:fbc4e6de-1ede-4241-b504-4c2b83dbfccc,Namespace:calico-apiserver,Attempt:0,}" Oct 2 20:42:42.546456 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Oct 2 20:42:42.546528 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali26b5885058b: link becomes ready Oct 2 20:42:42.564866 systemd-networkd[1309]: cali26b5885058b: Link UP Oct 2 20:42:42.564870 systemd-networkd[1309]: cali26b5885058b: Gained carrier Oct 2 20:42:42.569304 env[1465]: 2023-10-02 20:42:42.426 [INFO][4885] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.0--a--0ae5c90d19-k8s-calico--apiserver--564cd8db77--77wn4-eth0 calico-apiserver-564cd8db77- calico-apiserver fbc4e6de-1ede-4241-b504-4c2b83dbfccc 818 0 2023-10-02 20:42:42 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:564cd8db77 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510.3.0-a-0ae5c90d19 calico-apiserver-564cd8db77-77wn4 eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali26b5885058b [] []}} ContainerID="7d975b5365a95c19dd0d8a3be68b962c7d2b878fa41e3a127255f2c0fd56a19b" Namespace="calico-apiserver" Pod="calico-apiserver-564cd8db77-77wn4" WorkloadEndpoint="ci--3510.3.0--a--0ae5c90d19-k8s-calico--apiserver--564cd8db77--77wn4-" Oct 2 20:42:42.569304 env[1465]: 2023-10-02 20:42:42.426 [INFO][4885] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="7d975b5365a95c19dd0d8a3be68b962c7d2b878fa41e3a127255f2c0fd56a19b" Namespace="calico-apiserver" Pod="calico-apiserver-564cd8db77-77wn4" WorkloadEndpoint="ci--3510.3.0--a--0ae5c90d19-k8s-calico--apiserver--564cd8db77--77wn4-eth0" Oct 2 20:42:42.569304 env[1465]: 2023-10-02 20:42:42.453 [INFO][4932] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="7d975b5365a95c19dd0d8a3be68b962c7d2b878fa41e3a127255f2c0fd56a19b" HandleID="k8s-pod-network.7d975b5365a95c19dd0d8a3be68b962c7d2b878fa41e3a127255f2c0fd56a19b" Workload="ci--3510.3.0--a--0ae5c90d19-k8s-calico--apiserver--564cd8db77--77wn4-eth0" Oct 2 20:42:42.569304 env[1465]: 2023-10-02 20:42:42.463 [INFO][4932] ipam_plugin.go 269: Auto assigning IP ContainerID="7d975b5365a95c19dd0d8a3be68b962c7d2b878fa41e3a127255f2c0fd56a19b" HandleID="k8s-pod-network.7d975b5365a95c19dd0d8a3be68b962c7d2b878fa41e3a127255f2c0fd56a19b" Workload="ci--3510.3.0--a--0ae5c90d19-k8s-calico--apiserver--564cd8db77--77wn4-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00052f830), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510.3.0-a-0ae5c90d19", "pod":"calico-apiserver-564cd8db77-77wn4", "timestamp":"2023-10-02 20:42:42.453236625 +0000 UTC"}, Hostname:"ci-3510.3.0-a-0ae5c90d19", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 2 20:42:42.569304 env[1465]: time="2023-10-02T20:42:42Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 20:42:42.569304 env[1465]: time="2023-10-02T20:42:42Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 20:42:42.569304 env[1465]: 2023-10-02 20:42:42.463 [INFO][4932] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.0-a-0ae5c90d19' Oct 2 20:42:42.569304 env[1465]: 2023-10-02 20:42:42.465 [INFO][4932] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.7d975b5365a95c19dd0d8a3be68b962c7d2b878fa41e3a127255f2c0fd56a19b" host="ci-3510.3.0-a-0ae5c90d19" Oct 2 20:42:42.569304 env[1465]: 2023-10-02 20:42:42.469 [INFO][4932] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.0-a-0ae5c90d19" Oct 2 20:42:42.569304 env[1465]: 2023-10-02 20:42:42.473 [INFO][4932] ipam.go 489: Trying affinity for 192.168.11.0/26 host="ci-3510.3.0-a-0ae5c90d19" Oct 2 20:42:42.569304 env[1465]: 2023-10-02 20:42:42.475 [INFO][4932] ipam.go 155: Attempting to load block cidr=192.168.11.0/26 host="ci-3510.3.0-a-0ae5c90d19" Oct 2 20:42:42.569304 env[1465]: 2023-10-02 20:42:42.478 [INFO][4932] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.11.0/26 host="ci-3510.3.0-a-0ae5c90d19" Oct 2 20:42:42.569304 env[1465]: 2023-10-02 20:42:42.478 [INFO][4932] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.11.0/26 handle="k8s-pod-network.7d975b5365a95c19dd0d8a3be68b962c7d2b878fa41e3a127255f2c0fd56a19b" host="ci-3510.3.0-a-0ae5c90d19" Oct 2 20:42:42.569304 env[1465]: 2023-10-02 20:42:42.480 [INFO][4932] ipam.go 1682: Creating new handle: k8s-pod-network.7d975b5365a95c19dd0d8a3be68b962c7d2b878fa41e3a127255f2c0fd56a19b Oct 2 20:42:42.569304 env[1465]: 2023-10-02 20:42:42.483 [INFO][4932] ipam.go 1203: Writing block in order to claim IPs block=192.168.11.0/26 handle="k8s-pod-network.7d975b5365a95c19dd0d8a3be68b962c7d2b878fa41e3a127255f2c0fd56a19b" host="ci-3510.3.0-a-0ae5c90d19" Oct 2 20:42:42.569304 env[1465]: 2023-10-02 20:42:42.489 [INFO][4932] ipam.go 1216: Successfully claimed IPs: [192.168.11.5/26] block=192.168.11.0/26 handle="k8s-pod-network.7d975b5365a95c19dd0d8a3be68b962c7d2b878fa41e3a127255f2c0fd56a19b" host="ci-3510.3.0-a-0ae5c90d19" Oct 2 20:42:42.569304 env[1465]: 2023-10-02 20:42:42.489 [INFO][4932] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.11.5/26] handle="k8s-pod-network.7d975b5365a95c19dd0d8a3be68b962c7d2b878fa41e3a127255f2c0fd56a19b" host="ci-3510.3.0-a-0ae5c90d19" Oct 2 20:42:42.569304 env[1465]: time="2023-10-02T20:42:42Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 20:42:42.569304 env[1465]: 2023-10-02 20:42:42.489 [INFO][4932] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.11.5/26] IPv6=[] ContainerID="7d975b5365a95c19dd0d8a3be68b962c7d2b878fa41e3a127255f2c0fd56a19b" HandleID="k8s-pod-network.7d975b5365a95c19dd0d8a3be68b962c7d2b878fa41e3a127255f2c0fd56a19b" Workload="ci--3510.3.0--a--0ae5c90d19-k8s-calico--apiserver--564cd8db77--77wn4-eth0" Oct 2 20:42:42.569784 env[1465]: 2023-10-02 20:42:42.491 [INFO][4885] k8s.go 383: Populated endpoint ContainerID="7d975b5365a95c19dd0d8a3be68b962c7d2b878fa41e3a127255f2c0fd56a19b" Namespace="calico-apiserver" Pod="calico-apiserver-564cd8db77-77wn4" WorkloadEndpoint="ci--3510.3.0--a--0ae5c90d19-k8s-calico--apiserver--564cd8db77--77wn4-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--0ae5c90d19-k8s-calico--apiserver--564cd8db77--77wn4-eth0", GenerateName:"calico-apiserver-564cd8db77-", Namespace:"calico-apiserver", SelfLink:"", UID:"fbc4e6de-1ede-4241-b504-4c2b83dbfccc", ResourceVersion:"818", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 20, 42, 42, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"564cd8db77", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-0ae5c90d19", ContainerID:"", Pod:"calico-apiserver-564cd8db77-77wn4", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.11.5/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali26b5885058b", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 20:42:42.569784 env[1465]: 2023-10-02 20:42:42.491 [INFO][4885] k8s.go 384: Calico CNI using IPs: [192.168.11.5/32] ContainerID="7d975b5365a95c19dd0d8a3be68b962c7d2b878fa41e3a127255f2c0fd56a19b" Namespace="calico-apiserver" Pod="calico-apiserver-564cd8db77-77wn4" WorkloadEndpoint="ci--3510.3.0--a--0ae5c90d19-k8s-calico--apiserver--564cd8db77--77wn4-eth0" Oct 2 20:42:42.569784 env[1465]: 2023-10-02 20:42:42.491 [INFO][4885] dataplane_linux.go 68: Setting the host side veth name to cali26b5885058b ContainerID="7d975b5365a95c19dd0d8a3be68b962c7d2b878fa41e3a127255f2c0fd56a19b" Namespace="calico-apiserver" Pod="calico-apiserver-564cd8db77-77wn4" WorkloadEndpoint="ci--3510.3.0--a--0ae5c90d19-k8s-calico--apiserver--564cd8db77--77wn4-eth0" Oct 2 20:42:42.569784 env[1465]: 2023-10-02 20:42:42.546 [INFO][4885] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="7d975b5365a95c19dd0d8a3be68b962c7d2b878fa41e3a127255f2c0fd56a19b" Namespace="calico-apiserver" Pod="calico-apiserver-564cd8db77-77wn4" WorkloadEndpoint="ci--3510.3.0--a--0ae5c90d19-k8s-calico--apiserver--564cd8db77--77wn4-eth0" Oct 2 20:42:42.569784 env[1465]: 2023-10-02 20:42:42.564 [INFO][4885] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="7d975b5365a95c19dd0d8a3be68b962c7d2b878fa41e3a127255f2c0fd56a19b" Namespace="calico-apiserver" Pod="calico-apiserver-564cd8db77-77wn4" WorkloadEndpoint="ci--3510.3.0--a--0ae5c90d19-k8s-calico--apiserver--564cd8db77--77wn4-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--0ae5c90d19-k8s-calico--apiserver--564cd8db77--77wn4-eth0", GenerateName:"calico-apiserver-564cd8db77-", Namespace:"calico-apiserver", SelfLink:"", UID:"fbc4e6de-1ede-4241-b504-4c2b83dbfccc", ResourceVersion:"818", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 20, 42, 42, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"564cd8db77", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-0ae5c90d19", ContainerID:"7d975b5365a95c19dd0d8a3be68b962c7d2b878fa41e3a127255f2c0fd56a19b", Pod:"calico-apiserver-564cd8db77-77wn4", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.11.5/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali26b5885058b", MAC:"5e:90:3b:8f:7b:60", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 20:42:42.569784 env[1465]: 2023-10-02 20:42:42.568 [INFO][4885] k8s.go 489: Wrote updated endpoint to datastore ContainerID="7d975b5365a95c19dd0d8a3be68b962c7d2b878fa41e3a127255f2c0fd56a19b" Namespace="calico-apiserver" Pod="calico-apiserver-564cd8db77-77wn4" WorkloadEndpoint="ci--3510.3.0--a--0ae5c90d19-k8s-calico--apiserver--564cd8db77--77wn4-eth0" Oct 2 20:42:42.574840 env[1465]: time="2023-10-02T20:42:42.574805353Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 20:42:42.574840 env[1465]: time="2023-10-02T20:42:42.574825914Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 20:42:42.574840 env[1465]: time="2023-10-02T20:42:42.574832900Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 20:42:42.575002 env[1465]: time="2023-10-02T20:42:42.574894334Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/7d975b5365a95c19dd0d8a3be68b962c7d2b878fa41e3a127255f2c0fd56a19b pid=4990 runtime=io.containerd.runc.v2 Oct 2 20:42:42.573000 audit[5005]: NETFILTER_CFG table=filter:115 family=2 entries=59 op=nft_register_chain pid=5005 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 20:42:42.573000 audit[5005]: SYSCALL arch=c000003e syscall=46 success=yes exit=29292 a0=3 a1=7ffd0a72ced0 a2=0 a3=7ffd0a72cebc items=0 ppid=3812 pid=5005 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:42.573000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 20:42:42.592342 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali83c6a56eaa6: link becomes ready Oct 2 20:42:42.592727 systemd[1]: Started cri-containerd-7d975b5365a95c19dd0d8a3be68b962c7d2b878fa41e3a127255f2c0fd56a19b.scope. Oct 2 20:42:42.599000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:42.599000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:42.599000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:42.599000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:42.599000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:42.599000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:42.599000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:42.599000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:42.599000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:42.599000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:42.599000 audit: BPF prog-id=174 op=LOAD Oct 2 20:42:42.599000 audit[4999]: AVC avc: denied { bpf } for pid=4999 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:42.599000 audit[4999]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4990 pid=4999 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:42.599000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764393735623533363561393563313964643064386133626536386239 Oct 2 20:42:42.599000 audit[4999]: AVC avc: denied { perfmon } for pid=4999 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:42.599000 audit[4999]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=4990 pid=4999 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:42.599000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764393735623533363561393563313964643064386133626536386239 Oct 2 20:42:42.599000 audit[4999]: AVC avc: denied { bpf } for pid=4999 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:42.599000 audit[4999]: AVC avc: denied { bpf } for pid=4999 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:42.599000 audit[4999]: AVC avc: denied { bpf } for pid=4999 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:42.599000 audit[4999]: AVC avc: denied { perfmon } for pid=4999 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:42.599000 audit[4999]: AVC avc: denied { perfmon } for pid=4999 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:42.599000 audit[4999]: AVC avc: denied { perfmon } for pid=4999 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:42.599000 audit[4999]: AVC avc: denied { perfmon } for pid=4999 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:42.599000 audit[4999]: AVC avc: denied { perfmon } for pid=4999 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:42.599000 audit[4999]: AVC avc: denied { bpf } for pid=4999 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:42.599000 audit[4999]: AVC avc: denied { bpf } for pid=4999 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:42.599000 audit: BPF prog-id=175 op=LOAD Oct 2 20:42:42.599000 audit[4999]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00022d0f0 items=0 ppid=4990 pid=4999 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:42.599000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764393735623533363561393563313964643064386133626536386239 Oct 2 20:42:42.599000 audit[4999]: AVC avc: denied { bpf } for pid=4999 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:42.599000 audit[4999]: AVC avc: denied { bpf } for pid=4999 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:42.599000 audit[4999]: AVC avc: denied { perfmon } for pid=4999 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:42.599000 audit[4999]: AVC avc: denied { perfmon } for pid=4999 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:42.599000 audit[4999]: AVC avc: denied { perfmon } for pid=4999 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:42.599000 audit[4999]: AVC avc: denied { perfmon } for pid=4999 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:42.599000 audit[4999]: AVC avc: denied { perfmon } for pid=4999 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:42.599000 audit[4999]: AVC avc: denied { bpf } for pid=4999 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:42.599000 audit[4999]: AVC avc: denied { bpf } for pid=4999 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:42.599000 audit: BPF prog-id=176 op=LOAD Oct 2 20:42:42.599000 audit[4999]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00022d138 items=0 ppid=4990 pid=4999 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:42.599000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764393735623533363561393563313964643064386133626536386239 Oct 2 20:42:42.599000 audit: BPF prog-id=176 op=UNLOAD Oct 2 20:42:42.599000 audit: BPF prog-id=175 op=UNLOAD Oct 2 20:42:42.599000 audit[4999]: AVC avc: denied { bpf } for pid=4999 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:42.599000 audit[4999]: AVC avc: denied { bpf } for pid=4999 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:42.599000 audit[4999]: AVC avc: denied { bpf } for pid=4999 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:42.599000 audit[4999]: AVC avc: denied { perfmon } for pid=4999 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:42.599000 audit[4999]: AVC avc: denied { perfmon } for pid=4999 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:42.599000 audit[4999]: AVC avc: denied { perfmon } for pid=4999 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:42.599000 audit[4999]: AVC avc: denied { perfmon } for pid=4999 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:42.599000 audit[4999]: AVC avc: denied { perfmon } for pid=4999 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:42.599000 audit[4999]: AVC avc: denied { bpf } for pid=4999 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:42.599000 audit[4999]: AVC avc: denied { bpf } for pid=4999 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:42.599000 audit: BPF prog-id=177 op=LOAD Oct 2 20:42:42.599000 audit[4999]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00022d548 items=0 ppid=4990 pid=4999 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:42.599000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764393735623533363561393563313964643064386133626536386239 Oct 2 20:42:42.608109 systemd-networkd[1309]: cali83c6a56eaa6: Link UP Oct 2 20:42:42.608112 systemd-networkd[1309]: cali83c6a56eaa6: Gained carrier Oct 2 20:42:42.612625 env[1465]: 2023-10-02 20:42:42.429 [INFO][4887] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.0--a--0ae5c90d19-k8s-calico--apiserver--564cd8db77--6mhvq-eth0 calico-apiserver-564cd8db77- calico-apiserver 262322ed-5deb-44a7-b4eb-407b14988ddd 816 0 2023-10-02 20:42:42 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:564cd8db77 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510.3.0-a-0ae5c90d19 calico-apiserver-564cd8db77-6mhvq eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali83c6a56eaa6 [] []}} ContainerID="86b22c46fcc86d5d9b60bc78879cc97b568adbbfd486704a82da8b61de08f178" Namespace="calico-apiserver" Pod="calico-apiserver-564cd8db77-6mhvq" WorkloadEndpoint="ci--3510.3.0--a--0ae5c90d19-k8s-calico--apiserver--564cd8db77--6mhvq-" Oct 2 20:42:42.612625 env[1465]: 2023-10-02 20:42:42.429 [INFO][4887] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="86b22c46fcc86d5d9b60bc78879cc97b568adbbfd486704a82da8b61de08f178" Namespace="calico-apiserver" Pod="calico-apiserver-564cd8db77-6mhvq" WorkloadEndpoint="ci--3510.3.0--a--0ae5c90d19-k8s-calico--apiserver--564cd8db77--6mhvq-eth0" Oct 2 20:42:42.612625 env[1465]: 2023-10-02 20:42:42.456 [INFO][4937] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="86b22c46fcc86d5d9b60bc78879cc97b568adbbfd486704a82da8b61de08f178" HandleID="k8s-pod-network.86b22c46fcc86d5d9b60bc78879cc97b568adbbfd486704a82da8b61de08f178" Workload="ci--3510.3.0--a--0ae5c90d19-k8s-calico--apiserver--564cd8db77--6mhvq-eth0" Oct 2 20:42:42.612625 env[1465]: 2023-10-02 20:42:42.467 [INFO][4937] ipam_plugin.go 269: Auto assigning IP ContainerID="86b22c46fcc86d5d9b60bc78879cc97b568adbbfd486704a82da8b61de08f178" HandleID="k8s-pod-network.86b22c46fcc86d5d9b60bc78879cc97b568adbbfd486704a82da8b61de08f178" Workload="ci--3510.3.0--a--0ae5c90d19-k8s-calico--apiserver--564cd8db77--6mhvq-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0004b7480), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510.3.0-a-0ae5c90d19", "pod":"calico-apiserver-564cd8db77-6mhvq", "timestamp":"2023-10-02 20:42:42.456863852 +0000 UTC"}, Hostname:"ci-3510.3.0-a-0ae5c90d19", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 2 20:42:42.612625 env[1465]: time="2023-10-02T20:42:42Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 20:42:42.612625 env[1465]: time="2023-10-02T20:42:42Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 20:42:42.612625 env[1465]: 2023-10-02 20:42:42.489 [INFO][4937] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.0-a-0ae5c90d19' Oct 2 20:42:42.612625 env[1465]: 2023-10-02 20:42:42.491 [INFO][4937] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.86b22c46fcc86d5d9b60bc78879cc97b568adbbfd486704a82da8b61de08f178" host="ci-3510.3.0-a-0ae5c90d19" Oct 2 20:42:42.612625 env[1465]: 2023-10-02 20:42:42.519 [INFO][4937] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.0-a-0ae5c90d19" Oct 2 20:42:42.612625 env[1465]: 2023-10-02 20:42:42.523 [INFO][4937] ipam.go 489: Trying affinity for 192.168.11.0/26 host="ci-3510.3.0-a-0ae5c90d19" Oct 2 20:42:42.612625 env[1465]: 2023-10-02 20:42:42.525 [INFO][4937] ipam.go 155: Attempting to load block cidr=192.168.11.0/26 host="ci-3510.3.0-a-0ae5c90d19" Oct 2 20:42:42.612625 env[1465]: 2023-10-02 20:42:42.526 [INFO][4937] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.11.0/26 host="ci-3510.3.0-a-0ae5c90d19" Oct 2 20:42:42.612625 env[1465]: 2023-10-02 20:42:42.526 [INFO][4937] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.11.0/26 handle="k8s-pod-network.86b22c46fcc86d5d9b60bc78879cc97b568adbbfd486704a82da8b61de08f178" host="ci-3510.3.0-a-0ae5c90d19" Oct 2 20:42:42.612625 env[1465]: 2023-10-02 20:42:42.528 [INFO][4937] ipam.go 1682: Creating new handle: k8s-pod-network.86b22c46fcc86d5d9b60bc78879cc97b568adbbfd486704a82da8b61de08f178 Oct 2 20:42:42.612625 env[1465]: 2023-10-02 20:42:42.530 [INFO][4937] ipam.go 1203: Writing block in order to claim IPs block=192.168.11.0/26 handle="k8s-pod-network.86b22c46fcc86d5d9b60bc78879cc97b568adbbfd486704a82da8b61de08f178" host="ci-3510.3.0-a-0ae5c90d19" Oct 2 20:42:42.612625 env[1465]: 2023-10-02 20:42:42.533 [INFO][4937] ipam.go 1216: Successfully claimed IPs: [192.168.11.6/26] block=192.168.11.0/26 handle="k8s-pod-network.86b22c46fcc86d5d9b60bc78879cc97b568adbbfd486704a82da8b61de08f178" host="ci-3510.3.0-a-0ae5c90d19" Oct 2 20:42:42.612625 env[1465]: 2023-10-02 20:42:42.533 [INFO][4937] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.11.6/26] handle="k8s-pod-network.86b22c46fcc86d5d9b60bc78879cc97b568adbbfd486704a82da8b61de08f178" host="ci-3510.3.0-a-0ae5c90d19" Oct 2 20:42:42.612625 env[1465]: time="2023-10-02T20:42:42Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 20:42:42.612625 env[1465]: 2023-10-02 20:42:42.533 [INFO][4937] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.11.6/26] IPv6=[] ContainerID="86b22c46fcc86d5d9b60bc78879cc97b568adbbfd486704a82da8b61de08f178" HandleID="k8s-pod-network.86b22c46fcc86d5d9b60bc78879cc97b568adbbfd486704a82da8b61de08f178" Workload="ci--3510.3.0--a--0ae5c90d19-k8s-calico--apiserver--564cd8db77--6mhvq-eth0" Oct 2 20:42:42.613203 env[1465]: 2023-10-02 20:42:42.534 [INFO][4887] k8s.go 383: Populated endpoint ContainerID="86b22c46fcc86d5d9b60bc78879cc97b568adbbfd486704a82da8b61de08f178" Namespace="calico-apiserver" Pod="calico-apiserver-564cd8db77-6mhvq" WorkloadEndpoint="ci--3510.3.0--a--0ae5c90d19-k8s-calico--apiserver--564cd8db77--6mhvq-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--0ae5c90d19-k8s-calico--apiserver--564cd8db77--6mhvq-eth0", GenerateName:"calico-apiserver-564cd8db77-", Namespace:"calico-apiserver", SelfLink:"", UID:"262322ed-5deb-44a7-b4eb-407b14988ddd", ResourceVersion:"816", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 20, 42, 42, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"564cd8db77", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-0ae5c90d19", ContainerID:"", Pod:"calico-apiserver-564cd8db77-6mhvq", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.11.6/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali83c6a56eaa6", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 20:42:42.613203 env[1465]: 2023-10-02 20:42:42.534 [INFO][4887] k8s.go 384: Calico CNI using IPs: [192.168.11.6/32] ContainerID="86b22c46fcc86d5d9b60bc78879cc97b568adbbfd486704a82da8b61de08f178" Namespace="calico-apiserver" Pod="calico-apiserver-564cd8db77-6mhvq" WorkloadEndpoint="ci--3510.3.0--a--0ae5c90d19-k8s-calico--apiserver--564cd8db77--6mhvq-eth0" Oct 2 20:42:42.613203 env[1465]: 2023-10-02 20:42:42.534 [INFO][4887] dataplane_linux.go 68: Setting the host side veth name to cali83c6a56eaa6 ContainerID="86b22c46fcc86d5d9b60bc78879cc97b568adbbfd486704a82da8b61de08f178" Namespace="calico-apiserver" Pod="calico-apiserver-564cd8db77-6mhvq" WorkloadEndpoint="ci--3510.3.0--a--0ae5c90d19-k8s-calico--apiserver--564cd8db77--6mhvq-eth0" Oct 2 20:42:42.613203 env[1465]: 2023-10-02 20:42:42.592 [INFO][4887] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="86b22c46fcc86d5d9b60bc78879cc97b568adbbfd486704a82da8b61de08f178" Namespace="calico-apiserver" Pod="calico-apiserver-564cd8db77-6mhvq" WorkloadEndpoint="ci--3510.3.0--a--0ae5c90d19-k8s-calico--apiserver--564cd8db77--6mhvq-eth0" Oct 2 20:42:42.613203 env[1465]: 2023-10-02 20:42:42.607 [INFO][4887] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="86b22c46fcc86d5d9b60bc78879cc97b568adbbfd486704a82da8b61de08f178" Namespace="calico-apiserver" Pod="calico-apiserver-564cd8db77-6mhvq" WorkloadEndpoint="ci--3510.3.0--a--0ae5c90d19-k8s-calico--apiserver--564cd8db77--6mhvq-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--0ae5c90d19-k8s-calico--apiserver--564cd8db77--6mhvq-eth0", GenerateName:"calico-apiserver-564cd8db77-", Namespace:"calico-apiserver", SelfLink:"", UID:"262322ed-5deb-44a7-b4eb-407b14988ddd", ResourceVersion:"816", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 20, 42, 42, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"564cd8db77", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-0ae5c90d19", ContainerID:"86b22c46fcc86d5d9b60bc78879cc97b568adbbfd486704a82da8b61de08f178", Pod:"calico-apiserver-564cd8db77-6mhvq", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.11.6/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali83c6a56eaa6", MAC:"a6:bd:d2:d2:27:d4", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 20:42:42.613203 env[1465]: 2023-10-02 20:42:42.611 [INFO][4887] k8s.go 489: Wrote updated endpoint to datastore ContainerID="86b22c46fcc86d5d9b60bc78879cc97b568adbbfd486704a82da8b61de08f178" Namespace="calico-apiserver" Pod="calico-apiserver-564cd8db77-6mhvq" WorkloadEndpoint="ci--3510.3.0--a--0ae5c90d19-k8s-calico--apiserver--564cd8db77--6mhvq-eth0" Oct 2 20:42:42.618248 env[1465]: time="2023-10-02T20:42:42.618149076Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 20:42:42.618248 env[1465]: time="2023-10-02T20:42:42.618172013Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 20:42:42.618248 env[1465]: time="2023-10-02T20:42:42.618178890Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 20:42:42.618248 env[1465]: time="2023-10-02T20:42:42.618240817Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/86b22c46fcc86d5d9b60bc78879cc97b568adbbfd486704a82da8b61de08f178 pid=5045 runtime=io.containerd.runc.v2 Oct 2 20:42:42.618000 audit[5055]: NETFILTER_CFG table=filter:116 family=2 entries=56 op=nft_register_chain pid=5055 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 20:42:42.618000 audit[5055]: SYSCALL arch=c000003e syscall=46 success=yes exit=27348 a0=3 a1=7ffd28aa2c30 a2=0 a3=7ffd28aa2c1c items=0 ppid=3812 pid=5055 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:42.618000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 20:42:42.623877 systemd[1]: Started cri-containerd-86b22c46fcc86d5d9b60bc78879cc97b568adbbfd486704a82da8b61de08f178.scope. Oct 2 20:42:42.629975 env[1465]: time="2023-10-02T20:42:42.629948430Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-564cd8db77-77wn4,Uid:fbc4e6de-1ede-4241-b504-4c2b83dbfccc,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"7d975b5365a95c19dd0d8a3be68b962c7d2b878fa41e3a127255f2c0fd56a19b\"" Oct 2 20:42:42.629000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:42.629000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:42.629000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:42.629000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:42.629000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:42.629000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:42.629000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:42.629000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:42.629000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:42.629000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:42.629000 audit: BPF prog-id=178 op=LOAD Oct 2 20:42:42.629000 audit[5054]: AVC avc: denied { bpf } for pid=5054 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:42.629000 audit[5054]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=5045 pid=5054 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:42.629000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836623232633436666363383664356439623630626337383837396363 Oct 2 20:42:42.629000 audit[5054]: AVC avc: denied { perfmon } for pid=5054 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:42.629000 audit[5054]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=5045 pid=5054 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:42.629000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836623232633436666363383664356439623630626337383837396363 Oct 2 20:42:42.629000 audit[5054]: AVC avc: denied { bpf } for pid=5054 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:42.629000 audit[5054]: AVC avc: denied { bpf } for pid=5054 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:42.629000 audit[5054]: AVC avc: denied { bpf } for pid=5054 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:42.629000 audit[5054]: AVC avc: denied { perfmon } for pid=5054 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:42.629000 audit[5054]: AVC avc: denied { perfmon } for pid=5054 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:42.629000 audit[5054]: AVC avc: denied { perfmon } for pid=5054 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:42.629000 audit[5054]: AVC avc: denied { perfmon } for pid=5054 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:42.629000 audit[5054]: AVC avc: denied { perfmon } for pid=5054 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:42.629000 audit[5054]: AVC avc: denied { bpf } for pid=5054 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:42.629000 audit[5054]: AVC avc: denied { bpf } for pid=5054 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:42.629000 audit: BPF prog-id=179 op=LOAD Oct 2 20:42:42.629000 audit[5054]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000296e90 items=0 ppid=5045 pid=5054 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:42.629000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836623232633436666363383664356439623630626337383837396363 Oct 2 20:42:42.629000 audit[5054]: AVC avc: denied { bpf } for pid=5054 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:42.629000 audit[5054]: AVC avc: denied { bpf } for pid=5054 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:42.629000 audit[5054]: AVC avc: denied { perfmon } for pid=5054 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:42.629000 audit[5054]: AVC avc: denied { perfmon } for pid=5054 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:42.629000 audit[5054]: AVC avc: denied { perfmon } for pid=5054 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:42.629000 audit[5054]: AVC avc: denied { perfmon } for pid=5054 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:42.629000 audit[5054]: AVC avc: denied { perfmon } for pid=5054 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:42.629000 audit[5054]: AVC avc: denied { bpf } for pid=5054 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:42.629000 audit[5054]: AVC avc: denied { bpf } for pid=5054 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:42.629000 audit: BPF prog-id=180 op=LOAD Oct 2 20:42:42.629000 audit[5054]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000296ed8 items=0 ppid=5045 pid=5054 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:42.629000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836623232633436666363383664356439623630626337383837396363 Oct 2 20:42:42.629000 audit: BPF prog-id=180 op=UNLOAD Oct 2 20:42:42.629000 audit: BPF prog-id=179 op=UNLOAD Oct 2 20:42:42.629000 audit[5054]: AVC avc: denied { bpf } for pid=5054 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:42.629000 audit[5054]: AVC avc: denied { bpf } for pid=5054 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:42.629000 audit[5054]: AVC avc: denied { bpf } for pid=5054 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:42.629000 audit[5054]: AVC avc: denied { perfmon } for pid=5054 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:42.629000 audit[5054]: AVC avc: denied { perfmon } for pid=5054 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:42.629000 audit[5054]: AVC avc: denied { perfmon } for pid=5054 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:42.629000 audit[5054]: AVC avc: denied { perfmon } for pid=5054 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:42.629000 audit[5054]: AVC avc: denied { perfmon } for pid=5054 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:42.629000 audit[5054]: AVC avc: denied { bpf } for pid=5054 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:42.629000 audit[5054]: AVC avc: denied { bpf } for pid=5054 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 20:42:42.629000 audit: BPF prog-id=181 op=LOAD Oct 2 20:42:42.629000 audit[5054]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0002972e8 items=0 ppid=5045 pid=5054 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:42.629000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836623232633436666363383664356439623630626337383837396363 Oct 2 20:42:42.631658 env[1465]: time="2023-10-02T20:42:42.630764522Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\"" Oct 2 20:42:42.648227 env[1465]: time="2023-10-02T20:42:42.648199155Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-564cd8db77-6mhvq,Uid:262322ed-5deb-44a7-b4eb-407b14988ddd,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"86b22c46fcc86d5d9b60bc78879cc97b568adbbfd486704a82da8b61de08f178\"" Oct 2 20:42:42.903922 env[1465]: time="2023-10-02T20:42:42.903818524Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 20:42:42.904849 env[1465]: time="2023-10-02T20:42:42.904728803Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 20:42:42.905292 kubelet[2560]: E1002 20:42:42.905243 2560 remote_image.go:167] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 20:42:42.905511 kubelet[2560]: E1002 20:42:42.905361 2560 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 20:42:42.905861 kubelet[2560]: E1002 20:42:42.905808 2560 kuberuntime_manager.go:1212] container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.25.0,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-twprp,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/version,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:90,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/code/filecheck],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:5,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:5,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*false,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},} start failed in pod calico-apiserver-564cd8db77-77wn4_calico-apiserver(fbc4e6de-1ede-4241-b504-4c2b83dbfccc): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 20:42:42.906282 kubelet[2560]: E1002 20:42:42.905960 2560 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-apiserver/calico-apiserver-564cd8db77-77wn4" podUID=fbc4e6de-1ede-4241-b504-4c2b83dbfccc Oct 2 20:42:42.906506 env[1465]: time="2023-10-02T20:42:42.906066257Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\"" Oct 2 20:42:43.175409 env[1465]: time="2023-10-02T20:42:43.175109708Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 20:42:43.176408 env[1465]: time="2023-10-02T20:42:43.176251418Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 20:42:43.176944 kubelet[2560]: E1002 20:42:43.176852 2560 remote_image.go:167] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 20:42:43.177785 kubelet[2560]: E1002 20:42:43.176954 2560 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 20:42:43.177785 kubelet[2560]: E1002 20:42:43.177206 2560 kuberuntime_manager.go:1212] container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.25.0,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-rxs68,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/version,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:90,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/code/filecheck],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:5,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:5,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*false,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},} start failed in pod calico-apiserver-564cd8db77-6mhvq_calico-apiserver(262322ed-5deb-44a7-b4eb-407b14988ddd): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 20:42:43.177785 kubelet[2560]: E1002 20:42:43.177369 2560 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-apiserver/calico-apiserver-564cd8db77-6mhvq" podUID=262322ed-5deb-44a7-b4eb-407b14988ddd Oct 2 20:42:43.569054 kubelet[2560]: E1002 20:42:43.568882 2560 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-564cd8db77-6mhvq" podUID=262322ed-5deb-44a7-b4eb-407b14988ddd Oct 2 20:42:43.571119 kubelet[2560]: E1002 20:42:43.571061 2560 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-564cd8db77-77wn4" podUID=fbc4e6de-1ede-4241-b504-4c2b83dbfccc Oct 2 20:42:43.621000 audit[5079]: NETFILTER_CFG table=filter:117 family=2 entries=10 op=nft_register_rule pid=5079 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 20:42:43.621000 audit[5079]: SYSCALL arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7ffeb2480f60 a2=0 a3=7ffeb2480f4c items=0 ppid=2781 pid=5079 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:43.621000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 20:42:43.623000 audit[5079]: NETFILTER_CFG table=nat:118 family=2 entries=20 op=nft_register_rule pid=5079 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 20:42:43.623000 audit[5079]: SYSCALL arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7ffeb2480f60 a2=0 a3=7ffeb2480f4c items=0 ppid=2781 pid=5079 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:43.623000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 20:42:44.311574 systemd-networkd[1309]: cali83c6a56eaa6: Gained IPv6LL Oct 2 20:42:44.575163 kubelet[2560]: E1002 20:42:44.574902 2560 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-564cd8db77-6mhvq" podUID=262322ed-5deb-44a7-b4eb-407b14988ddd Oct 2 20:42:44.575163 kubelet[2560]: E1002 20:42:44.574937 2560 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-564cd8db77-77wn4" podUID=fbc4e6de-1ede-4241-b504-4c2b83dbfccc Oct 2 20:42:44.631433 systemd-networkd[1309]: cali26b5885058b: Gained IPv6LL Oct 2 20:42:44.637000 audit[5085]: NETFILTER_CFG table=filter:119 family=2 entries=10 op=nft_register_rule pid=5085 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 20:42:44.663519 kernel: kauditd_printk_skb: 185 callbacks suppressed Oct 2 20:42:44.663578 kernel: audit: type=1325 audit(1696279364.637:1341): table=filter:119 family=2 entries=10 op=nft_register_rule pid=5085 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 20:42:44.637000 audit[5085]: SYSCALL arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7ffe55a9f340 a2=0 a3=7ffe55a9f32c items=0 ppid=2781 pid=5085 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:44.810825 kernel: audit: type=1300 audit(1696279364.637:1341): arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7ffe55a9f340 a2=0 a3=7ffe55a9f32c items=0 ppid=2781 pid=5085 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:44.810873 kernel: audit: type=1327 audit(1696279364.637:1341): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 20:42:44.637000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 20:42:44.865119 kernel: audit: type=1400 audit(1696279364.766:1342): avc: denied { watch } for pid=2365 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c425,c522 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:42:44.766000 audit[2365]: AVC avc: denied { watch } for pid=2365 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c425,c522 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:42:44.766000 audit[2365]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000d874c0 a2=fc6 a3=0 items=0 ppid=2217 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c425,c522 key=(null) Oct 2 20:42:45.061586 kernel: audit: type=1300 audit(1696279364.766:1342): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000d874c0 a2=fc6 a3=0 items=0 ppid=2217 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c425,c522 key=(null) Oct 2 20:42:45.061623 kernel: audit: type=1327 audit(1696279364.766:1342): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:42:44.766000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:42:45.148698 kernel: audit: type=1400 audit(1696279364.766:1343): avc: denied { watch } for pid=2365 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521016 scontext=system_u:system_r:svirt_lxc_net_t:s0:c425,c522 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:42:44.766000 audit[2365]: AVC avc: denied { watch } for pid=2365 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521016 scontext=system_u:system_r:svirt_lxc_net_t:s0:c425,c522 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:42:45.234388 kernel: audit: type=1300 audit(1696279364.766:1343): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000c9af00 a2=fc6 a3=0 items=0 ppid=2217 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c425,c522 key=(null) Oct 2 20:42:44.766000 audit[2365]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000c9af00 a2=fc6 a3=0 items=0 ppid=2217 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c425,c522 key=(null) Oct 2 20:42:45.351488 kernel: audit: type=1327 audit(1696279364.766:1343): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:42:44.766000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:42:45.443020 kernel: audit: type=1325 audit(1696279364.637:1344): table=nat:120 family=2 entries=20 op=nft_register_rule pid=5085 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 20:42:44.637000 audit[5085]: NETFILTER_CFG table=nat:120 family=2 entries=20 op=nft_register_rule pid=5085 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 20:42:44.637000 audit[5085]: SYSCALL arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7ffe55a9f340 a2=0 a3=7ffe55a9f32c items=0 ppid=2781 pid=5085 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:42:44.637000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 20:42:44.976000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c78,c1001 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:42:44.976000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=521012 scontext=system_u:system_r:svirt_lxc_net_t:s0:c78,c1001 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:42:44.976000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=68 a1=c006addf40 a2=fc6 a3=0 items=0 ppid=2240 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c78,c1001 key=(null) Oct 2 20:42:44.976000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=66 a1=c0089d1f20 a2=fc6 a3=0 items=0 ppid=2240 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c78,c1001 key=(null) Oct 2 20:42:44.976000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521016 scontext=system_u:system_r:svirt_lxc_net_t:s0:c78,c1001 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:42:44.976000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313331002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Oct 2 20:42:44.976000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313331002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Oct 2 20:42:44.976000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6a a1=c008f0d770 a2=fc6 a3=0 items=0 ppid=2240 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c78,c1001 key=(null) Oct 2 20:42:44.976000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313331002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Oct 2 20:42:44.986000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521016 scontext=system_u:system_r:svirt_lxc_net_t:s0:c78,c1001 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:42:44.986000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=66 a1=c008db4960 a2=fc6 a3=0 items=0 ppid=2240 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c78,c1001 key=(null) Oct 2 20:42:44.986000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313331002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Oct 2 20:42:44.986000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c78,c1001 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:42:44.986000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=66 a1=c00ba5a2e0 a2=fc6 a3=0 items=0 ppid=2240 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c78,c1001 key=(null) Oct 2 20:42:44.986000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313331002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Oct 2 20:42:44.987000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=521018 scontext=system_u:system_r:svirt_lxc_net_t:s0:c78,c1001 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:42:44.987000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=66 a1=c008db49f0 a2=fc6 a3=0 items=0 ppid=2240 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c78,c1001 key=(null) Oct 2 20:42:44.987000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313331002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Oct 2 20:42:46.398025 env[1465]: time="2023-10-02T20:42:46.397895617Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\"" Oct 2 20:42:46.639202 env[1465]: time="2023-10-02T20:42:46.639062617Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 20:42:46.639992 env[1465]: time="2023-10-02T20:42:46.639874985Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 20:42:46.640468 kubelet[2560]: E1002 20:42:46.640378 2560 remote_image.go:167] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 20:42:46.641187 kubelet[2560]: E1002 20:42:46.640498 2560 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 20:42:46.641187 kubelet[2560]: E1002 20:42:46.640788 2560 kuberuntime_manager.go:1212] container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.25.0,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:etccalico,ReadOnly:false,MountPath:/etc/calico,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,},VolumeMount{Name:kube-api-access-vxrfd,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},} start failed in pod csi-node-driver-bvcrg_calico-system(b998aa5b-fd4c-4592-9f7b-c4ba1d884d60): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/csi:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/csi:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 20:42:46.642555 env[1465]: time="2023-10-02T20:42:46.642481033Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\"" Oct 2 20:42:46.887405 env[1465]: time="2023-10-02T20:42:46.887095221Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 20:42:46.888253 env[1465]: time="2023-10-02T20:42:46.888147836Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 20:42:46.888735 kubelet[2560]: E1002 20:42:46.888636 2560 remote_image.go:167] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 20:42:46.888735 kubelet[2560]: E1002 20:42:46.888741 2560 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 20:42:46.889087 kubelet[2560]: E1002 20:42:46.888954 2560 kuberuntime_manager.go:1212] container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-vxrfd,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},} start failed in pod csi-node-driver-bvcrg_calico-system(b998aa5b-fd4c-4592-9f7b-c4ba1d884d60): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 20:42:46.889458 kubelet[2560]: E1002 20:42:46.889132 2560 pod_workers.go:1294] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/csi-node-driver-bvcrg" podUID=b998aa5b-fd4c-4592-9f7b-c4ba1d884d60 Oct 2 20:42:48.391619 env[1465]: time="2023-10-02T20:42:48.391573605Z" level=info msg="StopPodSandbox for \"9878722848151e028e979d6d76f332cc2b0da6cd9447888e3a3b2e0a5ece4e26\"" Oct 2 20:42:48.428228 env[1465]: 2023-10-02 20:42:48.411 [WARNING][5139] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="9878722848151e028e979d6d76f332cc2b0da6cd9447888e3a3b2e0a5ece4e26" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--0ae5c90d19-k8s-coredns--5d78c9869d--srpmn-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"9de43226-098c-464a-95b6-db65cb90ac57", ResourceVersion:"747", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 20, 42, 2, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-0ae5c90d19", ContainerID:"e83e691eb740772345c1d62feb60bbf12a1138d6c4b663a4e7c80a9b62d3498b", Pod:"coredns-5d78c9869d-srpmn", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.11.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali8142879a14e", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 20:42:48.428228 env[1465]: 2023-10-02 20:42:48.411 [INFO][5139] k8s.go 576: Cleaning up netns ContainerID="9878722848151e028e979d6d76f332cc2b0da6cd9447888e3a3b2e0a5ece4e26" Oct 2 20:42:48.428228 env[1465]: 2023-10-02 20:42:48.411 [INFO][5139] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="9878722848151e028e979d6d76f332cc2b0da6cd9447888e3a3b2e0a5ece4e26" iface="eth0" netns="" Oct 2 20:42:48.428228 env[1465]: 2023-10-02 20:42:48.411 [INFO][5139] k8s.go 583: Releasing IP address(es) ContainerID="9878722848151e028e979d6d76f332cc2b0da6cd9447888e3a3b2e0a5ece4e26" Oct 2 20:42:48.428228 env[1465]: 2023-10-02 20:42:48.411 [INFO][5139] utils.go 196: Calico CNI releasing IP address ContainerID="9878722848151e028e979d6d76f332cc2b0da6cd9447888e3a3b2e0a5ece4e26" Oct 2 20:42:48.428228 env[1465]: 2023-10-02 20:42:48.421 [INFO][5153] ipam_plugin.go 416: Releasing address using handleID ContainerID="9878722848151e028e979d6d76f332cc2b0da6cd9447888e3a3b2e0a5ece4e26" HandleID="k8s-pod-network.9878722848151e028e979d6d76f332cc2b0da6cd9447888e3a3b2e0a5ece4e26" Workload="ci--3510.3.0--a--0ae5c90d19-k8s-coredns--5d78c9869d--srpmn-eth0" Oct 2 20:42:48.428228 env[1465]: time="2023-10-02T20:42:48Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 20:42:48.428228 env[1465]: time="2023-10-02T20:42:48Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 20:42:48.428228 env[1465]: 2023-10-02 20:42:48.425 [WARNING][5153] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="9878722848151e028e979d6d76f332cc2b0da6cd9447888e3a3b2e0a5ece4e26" HandleID="k8s-pod-network.9878722848151e028e979d6d76f332cc2b0da6cd9447888e3a3b2e0a5ece4e26" Workload="ci--3510.3.0--a--0ae5c90d19-k8s-coredns--5d78c9869d--srpmn-eth0" Oct 2 20:42:48.428228 env[1465]: 2023-10-02 20:42:48.425 [INFO][5153] ipam_plugin.go 444: Releasing address using workloadID ContainerID="9878722848151e028e979d6d76f332cc2b0da6cd9447888e3a3b2e0a5ece4e26" HandleID="k8s-pod-network.9878722848151e028e979d6d76f332cc2b0da6cd9447888e3a3b2e0a5ece4e26" Workload="ci--3510.3.0--a--0ae5c90d19-k8s-coredns--5d78c9869d--srpmn-eth0" Oct 2 20:42:48.428228 env[1465]: time="2023-10-02T20:42:48Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 20:42:48.428228 env[1465]: 2023-10-02 20:42:48.427 [INFO][5139] k8s.go 589: Teardown processing complete. ContainerID="9878722848151e028e979d6d76f332cc2b0da6cd9447888e3a3b2e0a5ece4e26" Oct 2 20:42:48.428228 env[1465]: time="2023-10-02T20:42:48.428210658Z" level=info msg="TearDown network for sandbox \"9878722848151e028e979d6d76f332cc2b0da6cd9447888e3a3b2e0a5ece4e26\" successfully" Oct 2 20:42:48.428228 env[1465]: time="2023-10-02T20:42:48.428227228Z" level=info msg="StopPodSandbox for \"9878722848151e028e979d6d76f332cc2b0da6cd9447888e3a3b2e0a5ece4e26\" returns successfully" Oct 2 20:42:48.428610 env[1465]: time="2023-10-02T20:42:48.428472988Z" level=info msg="RemovePodSandbox for \"9878722848151e028e979d6d76f332cc2b0da6cd9447888e3a3b2e0a5ece4e26\"" Oct 2 20:42:48.428610 env[1465]: time="2023-10-02T20:42:48.428491360Z" level=info msg="Forcibly stopping sandbox \"9878722848151e028e979d6d76f332cc2b0da6cd9447888e3a3b2e0a5ece4e26\"" Oct 2 20:42:48.469287 env[1465]: 2023-10-02 20:42:48.448 [WARNING][5182] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="9878722848151e028e979d6d76f332cc2b0da6cd9447888e3a3b2e0a5ece4e26" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--0ae5c90d19-k8s-coredns--5d78c9869d--srpmn-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"9de43226-098c-464a-95b6-db65cb90ac57", ResourceVersion:"747", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 20, 42, 2, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-0ae5c90d19", ContainerID:"e83e691eb740772345c1d62feb60bbf12a1138d6c4b663a4e7c80a9b62d3498b", Pod:"coredns-5d78c9869d-srpmn", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.11.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali8142879a14e", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 20:42:48.469287 env[1465]: 2023-10-02 20:42:48.448 [INFO][5182] k8s.go 576: Cleaning up netns ContainerID="9878722848151e028e979d6d76f332cc2b0da6cd9447888e3a3b2e0a5ece4e26" Oct 2 20:42:48.469287 env[1465]: 2023-10-02 20:42:48.449 [INFO][5182] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="9878722848151e028e979d6d76f332cc2b0da6cd9447888e3a3b2e0a5ece4e26" iface="eth0" netns="" Oct 2 20:42:48.469287 env[1465]: 2023-10-02 20:42:48.449 [INFO][5182] k8s.go 583: Releasing IP address(es) ContainerID="9878722848151e028e979d6d76f332cc2b0da6cd9447888e3a3b2e0a5ece4e26" Oct 2 20:42:48.469287 env[1465]: 2023-10-02 20:42:48.449 [INFO][5182] utils.go 196: Calico CNI releasing IP address ContainerID="9878722848151e028e979d6d76f332cc2b0da6cd9447888e3a3b2e0a5ece4e26" Oct 2 20:42:48.469287 env[1465]: 2023-10-02 20:42:48.461 [INFO][5198] ipam_plugin.go 416: Releasing address using handleID ContainerID="9878722848151e028e979d6d76f332cc2b0da6cd9447888e3a3b2e0a5ece4e26" HandleID="k8s-pod-network.9878722848151e028e979d6d76f332cc2b0da6cd9447888e3a3b2e0a5ece4e26" Workload="ci--3510.3.0--a--0ae5c90d19-k8s-coredns--5d78c9869d--srpmn-eth0" Oct 2 20:42:48.469287 env[1465]: time="2023-10-02T20:42:48Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 20:42:48.469287 env[1465]: time="2023-10-02T20:42:48Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 20:42:48.469287 env[1465]: 2023-10-02 20:42:48.466 [WARNING][5198] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="9878722848151e028e979d6d76f332cc2b0da6cd9447888e3a3b2e0a5ece4e26" HandleID="k8s-pod-network.9878722848151e028e979d6d76f332cc2b0da6cd9447888e3a3b2e0a5ece4e26" Workload="ci--3510.3.0--a--0ae5c90d19-k8s-coredns--5d78c9869d--srpmn-eth0" Oct 2 20:42:48.469287 env[1465]: 2023-10-02 20:42:48.466 [INFO][5198] ipam_plugin.go 444: Releasing address using workloadID ContainerID="9878722848151e028e979d6d76f332cc2b0da6cd9447888e3a3b2e0a5ece4e26" HandleID="k8s-pod-network.9878722848151e028e979d6d76f332cc2b0da6cd9447888e3a3b2e0a5ece4e26" Workload="ci--3510.3.0--a--0ae5c90d19-k8s-coredns--5d78c9869d--srpmn-eth0" Oct 2 20:42:48.469287 env[1465]: time="2023-10-02T20:42:48Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 20:42:48.469287 env[1465]: 2023-10-02 20:42:48.468 [INFO][5182] k8s.go 589: Teardown processing complete. ContainerID="9878722848151e028e979d6d76f332cc2b0da6cd9447888e3a3b2e0a5ece4e26" Oct 2 20:42:48.469770 env[1465]: time="2023-10-02T20:42:48.469313712Z" level=info msg="TearDown network for sandbox \"9878722848151e028e979d6d76f332cc2b0da6cd9447888e3a3b2e0a5ece4e26\" successfully" Oct 2 20:42:48.470992 env[1465]: time="2023-10-02T20:42:48.470972299Z" level=info msg="RemovePodSandbox \"9878722848151e028e979d6d76f332cc2b0da6cd9447888e3a3b2e0a5ece4e26\" returns successfully" Oct 2 20:42:48.471376 env[1465]: time="2023-10-02T20:42:48.471357287Z" level=info msg="StopPodSandbox for \"58e4ce0768a9e32892a49ca8bfc51affa0ba35ba180829fb653b1f0bdfcda91b\"" Oct 2 20:42:48.511392 env[1465]: 2023-10-02 20:42:48.494 [WARNING][5227] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="58e4ce0768a9e32892a49ca8bfc51affa0ba35ba180829fb653b1f0bdfcda91b" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--0ae5c90d19-k8s-coredns--5d78c9869d--4vfjd-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"a33dface-dd92-4003-8618-14f32fa71c10", ResourceVersion:"720", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 20, 42, 2, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-0ae5c90d19", ContainerID:"712d3307a2d085bd10f06776fe02835814f2ebdd4aedcd4f1a364007353722e1", Pod:"coredns-5d78c9869d-4vfjd", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.11.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali1ba7f3387c1", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 20:42:48.511392 env[1465]: 2023-10-02 20:42:48.494 [INFO][5227] k8s.go 576: Cleaning up netns ContainerID="58e4ce0768a9e32892a49ca8bfc51affa0ba35ba180829fb653b1f0bdfcda91b" Oct 2 20:42:48.511392 env[1465]: 2023-10-02 20:42:48.494 [INFO][5227] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="58e4ce0768a9e32892a49ca8bfc51affa0ba35ba180829fb653b1f0bdfcda91b" iface="eth0" netns="" Oct 2 20:42:48.511392 env[1465]: 2023-10-02 20:42:48.494 [INFO][5227] k8s.go 583: Releasing IP address(es) ContainerID="58e4ce0768a9e32892a49ca8bfc51affa0ba35ba180829fb653b1f0bdfcda91b" Oct 2 20:42:48.511392 env[1465]: 2023-10-02 20:42:48.494 [INFO][5227] utils.go 196: Calico CNI releasing IP address ContainerID="58e4ce0768a9e32892a49ca8bfc51affa0ba35ba180829fb653b1f0bdfcda91b" Oct 2 20:42:48.511392 env[1465]: 2023-10-02 20:42:48.504 [INFO][5243] ipam_plugin.go 416: Releasing address using handleID ContainerID="58e4ce0768a9e32892a49ca8bfc51affa0ba35ba180829fb653b1f0bdfcda91b" HandleID="k8s-pod-network.58e4ce0768a9e32892a49ca8bfc51affa0ba35ba180829fb653b1f0bdfcda91b" Workload="ci--3510.3.0--a--0ae5c90d19-k8s-coredns--5d78c9869d--4vfjd-eth0" Oct 2 20:42:48.511392 env[1465]: time="2023-10-02T20:42:48Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 20:42:48.511392 env[1465]: time="2023-10-02T20:42:48Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 20:42:48.511392 env[1465]: 2023-10-02 20:42:48.508 [WARNING][5243] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="58e4ce0768a9e32892a49ca8bfc51affa0ba35ba180829fb653b1f0bdfcda91b" HandleID="k8s-pod-network.58e4ce0768a9e32892a49ca8bfc51affa0ba35ba180829fb653b1f0bdfcda91b" Workload="ci--3510.3.0--a--0ae5c90d19-k8s-coredns--5d78c9869d--4vfjd-eth0" Oct 2 20:42:48.511392 env[1465]: 2023-10-02 20:42:48.509 [INFO][5243] ipam_plugin.go 444: Releasing address using workloadID ContainerID="58e4ce0768a9e32892a49ca8bfc51affa0ba35ba180829fb653b1f0bdfcda91b" HandleID="k8s-pod-network.58e4ce0768a9e32892a49ca8bfc51affa0ba35ba180829fb653b1f0bdfcda91b" Workload="ci--3510.3.0--a--0ae5c90d19-k8s-coredns--5d78c9869d--4vfjd-eth0" Oct 2 20:42:48.511392 env[1465]: time="2023-10-02T20:42:48Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 20:42:48.511392 env[1465]: 2023-10-02 20:42:48.510 [INFO][5227] k8s.go 589: Teardown processing complete. ContainerID="58e4ce0768a9e32892a49ca8bfc51affa0ba35ba180829fb653b1f0bdfcda91b" Oct 2 20:42:48.511392 env[1465]: time="2023-10-02T20:42:48.511375165Z" level=info msg="TearDown network for sandbox \"58e4ce0768a9e32892a49ca8bfc51affa0ba35ba180829fb653b1f0bdfcda91b\" successfully" Oct 2 20:42:48.511744 env[1465]: time="2023-10-02T20:42:48.511395840Z" level=info msg="StopPodSandbox for \"58e4ce0768a9e32892a49ca8bfc51affa0ba35ba180829fb653b1f0bdfcda91b\" returns successfully" Oct 2 20:42:48.511744 env[1465]: time="2023-10-02T20:42:48.511661462Z" level=info msg="RemovePodSandbox for \"58e4ce0768a9e32892a49ca8bfc51affa0ba35ba180829fb653b1f0bdfcda91b\"" Oct 2 20:42:48.511744 env[1465]: time="2023-10-02T20:42:48.511681076Z" level=info msg="Forcibly stopping sandbox \"58e4ce0768a9e32892a49ca8bfc51affa0ba35ba180829fb653b1f0bdfcda91b\"" Oct 2 20:42:48.550655 env[1465]: 2023-10-02 20:42:48.531 [WARNING][5269] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="58e4ce0768a9e32892a49ca8bfc51affa0ba35ba180829fb653b1f0bdfcda91b" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--0ae5c90d19-k8s-coredns--5d78c9869d--4vfjd-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"a33dface-dd92-4003-8618-14f32fa71c10", ResourceVersion:"720", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 20, 42, 2, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-0ae5c90d19", ContainerID:"712d3307a2d085bd10f06776fe02835814f2ebdd4aedcd4f1a364007353722e1", Pod:"coredns-5d78c9869d-4vfjd", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.11.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali1ba7f3387c1", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 20:42:48.550655 env[1465]: 2023-10-02 20:42:48.531 [INFO][5269] k8s.go 576: Cleaning up netns ContainerID="58e4ce0768a9e32892a49ca8bfc51affa0ba35ba180829fb653b1f0bdfcda91b" Oct 2 20:42:48.550655 env[1465]: 2023-10-02 20:42:48.531 [INFO][5269] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="58e4ce0768a9e32892a49ca8bfc51affa0ba35ba180829fb653b1f0bdfcda91b" iface="eth0" netns="" Oct 2 20:42:48.550655 env[1465]: 2023-10-02 20:42:48.531 [INFO][5269] k8s.go 583: Releasing IP address(es) ContainerID="58e4ce0768a9e32892a49ca8bfc51affa0ba35ba180829fb653b1f0bdfcda91b" Oct 2 20:42:48.550655 env[1465]: 2023-10-02 20:42:48.531 [INFO][5269] utils.go 196: Calico CNI releasing IP address ContainerID="58e4ce0768a9e32892a49ca8bfc51affa0ba35ba180829fb653b1f0bdfcda91b" Oct 2 20:42:48.550655 env[1465]: 2023-10-02 20:42:48.543 [INFO][5283] ipam_plugin.go 416: Releasing address using handleID ContainerID="58e4ce0768a9e32892a49ca8bfc51affa0ba35ba180829fb653b1f0bdfcda91b" HandleID="k8s-pod-network.58e4ce0768a9e32892a49ca8bfc51affa0ba35ba180829fb653b1f0bdfcda91b" Workload="ci--3510.3.0--a--0ae5c90d19-k8s-coredns--5d78c9869d--4vfjd-eth0" Oct 2 20:42:48.550655 env[1465]: time="2023-10-02T20:42:48Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 20:42:48.550655 env[1465]: time="2023-10-02T20:42:48Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 20:42:48.550655 env[1465]: 2023-10-02 20:42:48.547 [WARNING][5283] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="58e4ce0768a9e32892a49ca8bfc51affa0ba35ba180829fb653b1f0bdfcda91b" HandleID="k8s-pod-network.58e4ce0768a9e32892a49ca8bfc51affa0ba35ba180829fb653b1f0bdfcda91b" Workload="ci--3510.3.0--a--0ae5c90d19-k8s-coredns--5d78c9869d--4vfjd-eth0" Oct 2 20:42:48.550655 env[1465]: 2023-10-02 20:42:48.547 [INFO][5283] ipam_plugin.go 444: Releasing address using workloadID ContainerID="58e4ce0768a9e32892a49ca8bfc51affa0ba35ba180829fb653b1f0bdfcda91b" HandleID="k8s-pod-network.58e4ce0768a9e32892a49ca8bfc51affa0ba35ba180829fb653b1f0bdfcda91b" Workload="ci--3510.3.0--a--0ae5c90d19-k8s-coredns--5d78c9869d--4vfjd-eth0" Oct 2 20:42:48.550655 env[1465]: time="2023-10-02T20:42:48Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 20:42:48.550655 env[1465]: 2023-10-02 20:42:48.549 [INFO][5269] k8s.go 589: Teardown processing complete. ContainerID="58e4ce0768a9e32892a49ca8bfc51affa0ba35ba180829fb653b1f0bdfcda91b" Oct 2 20:42:48.550655 env[1465]: time="2023-10-02T20:42:48.550637805Z" level=info msg="TearDown network for sandbox \"58e4ce0768a9e32892a49ca8bfc51affa0ba35ba180829fb653b1f0bdfcda91b\" successfully" Oct 2 20:42:48.552358 env[1465]: time="2023-10-02T20:42:48.552293781Z" level=info msg="RemovePodSandbox \"58e4ce0768a9e32892a49ca8bfc51affa0ba35ba180829fb653b1f0bdfcda91b\" returns successfully" Oct 2 20:42:48.552689 env[1465]: time="2023-10-02T20:42:48.552637895Z" level=info msg="StopPodSandbox for \"c3ee07f19ba23087509f30712461d2855f8b13ee077da5bca6f87f1812e41e10\"" Oct 2 20:42:48.606813 env[1465]: 2023-10-02 20:42:48.580 [WARNING][5313] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="c3ee07f19ba23087509f30712461d2855f8b13ee077da5bca6f87f1812e41e10" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--0ae5c90d19-k8s-calico--kube--controllers--7bd445fdb4--54jrf-eth0", GenerateName:"calico-kube-controllers-7bd445fdb4-", Namespace:"calico-system", SelfLink:"", UID:"2387d29a-95e7-4eb9-8cfe-b4e8aff25581", ResourceVersion:"767", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 20, 42, 7, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"7bd445fdb4", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-0ae5c90d19", ContainerID:"fb8f89fc0d211bf9fcc248c1a7f3992991b33c535bee8fe56e361e5af158a007", Pod:"calico-kube-controllers-7bd445fdb4-54jrf", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.11.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calic16b3d11f35", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 20:42:48.606813 env[1465]: 2023-10-02 20:42:48.580 [INFO][5313] k8s.go 576: Cleaning up netns ContainerID="c3ee07f19ba23087509f30712461d2855f8b13ee077da5bca6f87f1812e41e10" Oct 2 20:42:48.606813 env[1465]: 2023-10-02 20:42:48.580 [INFO][5313] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="c3ee07f19ba23087509f30712461d2855f8b13ee077da5bca6f87f1812e41e10" iface="eth0" netns="" Oct 2 20:42:48.606813 env[1465]: 2023-10-02 20:42:48.580 [INFO][5313] k8s.go 583: Releasing IP address(es) ContainerID="c3ee07f19ba23087509f30712461d2855f8b13ee077da5bca6f87f1812e41e10" Oct 2 20:42:48.606813 env[1465]: 2023-10-02 20:42:48.580 [INFO][5313] utils.go 196: Calico CNI releasing IP address ContainerID="c3ee07f19ba23087509f30712461d2855f8b13ee077da5bca6f87f1812e41e10" Oct 2 20:42:48.606813 env[1465]: 2023-10-02 20:42:48.596 [INFO][5328] ipam_plugin.go 416: Releasing address using handleID ContainerID="c3ee07f19ba23087509f30712461d2855f8b13ee077da5bca6f87f1812e41e10" HandleID="k8s-pod-network.c3ee07f19ba23087509f30712461d2855f8b13ee077da5bca6f87f1812e41e10" Workload="ci--3510.3.0--a--0ae5c90d19-k8s-calico--kube--controllers--7bd445fdb4--54jrf-eth0" Oct 2 20:42:48.606813 env[1465]: time="2023-10-02T20:42:48Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 20:42:48.606813 env[1465]: time="2023-10-02T20:42:48Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 20:42:48.606813 env[1465]: 2023-10-02 20:42:48.603 [WARNING][5328] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="c3ee07f19ba23087509f30712461d2855f8b13ee077da5bca6f87f1812e41e10" HandleID="k8s-pod-network.c3ee07f19ba23087509f30712461d2855f8b13ee077da5bca6f87f1812e41e10" Workload="ci--3510.3.0--a--0ae5c90d19-k8s-calico--kube--controllers--7bd445fdb4--54jrf-eth0" Oct 2 20:42:48.606813 env[1465]: 2023-10-02 20:42:48.603 [INFO][5328] ipam_plugin.go 444: Releasing address using workloadID ContainerID="c3ee07f19ba23087509f30712461d2855f8b13ee077da5bca6f87f1812e41e10" HandleID="k8s-pod-network.c3ee07f19ba23087509f30712461d2855f8b13ee077da5bca6f87f1812e41e10" Workload="ci--3510.3.0--a--0ae5c90d19-k8s-calico--kube--controllers--7bd445fdb4--54jrf-eth0" Oct 2 20:42:48.606813 env[1465]: time="2023-10-02T20:42:48Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 20:42:48.606813 env[1465]: 2023-10-02 20:42:48.605 [INFO][5313] k8s.go 589: Teardown processing complete. ContainerID="c3ee07f19ba23087509f30712461d2855f8b13ee077da5bca6f87f1812e41e10" Oct 2 20:42:48.607542 env[1465]: time="2023-10-02T20:42:48.606849249Z" level=info msg="TearDown network for sandbox \"c3ee07f19ba23087509f30712461d2855f8b13ee077da5bca6f87f1812e41e10\" successfully" Oct 2 20:42:48.607542 env[1465]: time="2023-10-02T20:42:48.606892627Z" level=info msg="StopPodSandbox for \"c3ee07f19ba23087509f30712461d2855f8b13ee077da5bca6f87f1812e41e10\" returns successfully" Oct 2 20:42:48.607542 env[1465]: time="2023-10-02T20:42:48.607293776Z" level=info msg="RemovePodSandbox for \"c3ee07f19ba23087509f30712461d2855f8b13ee077da5bca6f87f1812e41e10\"" Oct 2 20:42:48.607542 env[1465]: time="2023-10-02T20:42:48.607338191Z" level=info msg="Forcibly stopping sandbox \"c3ee07f19ba23087509f30712461d2855f8b13ee077da5bca6f87f1812e41e10\"" Oct 2 20:42:48.693942 env[1465]: 2023-10-02 20:42:48.659 [WARNING][5356] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="c3ee07f19ba23087509f30712461d2855f8b13ee077da5bca6f87f1812e41e10" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--0ae5c90d19-k8s-calico--kube--controllers--7bd445fdb4--54jrf-eth0", GenerateName:"calico-kube-controllers-7bd445fdb4-", Namespace:"calico-system", SelfLink:"", UID:"2387d29a-95e7-4eb9-8cfe-b4e8aff25581", ResourceVersion:"767", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 20, 42, 7, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"7bd445fdb4", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-0ae5c90d19", ContainerID:"fb8f89fc0d211bf9fcc248c1a7f3992991b33c535bee8fe56e361e5af158a007", Pod:"calico-kube-controllers-7bd445fdb4-54jrf", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.11.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calic16b3d11f35", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 20:42:48.693942 env[1465]: 2023-10-02 20:42:48.659 [INFO][5356] k8s.go 576: Cleaning up netns ContainerID="c3ee07f19ba23087509f30712461d2855f8b13ee077da5bca6f87f1812e41e10" Oct 2 20:42:48.693942 env[1465]: 2023-10-02 20:42:48.659 [INFO][5356] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="c3ee07f19ba23087509f30712461d2855f8b13ee077da5bca6f87f1812e41e10" iface="eth0" netns="" Oct 2 20:42:48.693942 env[1465]: 2023-10-02 20:42:48.659 [INFO][5356] k8s.go 583: Releasing IP address(es) ContainerID="c3ee07f19ba23087509f30712461d2855f8b13ee077da5bca6f87f1812e41e10" Oct 2 20:42:48.693942 env[1465]: 2023-10-02 20:42:48.659 [INFO][5356] utils.go 196: Calico CNI releasing IP address ContainerID="c3ee07f19ba23087509f30712461d2855f8b13ee077da5bca6f87f1812e41e10" Oct 2 20:42:48.693942 env[1465]: 2023-10-02 20:42:48.681 [INFO][5372] ipam_plugin.go 416: Releasing address using handleID ContainerID="c3ee07f19ba23087509f30712461d2855f8b13ee077da5bca6f87f1812e41e10" HandleID="k8s-pod-network.c3ee07f19ba23087509f30712461d2855f8b13ee077da5bca6f87f1812e41e10" Workload="ci--3510.3.0--a--0ae5c90d19-k8s-calico--kube--controllers--7bd445fdb4--54jrf-eth0" Oct 2 20:42:48.693942 env[1465]: time="2023-10-02T20:42:48Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 20:42:48.693942 env[1465]: time="2023-10-02T20:42:48Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 20:42:48.693942 env[1465]: 2023-10-02 20:42:48.689 [WARNING][5372] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="c3ee07f19ba23087509f30712461d2855f8b13ee077da5bca6f87f1812e41e10" HandleID="k8s-pod-network.c3ee07f19ba23087509f30712461d2855f8b13ee077da5bca6f87f1812e41e10" Workload="ci--3510.3.0--a--0ae5c90d19-k8s-calico--kube--controllers--7bd445fdb4--54jrf-eth0" Oct 2 20:42:48.693942 env[1465]: 2023-10-02 20:42:48.689 [INFO][5372] ipam_plugin.go 444: Releasing address using workloadID ContainerID="c3ee07f19ba23087509f30712461d2855f8b13ee077da5bca6f87f1812e41e10" HandleID="k8s-pod-network.c3ee07f19ba23087509f30712461d2855f8b13ee077da5bca6f87f1812e41e10" Workload="ci--3510.3.0--a--0ae5c90d19-k8s-calico--kube--controllers--7bd445fdb4--54jrf-eth0" Oct 2 20:42:48.693942 env[1465]: time="2023-10-02T20:42:48Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 20:42:48.693942 env[1465]: 2023-10-02 20:42:48.692 [INFO][5356] k8s.go 589: Teardown processing complete. ContainerID="c3ee07f19ba23087509f30712461d2855f8b13ee077da5bca6f87f1812e41e10" Oct 2 20:42:48.694972 env[1465]: time="2023-10-02T20:42:48.693972739Z" level=info msg="TearDown network for sandbox \"c3ee07f19ba23087509f30712461d2855f8b13ee077da5bca6f87f1812e41e10\" successfully" Oct 2 20:42:48.696299 env[1465]: time="2023-10-02T20:42:48.696236071Z" level=info msg="RemovePodSandbox \"c3ee07f19ba23087509f30712461d2855f8b13ee077da5bca6f87f1812e41e10\" returns successfully" Oct 2 20:42:48.696794 env[1465]: time="2023-10-02T20:42:48.696731133Z" level=info msg="StopPodSandbox for \"e30e1877a62cbfde374cf219d5c071c2cd32c392aadd6613d048f41c023b4686\"" Oct 2 20:42:48.770303 env[1465]: 2023-10-02 20:42:48.735 [WARNING][5402] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="e30e1877a62cbfde374cf219d5c071c2cd32c392aadd6613d048f41c023b4686" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--0ae5c90d19-k8s-csi--node--driver--bvcrg-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"b998aa5b-fd4c-4592-9f7b-c4ba1d884d60", ResourceVersion:"858", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 20, 42, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"759544bff5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-0ae5c90d19", ContainerID:"1c7bc4319a26a675ea3f6ad2078506009a82d3ed613e8d484d7f6f673796bffd", Pod:"csi-node-driver-bvcrg", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.11.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali37ed14ac24e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 20:42:48.770303 env[1465]: 2023-10-02 20:42:48.736 [INFO][5402] k8s.go 576: Cleaning up netns ContainerID="e30e1877a62cbfde374cf219d5c071c2cd32c392aadd6613d048f41c023b4686" Oct 2 20:42:48.770303 env[1465]: 2023-10-02 20:42:48.736 [INFO][5402] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="e30e1877a62cbfde374cf219d5c071c2cd32c392aadd6613d048f41c023b4686" iface="eth0" netns="" Oct 2 20:42:48.770303 env[1465]: 2023-10-02 20:42:48.736 [INFO][5402] k8s.go 583: Releasing IP address(es) ContainerID="e30e1877a62cbfde374cf219d5c071c2cd32c392aadd6613d048f41c023b4686" Oct 2 20:42:48.770303 env[1465]: 2023-10-02 20:42:48.736 [INFO][5402] utils.go 196: Calico CNI releasing IP address ContainerID="e30e1877a62cbfde374cf219d5c071c2cd32c392aadd6613d048f41c023b4686" Oct 2 20:42:48.770303 env[1465]: 2023-10-02 20:42:48.757 [INFO][5416] ipam_plugin.go 416: Releasing address using handleID ContainerID="e30e1877a62cbfde374cf219d5c071c2cd32c392aadd6613d048f41c023b4686" HandleID="k8s-pod-network.e30e1877a62cbfde374cf219d5c071c2cd32c392aadd6613d048f41c023b4686" Workload="ci--3510.3.0--a--0ae5c90d19-k8s-csi--node--driver--bvcrg-eth0" Oct 2 20:42:48.770303 env[1465]: time="2023-10-02T20:42:48Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 20:42:48.770303 env[1465]: time="2023-10-02T20:42:48Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 20:42:48.770303 env[1465]: 2023-10-02 20:42:48.766 [WARNING][5416] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="e30e1877a62cbfde374cf219d5c071c2cd32c392aadd6613d048f41c023b4686" HandleID="k8s-pod-network.e30e1877a62cbfde374cf219d5c071c2cd32c392aadd6613d048f41c023b4686" Workload="ci--3510.3.0--a--0ae5c90d19-k8s-csi--node--driver--bvcrg-eth0" Oct 2 20:42:48.770303 env[1465]: 2023-10-02 20:42:48.766 [INFO][5416] ipam_plugin.go 444: Releasing address using workloadID ContainerID="e30e1877a62cbfde374cf219d5c071c2cd32c392aadd6613d048f41c023b4686" HandleID="k8s-pod-network.e30e1877a62cbfde374cf219d5c071c2cd32c392aadd6613d048f41c023b4686" Workload="ci--3510.3.0--a--0ae5c90d19-k8s-csi--node--driver--bvcrg-eth0" Oct 2 20:42:48.770303 env[1465]: time="2023-10-02T20:42:48Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 20:42:48.770303 env[1465]: 2023-10-02 20:42:48.769 [INFO][5402] k8s.go 589: Teardown processing complete. ContainerID="e30e1877a62cbfde374cf219d5c071c2cd32c392aadd6613d048f41c023b4686" Oct 2 20:42:48.771009 env[1465]: time="2023-10-02T20:42:48.770363651Z" level=info msg="TearDown network for sandbox \"e30e1877a62cbfde374cf219d5c071c2cd32c392aadd6613d048f41c023b4686\" successfully" Oct 2 20:42:48.771009 env[1465]: time="2023-10-02T20:42:48.770408458Z" level=info msg="StopPodSandbox for \"e30e1877a62cbfde374cf219d5c071c2cd32c392aadd6613d048f41c023b4686\" returns successfully" Oct 2 20:42:48.771009 env[1465]: time="2023-10-02T20:42:48.770878503Z" level=info msg="RemovePodSandbox for \"e30e1877a62cbfde374cf219d5c071c2cd32c392aadd6613d048f41c023b4686\"" Oct 2 20:42:48.771009 env[1465]: time="2023-10-02T20:42:48.770924204Z" level=info msg="Forcibly stopping sandbox \"e30e1877a62cbfde374cf219d5c071c2cd32c392aadd6613d048f41c023b4686\"" Oct 2 20:42:48.846860 env[1465]: 2023-10-02 20:42:48.811 [WARNING][5449] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="e30e1877a62cbfde374cf219d5c071c2cd32c392aadd6613d048f41c023b4686" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--0ae5c90d19-k8s-csi--node--driver--bvcrg-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"b998aa5b-fd4c-4592-9f7b-c4ba1d884d60", ResourceVersion:"858", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 20, 42, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"759544bff5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-0ae5c90d19", ContainerID:"1c7bc4319a26a675ea3f6ad2078506009a82d3ed613e8d484d7f6f673796bffd", Pod:"csi-node-driver-bvcrg", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.11.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali37ed14ac24e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 20:42:48.846860 env[1465]: 2023-10-02 20:42:48.811 [INFO][5449] k8s.go 576: Cleaning up netns ContainerID="e30e1877a62cbfde374cf219d5c071c2cd32c392aadd6613d048f41c023b4686" Oct 2 20:42:48.846860 env[1465]: 2023-10-02 20:42:48.811 [INFO][5449] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="e30e1877a62cbfde374cf219d5c071c2cd32c392aadd6613d048f41c023b4686" iface="eth0" netns="" Oct 2 20:42:48.846860 env[1465]: 2023-10-02 20:42:48.811 [INFO][5449] k8s.go 583: Releasing IP address(es) ContainerID="e30e1877a62cbfde374cf219d5c071c2cd32c392aadd6613d048f41c023b4686" Oct 2 20:42:48.846860 env[1465]: 2023-10-02 20:42:48.811 [INFO][5449] utils.go 196: Calico CNI releasing IP address ContainerID="e30e1877a62cbfde374cf219d5c071c2cd32c392aadd6613d048f41c023b4686" Oct 2 20:42:48.846860 env[1465]: 2023-10-02 20:42:48.833 [INFO][5464] ipam_plugin.go 416: Releasing address using handleID ContainerID="e30e1877a62cbfde374cf219d5c071c2cd32c392aadd6613d048f41c023b4686" HandleID="k8s-pod-network.e30e1877a62cbfde374cf219d5c071c2cd32c392aadd6613d048f41c023b4686" Workload="ci--3510.3.0--a--0ae5c90d19-k8s-csi--node--driver--bvcrg-eth0" Oct 2 20:42:48.846860 env[1465]: time="2023-10-02T20:42:48Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 20:42:48.846860 env[1465]: time="2023-10-02T20:42:48Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 20:42:48.846860 env[1465]: 2023-10-02 20:42:48.842 [WARNING][5464] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="e30e1877a62cbfde374cf219d5c071c2cd32c392aadd6613d048f41c023b4686" HandleID="k8s-pod-network.e30e1877a62cbfde374cf219d5c071c2cd32c392aadd6613d048f41c023b4686" Workload="ci--3510.3.0--a--0ae5c90d19-k8s-csi--node--driver--bvcrg-eth0" Oct 2 20:42:48.846860 env[1465]: 2023-10-02 20:42:48.842 [INFO][5464] ipam_plugin.go 444: Releasing address using workloadID ContainerID="e30e1877a62cbfde374cf219d5c071c2cd32c392aadd6613d048f41c023b4686" HandleID="k8s-pod-network.e30e1877a62cbfde374cf219d5c071c2cd32c392aadd6613d048f41c023b4686" Workload="ci--3510.3.0--a--0ae5c90d19-k8s-csi--node--driver--bvcrg-eth0" Oct 2 20:42:48.846860 env[1465]: time="2023-10-02T20:42:48Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 20:42:48.846860 env[1465]: 2023-10-02 20:42:48.845 [INFO][5449] k8s.go 589: Teardown processing complete. ContainerID="e30e1877a62cbfde374cf219d5c071c2cd32c392aadd6613d048f41c023b4686" Oct 2 20:42:48.847579 env[1465]: time="2023-10-02T20:42:48.846859220Z" level=info msg="TearDown network for sandbox \"e30e1877a62cbfde374cf219d5c071c2cd32c392aadd6613d048f41c023b4686\" successfully" Oct 2 20:42:48.849295 env[1465]: time="2023-10-02T20:42:48.849231000Z" level=info msg="RemovePodSandbox \"e30e1877a62cbfde374cf219d5c071c2cd32c392aadd6613d048f41c023b4686\" returns successfully" Oct 2 20:42:57.398058 env[1465]: time="2023-10-02T20:42:57.397934660Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\"" Oct 2 20:42:57.631067 env[1465]: time="2023-10-02T20:42:57.630898278Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 20:42:57.632255 env[1465]: time="2023-10-02T20:42:57.632117954Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 20:42:57.632688 kubelet[2560]: E1002 20:42:57.632606 2560 remote_image.go:167] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 20:42:57.632688 kubelet[2560]: E1002 20:42:57.632695 2560 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 20:42:57.633623 kubelet[2560]: E1002 20:42:57.632921 2560 kuberuntime_manager.go:1212] container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.25.0,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-twprp,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/version,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:90,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/code/filecheck],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:5,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:5,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*false,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},} start failed in pod calico-apiserver-564cd8db77-77wn4_calico-apiserver(fbc4e6de-1ede-4241-b504-4c2b83dbfccc): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 20:42:57.633623 kubelet[2560]: E1002 20:42:57.633023 2560 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-apiserver/calico-apiserver-564cd8db77-77wn4" podUID=fbc4e6de-1ede-4241-b504-4c2b83dbfccc Oct 2 20:42:58.399185 env[1465]: time="2023-10-02T20:42:58.399035015Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\"" Oct 2 20:42:58.635151 env[1465]: time="2023-10-02T20:42:58.634983123Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 20:42:58.636028 env[1465]: time="2023-10-02T20:42:58.635911840Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 20:42:58.636471 kubelet[2560]: E1002 20:42:58.636383 2560 remote_image.go:167] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 20:42:58.636471 kubelet[2560]: E1002 20:42:58.636479 2560 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 20:42:58.637357 kubelet[2560]: E1002 20:42:58.636705 2560 kuberuntime_manager.go:1212] container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.25.0,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-rxs68,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/version,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:90,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/code/filecheck],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:5,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:5,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*false,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},} start failed in pod calico-apiserver-564cd8db77-6mhvq_calico-apiserver(262322ed-5deb-44a7-b4eb-407b14988ddd): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 20:42:58.637357 kubelet[2560]: E1002 20:42:58.636802 2560 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-apiserver/calico-apiserver-564cd8db77-6mhvq" podUID=262322ed-5deb-44a7-b4eb-407b14988ddd Oct 2 20:42:59.398782 kubelet[2560]: E1002 20:42:59.398713 2560 pod_workers.go:1294] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-bvcrg" podUID=b998aa5b-fd4c-4592-9f7b-c4ba1d884d60 Oct 2 20:43:00.577000 audit[2365]: AVC avc: denied { watch } for pid=2365 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c425,c522 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:43:00.605257 kernel: kauditd_printk_skb: 20 callbacks suppressed Oct 2 20:43:00.605367 kernel: audit: type=1400 audit(1696279380.577:1351): avc: denied { watch } for pid=2365 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c425,c522 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:43:00.694387 kernel: audit: type=1300 audit(1696279380.577:1351): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000480c60 a2=fc6 a3=0 items=0 ppid=2217 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c425,c522 key=(null) Oct 2 20:43:00.577000 audit[2365]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000480c60 a2=fc6 a3=0 items=0 ppid=2217 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c425,c522 key=(null) Oct 2 20:43:00.577000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:43:00.814395 kernel: audit: type=1327 audit(1696279380.577:1351): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:43:00.578000 audit[2365]: AVC avc: denied { watch } for pid=2365 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c425,c522 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:43:00.991209 kernel: audit: type=1400 audit(1696279380.578:1352): avc: denied { watch } for pid=2365 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c425,c522 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:43:00.991269 kernel: audit: type=1300 audit(1696279380.578:1352): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0001955c0 a2=fc6 a3=0 items=0 ppid=2217 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c425,c522 key=(null) Oct 2 20:43:00.578000 audit[2365]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0001955c0 a2=fc6 a3=0 items=0 ppid=2217 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c425,c522 key=(null) Oct 2 20:43:01.109859 kernel: audit: type=1327 audit(1696279380.578:1352): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:43:00.578000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:43:01.203141 kernel: audit: type=1400 audit(1696279380.579:1353): avc: denied { watch } for pid=2365 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c425,c522 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:43:00.579000 audit[2365]: AVC avc: denied { watch } for pid=2365 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c425,c522 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:43:01.293310 kernel: audit: type=1300 audit(1696279380.579:1353): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001d19660 a2=fc6 a3=0 items=0 ppid=2217 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c425,c522 key=(null) Oct 2 20:43:00.579000 audit[2365]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001d19660 a2=fc6 a3=0 items=0 ppid=2217 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c425,c522 key=(null) Oct 2 20:43:01.413765 kernel: audit: type=1327 audit(1696279380.579:1353): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:43:00.579000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:43:01.506852 kernel: audit: type=1400 audit(1696279380.580:1354): avc: denied { watch } for pid=2365 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c425,c522 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:43:00.580000 audit[2365]: AVC avc: denied { watch } for pid=2365 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c425,c522 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:43:00.580000 audit[2365]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001d19680 a2=fc6 a3=0 items=0 ppid=2217 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c425,c522 key=(null) Oct 2 20:43:00.580000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:43:10.398563 kubelet[2560]: E1002 20:43:10.398486 2560 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-564cd8db77-77wn4" podUID=fbc4e6de-1ede-4241-b504-4c2b83dbfccc Oct 2 20:43:11.397619 kubelet[2560]: E1002 20:43:11.397517 2560 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-564cd8db77-6mhvq" podUID=262322ed-5deb-44a7-b4eb-407b14988ddd Oct 2 20:43:13.398834 env[1465]: time="2023-10-02T20:43:13.398675395Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\"" Oct 2 20:43:13.684915 env[1465]: time="2023-10-02T20:43:13.684672712Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 20:43:13.685834 env[1465]: time="2023-10-02T20:43:13.685695900Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 20:43:13.686222 kubelet[2560]: E1002 20:43:13.686150 2560 remote_image.go:167] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 20:43:13.686931 kubelet[2560]: E1002 20:43:13.686244 2560 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 20:43:13.686931 kubelet[2560]: E1002 20:43:13.686484 2560 kuberuntime_manager.go:1212] container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.25.0,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:etccalico,ReadOnly:false,MountPath:/etc/calico,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,},VolumeMount{Name:kube-api-access-vxrfd,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},} start failed in pod csi-node-driver-bvcrg_calico-system(b998aa5b-fd4c-4592-9f7b-c4ba1d884d60): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/csi:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/csi:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 20:43:13.688347 env[1465]: time="2023-10-02T20:43:13.688229641Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\"" Oct 2 20:43:13.935774 env[1465]: time="2023-10-02T20:43:13.935488083Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 20:43:13.936506 env[1465]: time="2023-10-02T20:43:13.936338737Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 20:43:13.936985 kubelet[2560]: E1002 20:43:13.936897 2560 remote_image.go:167] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 20:43:13.936985 kubelet[2560]: E1002 20:43:13.936990 2560 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 20:43:13.937347 kubelet[2560]: E1002 20:43:13.937201 2560 kuberuntime_manager.go:1212] container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-vxrfd,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},} start failed in pod csi-node-driver-bvcrg_calico-system(b998aa5b-fd4c-4592-9f7b-c4ba1d884d60): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 20:43:13.937709 kubelet[2560]: E1002 20:43:13.937389 2560 pod_workers.go:1294] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/csi-node-driver-bvcrg" podUID=b998aa5b-fd4c-4592-9f7b-c4ba1d884d60 Oct 2 20:43:24.399147 env[1465]: time="2023-10-02T20:43:24.399005823Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\"" Oct 2 20:43:24.400462 kubelet[2560]: E1002 20:43:24.399449 2560 pod_workers.go:1294] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-bvcrg" podUID=b998aa5b-fd4c-4592-9f7b-c4ba1d884d60 Oct 2 20:43:24.635779 env[1465]: time="2023-10-02T20:43:24.635615889Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 20:43:24.644052 env[1465]: time="2023-10-02T20:43:24.643900281Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 20:43:24.644463 kubelet[2560]: E1002 20:43:24.644385 2560 remote_image.go:167] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 20:43:24.644700 kubelet[2560]: E1002 20:43:24.644476 2560 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 20:43:24.644882 kubelet[2560]: E1002 20:43:24.644694 2560 kuberuntime_manager.go:1212] container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.25.0,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-twprp,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/version,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:90,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/code/filecheck],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:5,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:5,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*false,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},} start failed in pod calico-apiserver-564cd8db77-77wn4_calico-apiserver(fbc4e6de-1ede-4241-b504-4c2b83dbfccc): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 20:43:24.644882 kubelet[2560]: E1002 20:43:24.644833 2560 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-apiserver/calico-apiserver-564cd8db77-77wn4" podUID=fbc4e6de-1ede-4241-b504-4c2b83dbfccc Oct 2 20:43:26.399062 env[1465]: time="2023-10-02T20:43:26.398914370Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\"" Oct 2 20:43:26.666270 env[1465]: time="2023-10-02T20:43:26.665989012Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 20:43:26.673138 env[1465]: time="2023-10-02T20:43:26.672974107Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 20:43:26.673636 kubelet[2560]: E1002 20:43:26.673548 2560 remote_image.go:167] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 20:43:26.673636 kubelet[2560]: E1002 20:43:26.673637 2560 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 20:43:26.674888 kubelet[2560]: E1002 20:43:26.673913 2560 kuberuntime_manager.go:1212] container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.25.0,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-rxs68,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/version,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:90,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/code/filecheck],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:5,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:5,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*false,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},} start failed in pod calico-apiserver-564cd8db77-6mhvq_calico-apiserver(262322ed-5deb-44a7-b4eb-407b14988ddd): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 20:43:26.674888 kubelet[2560]: E1002 20:43:26.674017 2560 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-apiserver/calico-apiserver-564cd8db77-6mhvq" podUID=262322ed-5deb-44a7-b4eb-407b14988ddd Oct 2 20:43:39.398032 kubelet[2560]: E1002 20:43:39.397931 2560 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-564cd8db77-77wn4" podUID=fbc4e6de-1ede-4241-b504-4c2b83dbfccc Oct 2 20:43:39.399149 kubelet[2560]: E1002 20:43:39.398812 2560 pod_workers.go:1294] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-bvcrg" podUID=b998aa5b-fd4c-4592-9f7b-c4ba1d884d60 Oct 2 20:43:42.397772 kubelet[2560]: E1002 20:43:42.397713 2560 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-564cd8db77-6mhvq" podUID=262322ed-5deb-44a7-b4eb-407b14988ddd Oct 2 20:43:44.768000 audit[2365]: AVC avc: denied { watch } for pid=2365 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c425,c522 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:43:44.796015 kernel: kauditd_printk_skb: 2 callbacks suppressed Oct 2 20:43:44.796128 kernel: audit: type=1400 audit(1696279424.768:1355): avc: denied { watch } for pid=2365 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c425,c522 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:43:44.768000 audit[2365]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001d18a40 a2=fc6 a3=0 items=0 ppid=2217 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c425,c522 key=(null) Oct 2 20:43:45.008732 kernel: audit: type=1300 audit(1696279424.768:1355): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001d18a40 a2=fc6 a3=0 items=0 ppid=2217 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c425,c522 key=(null) Oct 2 20:43:45.008763 kernel: audit: type=1327 audit(1696279424.768:1355): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:43:44.768000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:43:45.101121 kernel: audit: type=1400 audit(1696279424.768:1356): avc: denied { watch } for pid=2365 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521016 scontext=system_u:system_r:svirt_lxc_net_t:s0:c425,c522 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:43:44.768000 audit[2365]: AVC avc: denied { watch } for pid=2365 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521016 scontext=system_u:system_r:svirt_lxc_net_t:s0:c425,c522 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:43:45.191992 kernel: audit: type=1300 audit(1696279424.768:1356): arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c002156f90 a2=fc6 a3=0 items=0 ppid=2217 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c425,c522 key=(null) Oct 2 20:43:44.768000 audit[2365]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c002156f90 a2=fc6 a3=0 items=0 ppid=2217 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c425,c522 key=(null) Oct 2 20:43:45.312455 kernel: audit: type=1327 audit(1696279424.768:1356): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:43:44.768000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:43:45.405625 kernel: audit: type=1400 audit(1696279424.977:1357): avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=521012 scontext=system_u:system_r:svirt_lxc_net_t:s0:c78,c1001 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:43:44.977000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=521012 scontext=system_u:system_r:svirt_lxc_net_t:s0:c78,c1001 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:43:45.496445 kernel: audit: type=1400 audit(1696279424.977:1358): avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521016 scontext=system_u:system_r:svirt_lxc_net_t:s0:c78,c1001 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:43:44.977000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521016 scontext=system_u:system_r:svirt_lxc_net_t:s0:c78,c1001 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:43:45.587665 kernel: audit: type=1300 audit(1696279424.977:1357): arch=c000003e syscall=254 success=no exit=-13 a0=66 a1=c009c3b470 a2=fc6 a3=0 items=0 ppid=2240 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c78,c1001 key=(null) Oct 2 20:43:44.977000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=66 a1=c009c3b470 a2=fc6 a3=0 items=0 ppid=2240 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c78,c1001 key=(null) Oct 2 20:43:45.685934 kernel: audit: type=1300 audit(1696279424.977:1358): arch=c000003e syscall=254 success=no exit=-13 a0=68 a1=c009da0360 a2=fc6 a3=0 items=0 ppid=2240 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c78,c1001 key=(null) Oct 2 20:43:44.977000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=68 a1=c009da0360 a2=fc6 a3=0 items=0 ppid=2240 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c78,c1001 key=(null) Oct 2 20:43:44.977000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313331002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Oct 2 20:43:44.977000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313331002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Oct 2 20:43:44.977000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c78,c1001 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:43:44.977000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=66 a1=c0083ee200 a2=fc6 a3=0 items=0 ppid=2240 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c78,c1001 key=(null) Oct 2 20:43:44.977000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313331002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Oct 2 20:43:44.986000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521016 scontext=system_u:system_r:svirt_lxc_net_t:s0:c78,c1001 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:43:44.986000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=66 a1=c009c3b4a0 a2=fc6 a3=0 items=0 ppid=2240 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c78,c1001 key=(null) Oct 2 20:43:44.986000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313331002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Oct 2 20:43:44.986000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c78,c1001 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:43:44.986000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=66 a1=c00ae6ec20 a2=fc6 a3=0 items=0 ppid=2240 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c78,c1001 key=(null) Oct 2 20:43:44.986000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313331002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Oct 2 20:43:44.987000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=521018 scontext=system_u:system_r:svirt_lxc_net_t:s0:c78,c1001 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:43:44.987000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=66 a1=c0093fdb00 a2=fc6 a3=0 items=0 ppid=2240 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c78,c1001 key=(null) Oct 2 20:43:44.987000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313331002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Oct 2 20:43:52.398619 kubelet[2560]: E1002 20:43:52.398516 2560 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-564cd8db77-77wn4" podUID=fbc4e6de-1ede-4241-b504-4c2b83dbfccc Oct 2 20:43:53.398417 kubelet[2560]: E1002 20:43:53.398361 2560 pod_workers.go:1294] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-bvcrg" podUID=b998aa5b-fd4c-4592-9f7b-c4ba1d884d60 Oct 2 20:43:56.397879 kubelet[2560]: E1002 20:43:56.397782 2560 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-564cd8db77-6mhvq" podUID=262322ed-5deb-44a7-b4eb-407b14988ddd Oct 2 20:44:00.579000 audit[2365]: AVC avc: denied { watch } for pid=2365 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c425,c522 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:44:00.625229 kernel: kauditd_printk_skb: 14 callbacks suppressed Oct 2 20:44:00.625325 kernel: audit: type=1400 audit(1696279440.579:1363): avc: denied { watch } for pid=2365 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c425,c522 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:44:00.579000 audit[2365]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0020bfb00 a2=fc6 a3=0 items=0 ppid=2217 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c425,c522 key=(null) Oct 2 20:44:00.838967 kernel: audit: type=1300 audit(1696279440.579:1363): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0020bfb00 a2=fc6 a3=0 items=0 ppid=2217 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c425,c522 key=(null) Oct 2 20:44:00.839005 kernel: audit: type=1327 audit(1696279440.579:1363): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:44:00.579000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:44:00.580000 audit[2365]: AVC avc: denied { watch } for pid=2365 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c425,c522 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:44:01.022389 kernel: audit: type=1400 audit(1696279440.580:1364): avc: denied { watch } for pid=2365 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c425,c522 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:44:01.022443 kernel: audit: type=1300 audit(1696279440.580:1364): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0015f74a0 a2=fc6 a3=0 items=0 ppid=2217 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c425,c522 key=(null) Oct 2 20:44:00.580000 audit[2365]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0015f74a0 a2=fc6 a3=0 items=0 ppid=2217 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c425,c522 key=(null) Oct 2 20:44:01.143885 kernel: audit: type=1327 audit(1696279440.580:1364): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:44:00.580000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:44:01.237895 kernel: audit: type=1400 audit(1696279440.582:1365): avc: denied { watch } for pid=2365 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c425,c522 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:44:00.582000 audit[2365]: AVC avc: denied { watch } for pid=2365 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c425,c522 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:44:01.328748 kernel: audit: type=1300 audit(1696279440.582:1365): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001d19e00 a2=fc6 a3=0 items=0 ppid=2217 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c425,c522 key=(null) Oct 2 20:44:00.582000 audit[2365]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001d19e00 a2=fc6 a3=0 items=0 ppid=2217 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c425,c522 key=(null) Oct 2 20:44:01.450309 kernel: audit: type=1400 audit(1696279440.582:1366): avc: denied { watch } for pid=2365 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c425,c522 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:44:00.582000 audit[2365]: AVC avc: denied { watch } for pid=2365 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c425,c522 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:44:00.582000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:44:01.635526 kernel: audit: type=1327 audit(1696279440.582:1365): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:44:00.582000 audit[2365]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0015f74c0 a2=fc6 a3=0 items=0 ppid=2217 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c425,c522 key=(null) Oct 2 20:44:00.582000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:44:04.398559 env[1465]: time="2023-10-02T20:44:04.398426508Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\"" Oct 2 20:44:04.644132 env[1465]: time="2023-10-02T20:44:04.643965006Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 20:44:04.645225 env[1465]: time="2023-10-02T20:44:04.645091329Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 20:44:04.645677 kubelet[2560]: E1002 20:44:04.645563 2560 remote_image.go:167] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 20:44:04.645677 kubelet[2560]: E1002 20:44:04.645664 2560 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 20:44:04.646621 kubelet[2560]: E1002 20:44:04.645906 2560 kuberuntime_manager.go:1212] container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.25.0,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:etccalico,ReadOnly:false,MountPath:/etc/calico,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,},VolumeMount{Name:kube-api-access-vxrfd,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},} start failed in pod csi-node-driver-bvcrg_calico-system(b998aa5b-fd4c-4592-9f7b-c4ba1d884d60): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/csi:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/csi:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 20:44:04.647735 env[1465]: time="2023-10-02T20:44:04.647637011Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\"" Oct 2 20:44:04.894915 env[1465]: time="2023-10-02T20:44:04.894653780Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 20:44:04.895905 env[1465]: time="2023-10-02T20:44:04.895771431Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 20:44:04.896492 kubelet[2560]: E1002 20:44:04.896387 2560 remote_image.go:167] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 20:44:04.896492 kubelet[2560]: E1002 20:44:04.896493 2560 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 20:44:04.896854 kubelet[2560]: E1002 20:44:04.896687 2560 kuberuntime_manager.go:1212] container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-vxrfd,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},} start failed in pod csi-node-driver-bvcrg_calico-system(b998aa5b-fd4c-4592-9f7b-c4ba1d884d60): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 20:44:04.896854 kubelet[2560]: E1002 20:44:04.896843 2560 pod_workers.go:1294] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/csi-node-driver-bvcrg" podUID=b998aa5b-fd4c-4592-9f7b-c4ba1d884d60 Oct 2 20:44:06.398768 env[1465]: time="2023-10-02T20:44:06.398688599Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\"" Oct 2 20:44:06.661070 env[1465]: time="2023-10-02T20:44:06.660763887Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 20:44:06.661912 env[1465]: time="2023-10-02T20:44:06.661778684Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 20:44:06.662338 kubelet[2560]: E1002 20:44:06.662267 2560 remote_image.go:167] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 20:44:06.663075 kubelet[2560]: E1002 20:44:06.662381 2560 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 20:44:06.663075 kubelet[2560]: E1002 20:44:06.662595 2560 kuberuntime_manager.go:1212] container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.25.0,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-twprp,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/version,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:90,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/code/filecheck],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:5,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:5,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*false,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},} start failed in pod calico-apiserver-564cd8db77-77wn4_calico-apiserver(fbc4e6de-1ede-4241-b504-4c2b83dbfccc): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 20:44:06.663075 kubelet[2560]: E1002 20:44:06.662699 2560 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-apiserver/calico-apiserver-564cd8db77-77wn4" podUID=fbc4e6de-1ede-4241-b504-4c2b83dbfccc Oct 2 20:44:11.399206 env[1465]: time="2023-10-02T20:44:11.399095947Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\"" Oct 2 20:44:11.676470 env[1465]: time="2023-10-02T20:44:11.676182204Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 20:44:11.677451 env[1465]: time="2023-10-02T20:44:11.677300382Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 20:44:11.677880 kubelet[2560]: E1002 20:44:11.677831 2560 remote_image.go:167] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 20:44:11.678709 kubelet[2560]: E1002 20:44:11.677925 2560 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 20:44:11.678709 kubelet[2560]: E1002 20:44:11.678149 2560 kuberuntime_manager.go:1212] container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.25.0,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-rxs68,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/version,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:90,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/code/filecheck],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:5,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:5,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*false,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},} start failed in pod calico-apiserver-564cd8db77-6mhvq_calico-apiserver(262322ed-5deb-44a7-b4eb-407b14988ddd): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 20:44:11.678709 kubelet[2560]: E1002 20:44:11.678243 2560 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-apiserver/calico-apiserver-564cd8db77-6mhvq" podUID=262322ed-5deb-44a7-b4eb-407b14988ddd Oct 2 20:44:17.397503 kubelet[2560]: E1002 20:44:17.397353 2560 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-564cd8db77-77wn4" podUID=fbc4e6de-1ede-4241-b504-4c2b83dbfccc Oct 2 20:44:18.401422 kubelet[2560]: E1002 20:44:18.401391 2560 pod_workers.go:1294] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-bvcrg" podUID=b998aa5b-fd4c-4592-9f7b-c4ba1d884d60 Oct 2 20:44:21.975760 update_engine[1457]: I1002 20:44:21.975618 1457 prefs.cc:51] certificate-report-to-send-update not present in /var/lib/update_engine/prefs Oct 2 20:44:21.975760 update_engine[1457]: I1002 20:44:21.975713 1457 prefs.cc:51] certificate-report-to-send-download not present in /var/lib/update_engine/prefs Oct 2 20:44:21.976712 update_engine[1457]: I1002 20:44:21.976496 1457 prefs.cc:51] aleph-version not present in /var/lib/update_engine/prefs Oct 2 20:44:21.977457 update_engine[1457]: I1002 20:44:21.977378 1457 omaha_request_params.cc:62] Current group set to lts Oct 2 20:44:21.977694 update_engine[1457]: I1002 20:44:21.977664 1457 update_attempter.cc:495] Already updated boot flags. Skipping. Oct 2 20:44:21.977694 update_engine[1457]: I1002 20:44:21.977684 1457 update_attempter.cc:638] Scheduling an action processor start. Oct 2 20:44:21.977915 update_engine[1457]: I1002 20:44:21.977716 1457 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction Oct 2 20:44:21.977915 update_engine[1457]: I1002 20:44:21.977784 1457 prefs.cc:51] previous-version not present in /var/lib/update_engine/prefs Oct 2 20:44:21.978121 update_engine[1457]: I1002 20:44:21.977919 1457 omaha_request_action.cc:268] Posting an Omaha request to https://public.update.flatcar-linux.net/v1/update/ Oct 2 20:44:21.978121 update_engine[1457]: I1002 20:44:21.977936 1457 omaha_request_action.cc:269] Request: Oct 2 20:44:21.978121 update_engine[1457]: Oct 2 20:44:21.978121 update_engine[1457]: Oct 2 20:44:21.978121 update_engine[1457]: Oct 2 20:44:21.978121 update_engine[1457]: Oct 2 20:44:21.978121 update_engine[1457]: Oct 2 20:44:21.978121 update_engine[1457]: Oct 2 20:44:21.978121 update_engine[1457]: Oct 2 20:44:21.978121 update_engine[1457]: Oct 2 20:44:21.978121 update_engine[1457]: I1002 20:44:21.977946 1457 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Oct 2 20:44:21.979200 locksmithd[1499]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_CHECKING_FOR_UPDATE" NewVersion=0.0.0 NewSize=0 Oct 2 20:44:21.981038 update_engine[1457]: I1002 20:44:21.980963 1457 libcurl_http_fetcher.cc:174] Setting up curl options for HTTPS Oct 2 20:44:21.981532 update_engine[1457]: I1002 20:44:21.981443 1457 libcurl_http_fetcher.cc:449] Setting up timeout source: 1 seconds. Oct 2 20:44:23.086287 update_engine[1457]: I1002 20:44:23.086172 1457 prefs.cc:51] update-server-cert-0-2 not present in /var/lib/update_engine/prefs Oct 2 20:44:23.087210 update_engine[1457]: I1002 20:44:23.086704 1457 prefs.cc:51] update-server-cert-0-1 not present in /var/lib/update_engine/prefs Oct 2 20:44:23.087210 update_engine[1457]: I1002 20:44:23.087106 1457 prefs.cc:51] update-server-cert-0-0 not present in /var/lib/update_engine/prefs Oct 2 20:44:23.445269 update_engine[1457]: I1002 20:44:23.445156 1457 libcurl_http_fetcher.cc:263] HTTP response code: 200 Oct 2 20:44:23.448639 update_engine[1457]: I1002 20:44:23.448561 1457 libcurl_http_fetcher.cc:320] Transfer completed (200), 314 bytes downloaded Oct 2 20:44:23.448639 update_engine[1457]: I1002 20:44:23.448591 1457 omaha_request_action.cc:619] Omaha request response: Oct 2 20:44:23.448639 update_engine[1457]: Oct 2 20:44:23.462650 update_engine[1457]: I1002 20:44:23.462566 1457 omaha_request_action.cc:409] No update. Oct 2 20:44:23.462650 update_engine[1457]: I1002 20:44:23.462615 1457 action_processor.cc:82] ActionProcessor::ActionComplete: finished OmahaRequestAction, starting OmahaResponseHandlerAction Oct 2 20:44:23.462650 update_engine[1457]: I1002 20:44:23.462627 1457 omaha_response_handler_action.cc:36] There are no updates. Aborting. Oct 2 20:44:23.462650 update_engine[1457]: I1002 20:44:23.462637 1457 action_processor.cc:68] ActionProcessor::ActionComplete: OmahaResponseHandlerAction action failed. Aborting processing. Oct 2 20:44:23.462650 update_engine[1457]: I1002 20:44:23.462646 1457 action_processor.cc:73] ActionProcessor::ActionComplete: finished last action of type OmahaResponseHandlerAction Oct 2 20:44:23.462650 update_engine[1457]: I1002 20:44:23.462653 1457 update_attempter.cc:302] Processing Done. Oct 2 20:44:23.463366 update_engine[1457]: I1002 20:44:23.462680 1457 update_attempter.cc:338] No update. Oct 2 20:44:23.463366 update_engine[1457]: I1002 20:44:23.462702 1457 update_check_scheduler.cc:74] Next update check in 49m2s Oct 2 20:44:23.463594 locksmithd[1499]: LastCheckedTime=1696279463 Progress=0 CurrentOperation="UPDATE_STATUS_IDLE" NewVersion=0.0.0 NewSize=0 Oct 2 20:44:25.398244 kubelet[2560]: E1002 20:44:25.398138 2560 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-564cd8db77-6mhvq" podUID=262322ed-5deb-44a7-b4eb-407b14988ddd Oct 2 20:44:30.399170 kubelet[2560]: E1002 20:44:30.399075 2560 pod_workers.go:1294] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-bvcrg" podUID=b998aa5b-fd4c-4592-9f7b-c4ba1d884d60 Oct 2 20:44:32.397713 kubelet[2560]: E1002 20:44:32.397647 2560 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-564cd8db77-77wn4" podUID=fbc4e6de-1ede-4241-b504-4c2b83dbfccc Oct 2 20:44:39.398086 kubelet[2560]: E1002 20:44:39.398016 2560 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-564cd8db77-6mhvq" podUID=262322ed-5deb-44a7-b4eb-407b14988ddd Oct 2 20:44:41.398869 kubelet[2560]: E1002 20:44:41.398800 2560 pod_workers.go:1294] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-bvcrg" podUID=b998aa5b-fd4c-4592-9f7b-c4ba1d884d60 Oct 2 20:44:44.768000 audit[2365]: AVC avc: denied { watch } for pid=2365 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c425,c522 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:44:44.796971 kernel: kauditd_printk_skb: 2 callbacks suppressed Oct 2 20:44:44.797032 kernel: audit: type=1400 audit(1696279484.768:1367): avc: denied { watch } for pid=2365 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c425,c522 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:44:44.768000 audit[2365]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0023ee4c0 a2=fc6 a3=0 items=0 ppid=2217 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c425,c522 key=(null) Oct 2 20:44:45.012255 kernel: audit: type=1300 audit(1696279484.768:1367): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0023ee4c0 a2=fc6 a3=0 items=0 ppid=2217 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c425,c522 key=(null) Oct 2 20:44:45.012321 kernel: audit: type=1327 audit(1696279484.768:1367): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:44:44.768000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:44:45.107183 kernel: audit: type=1400 audit(1696279484.768:1368): avc: denied { watch } for pid=2365 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521016 scontext=system_u:system_r:svirt_lxc_net_t:s0:c425,c522 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:44:44.768000 audit[2365]: AVC avc: denied { watch } for pid=2365 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521016 scontext=system_u:system_r:svirt_lxc_net_t:s0:c425,c522 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:44:45.199894 kernel: audit: type=1300 audit(1696279484.768:1368): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002e03050 a2=fc6 a3=0 items=0 ppid=2217 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c425,c522 key=(null) Oct 2 20:44:44.768000 audit[2365]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002e03050 a2=fc6 a3=0 items=0 ppid=2217 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c425,c522 key=(null) Oct 2 20:44:45.322666 kernel: audit: type=1327 audit(1696279484.768:1368): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:44:44.768000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:44:45.417845 kernel: audit: type=1400 audit(1696279484.978:1369): avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521016 scontext=system_u:system_r:svirt_lxc_net_t:s0:c78,c1001 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:44:44.978000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521016 scontext=system_u:system_r:svirt_lxc_net_t:s0:c78,c1001 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:44:45.509075 kernel: audit: type=1300 audit(1696279484.978:1369): arch=c000003e syscall=254 success=no exit=-13 a0=5d a1=c008ccde60 a2=fc6 a3=0 items=0 ppid=2240 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c78,c1001 key=(null) Oct 2 20:44:44.978000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5d a1=c008ccde60 a2=fc6 a3=0 items=0 ppid=2240 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c78,c1001 key=(null) Oct 2 20:44:45.607585 kernel: audit: type=1327 audit(1696279484.978:1369): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313331002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Oct 2 20:44:44.978000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313331002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Oct 2 20:44:45.700775 kernel: audit: type=1400 audit(1696279484.978:1370): avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=521012 scontext=system_u:system_r:svirt_lxc_net_t:s0:c78,c1001 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:44:44.978000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=521012 scontext=system_u:system_r:svirt_lxc_net_t:s0:c78,c1001 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:44:44.978000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5d a1=c008ccdec0 a2=fc6 a3=0 items=0 ppid=2240 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c78,c1001 key=(null) Oct 2 20:44:44.978000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313331002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Oct 2 20:44:44.978000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c78,c1001 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:44:44.978000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5d a1=c01375af20 a2=fc6 a3=0 items=0 ppid=2240 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c78,c1001 key=(null) Oct 2 20:44:44.978000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313331002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Oct 2 20:44:44.987000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c78,c1001 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:44:44.987000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5d a1=c007069a00 a2=fc6 a3=0 items=0 ppid=2240 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c78,c1001 key=(null) Oct 2 20:44:44.987000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313331002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Oct 2 20:44:44.987000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521016 scontext=system_u:system_r:svirt_lxc_net_t:s0:c78,c1001 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:44:44.987000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5d a1=c00eeea2d0 a2=fc6 a3=0 items=0 ppid=2240 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c78,c1001 key=(null) Oct 2 20:44:44.987000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313331002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Oct 2 20:44:44.988000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=521018 scontext=system_u:system_r:svirt_lxc_net_t:s0:c78,c1001 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:44:44.988000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5d a1=c00eeea330 a2=fc6 a3=0 items=0 ppid=2240 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c78,c1001 key=(null) Oct 2 20:44:44.988000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313331002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Oct 2 20:44:46.401562 kubelet[2560]: E1002 20:44:46.401488 2560 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-564cd8db77-77wn4" podUID=fbc4e6de-1ede-4241-b504-4c2b83dbfccc Oct 2 20:44:52.399519 kubelet[2560]: E1002 20:44:52.399410 2560 pod_workers.go:1294] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-bvcrg" podUID=b998aa5b-fd4c-4592-9f7b-c4ba1d884d60 Oct 2 20:44:54.397943 kubelet[2560]: E1002 20:44:54.397872 2560 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-564cd8db77-6mhvq" podUID=262322ed-5deb-44a7-b4eb-407b14988ddd Oct 2 20:44:57.397616 kubelet[2560]: E1002 20:44:57.397522 2560 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-564cd8db77-77wn4" podUID=fbc4e6de-1ede-4241-b504-4c2b83dbfccc Oct 2 20:45:00.579000 audit[2365]: AVC avc: denied { watch } for pid=2365 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c425,c522 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:45:00.622576 kernel: kauditd_printk_skb: 14 callbacks suppressed Oct 2 20:45:00.622660 kernel: audit: type=1400 audit(1696279500.579:1375): avc: denied { watch } for pid=2365 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c425,c522 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:45:00.579000 audit[2365]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000ca8c20 a2=fc6 a3=0 items=0 ppid=2217 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c425,c522 key=(null) Oct 2 20:45:00.834712 kernel: audit: type=1300 audit(1696279500.579:1375): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000ca8c20 a2=fc6 a3=0 items=0 ppid=2217 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c425,c522 key=(null) Oct 2 20:45:00.834767 kernel: audit: type=1327 audit(1696279500.579:1375): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:45:00.579000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:45:00.580000 audit[2365]: AVC avc: denied { watch } for pid=2365 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c425,c522 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:45:01.016343 kernel: audit: type=1400 audit(1696279500.580:1376): avc: denied { watch } for pid=2365 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c425,c522 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:45:01.016373 kernel: audit: type=1300 audit(1696279500.580:1376): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000ca8c40 a2=fc6 a3=0 items=0 ppid=2217 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c425,c522 key=(null) Oct 2 20:45:00.580000 audit[2365]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000ca8c40 a2=fc6 a3=0 items=0 ppid=2217 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c425,c522 key=(null) Oct 2 20:45:00.580000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:45:01.229686 kernel: audit: type=1327 audit(1696279500.580:1376): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:45:01.229718 kernel: audit: type=1400 audit(1696279500.581:1377): avc: denied { watch } for pid=2365 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c425,c522 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:45:00.581000 audit[2365]: AVC avc: denied { watch } for pid=2365 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c425,c522 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:45:01.319620 kernel: audit: type=1300 audit(1696279500.581:1377): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0023eec40 a2=fc6 a3=0 items=0 ppid=2217 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c425,c522 key=(null) Oct 2 20:45:00.581000 audit[2365]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0023eec40 a2=fc6 a3=0 items=0 ppid=2217 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c425,c522 key=(null) Oct 2 20:45:00.581000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:45:01.533037 kernel: audit: type=1327 audit(1696279500.581:1377): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:45:01.533071 kernel: audit: type=1400 audit(1696279500.582:1378): avc: denied { watch } for pid=2365 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c425,c522 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:45:00.582000 audit[2365]: AVC avc: denied { watch } for pid=2365 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c425,c522 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:45:00.582000 audit[2365]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00131b340 a2=fc6 a3=0 items=0 ppid=2217 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c425,c522 key=(null) Oct 2 20:45:00.582000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:45:04.398946 kubelet[2560]: E1002 20:45:04.398874 2560 pod_workers.go:1294] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-bvcrg" podUID=b998aa5b-fd4c-4592-9f7b-c4ba1d884d60 Oct 2 20:45:07.398216 kubelet[2560]: E1002 20:45:07.398142 2560 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-564cd8db77-6mhvq" podUID=262322ed-5deb-44a7-b4eb-407b14988ddd Oct 2 20:45:10.397499 kubelet[2560]: E1002 20:45:10.397433 2560 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-564cd8db77-77wn4" podUID=fbc4e6de-1ede-4241-b504-4c2b83dbfccc Oct 2 20:45:19.399211 kubelet[2560]: E1002 20:45:19.399094 2560 pod_workers.go:1294] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-bvcrg" podUID=b998aa5b-fd4c-4592-9f7b-c4ba1d884d60 Oct 2 20:45:20.398023 kubelet[2560]: E1002 20:45:20.397958 2560 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-564cd8db77-6mhvq" podUID=262322ed-5deb-44a7-b4eb-407b14988ddd Oct 2 20:45:23.398081 kubelet[2560]: E1002 20:45:23.397978 2560 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-564cd8db77-77wn4" podUID=fbc4e6de-1ede-4241-b504-4c2b83dbfccc Oct 2 20:45:34.398121 env[1465]: time="2023-10-02T20:45:34.397965860Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\"" Oct 2 20:45:34.668367 env[1465]: time="2023-10-02T20:45:34.668021394Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 20:45:34.669216 env[1465]: time="2023-10-02T20:45:34.669069816Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 20:45:34.669665 kubelet[2560]: E1002 20:45:34.669619 2560 remote_image.go:167] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 20:45:34.670526 kubelet[2560]: E1002 20:45:34.669710 2560 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 20:45:34.670526 kubelet[2560]: E1002 20:45:34.670132 2560 kuberuntime_manager.go:1212] container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.25.0,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-rxs68,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/version,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:90,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/code/filecheck],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:5,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:5,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*false,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},} start failed in pod calico-apiserver-564cd8db77-6mhvq_calico-apiserver(262322ed-5deb-44a7-b4eb-407b14988ddd): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 20:45:34.670526 kubelet[2560]: E1002 20:45:34.670287 2560 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-apiserver/calico-apiserver-564cd8db77-6mhvq" podUID=262322ed-5deb-44a7-b4eb-407b14988ddd Oct 2 20:45:34.671203 env[1465]: time="2023-10-02T20:45:34.670502989Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\"" Oct 2 20:45:34.918031 env[1465]: time="2023-10-02T20:45:34.917857252Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 20:45:34.919357 env[1465]: time="2023-10-02T20:45:34.919071038Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 20:45:34.919656 kubelet[2560]: E1002 20:45:34.919600 2560 remote_image.go:167] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 20:45:34.919844 kubelet[2560]: E1002 20:45:34.919686 2560 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 20:45:34.920009 kubelet[2560]: E1002 20:45:34.919982 2560 kuberuntime_manager.go:1212] container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.25.0,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:etccalico,ReadOnly:false,MountPath:/etc/calico,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,},VolumeMount{Name:kube-api-access-vxrfd,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},} start failed in pod csi-node-driver-bvcrg_calico-system(b998aa5b-fd4c-4592-9f7b-c4ba1d884d60): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/csi:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/csi:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 20:45:34.921888 env[1465]: time="2023-10-02T20:45:34.921813265Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\"" Oct 2 20:45:35.166793 env[1465]: time="2023-10-02T20:45:35.166676489Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 20:45:35.171569 env[1465]: time="2023-10-02T20:45:35.171330322Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 20:45:35.171899 kubelet[2560]: E1002 20:45:35.171812 2560 remote_image.go:167] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 20:45:35.171899 kubelet[2560]: E1002 20:45:35.171901 2560 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 20:45:35.172287 kubelet[2560]: E1002 20:45:35.172107 2560 kuberuntime_manager.go:1212] container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-vxrfd,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},} start failed in pod csi-node-driver-bvcrg_calico-system(b998aa5b-fd4c-4592-9f7b-c4ba1d884d60): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 20:45:35.172673 kubelet[2560]: E1002 20:45:35.172292 2560 pod_workers.go:1294] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/csi-node-driver-bvcrg" podUID=b998aa5b-fd4c-4592-9f7b-c4ba1d884d60 Oct 2 20:45:35.398404 env[1465]: time="2023-10-02T20:45:35.398274805Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\"" Oct 2 20:45:35.669772 env[1465]: time="2023-10-02T20:45:35.669619345Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 20:45:35.670748 env[1465]: time="2023-10-02T20:45:35.670647429Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 20:45:35.671237 kubelet[2560]: E1002 20:45:35.671157 2560 remote_image.go:167] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 20:45:35.671967 kubelet[2560]: E1002 20:45:35.671257 2560 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 20:45:35.671967 kubelet[2560]: E1002 20:45:35.671547 2560 kuberuntime_manager.go:1212] container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.25.0,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-twprp,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/version,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:90,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/code/filecheck],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:5,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:5,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*false,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},} start failed in pod calico-apiserver-564cd8db77-77wn4_calico-apiserver(fbc4e6de-1ede-4241-b504-4c2b83dbfccc): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 20:45:35.671967 kubelet[2560]: E1002 20:45:35.671662 2560 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-apiserver/calico-apiserver-564cd8db77-77wn4" podUID=fbc4e6de-1ede-4241-b504-4c2b83dbfccc Oct 2 20:45:44.768000 audit[2365]: AVC avc: denied { watch } for pid=2365 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c425,c522 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:45:44.797188 kernel: kauditd_printk_skb: 2 callbacks suppressed Oct 2 20:45:44.797229 kernel: audit: type=1400 audit(1696279544.768:1379): avc: denied { watch } for pid=2365 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c425,c522 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:45:44.768000 audit[2365]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0023eec80 a2=fc6 a3=0 items=0 ppid=2217 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c425,c522 key=(null) Oct 2 20:45:45.008397 kernel: audit: type=1300 audit(1696279544.768:1379): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0023eec80 a2=fc6 a3=0 items=0 ppid=2217 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c425,c522 key=(null) Oct 2 20:45:45.008433 kernel: audit: type=1327 audit(1696279544.768:1379): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:45:44.768000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:45:44.768000 audit[2365]: AVC avc: denied { watch } for pid=2365 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521016 scontext=system_u:system_r:svirt_lxc_net_t:s0:c425,c522 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:45:45.192181 kernel: audit: type=1400 audit(1696279544.768:1380): avc: denied { watch } for pid=2365 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521016 scontext=system_u:system_r:svirt_lxc_net_t:s0:c425,c522 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:45:45.192208 kernel: audit: type=1300 audit(1696279544.768:1380): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00230e000 a2=fc6 a3=0 items=0 ppid=2217 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c425,c522 key=(null) Oct 2 20:45:44.768000 audit[2365]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00230e000 a2=fc6 a3=0 items=0 ppid=2217 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c425,c522 key=(null) Oct 2 20:45:45.314017 kernel: audit: type=1327 audit(1696279544.768:1380): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:45:44.768000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:45:45.407167 kernel: audit: type=1400 audit(1696279544.979:1381): avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521016 scontext=system_u:system_r:svirt_lxc_net_t:s0:c78,c1001 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:45:44.979000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521016 scontext=system_u:system_r:svirt_lxc_net_t:s0:c78,c1001 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:45:45.498271 kernel: audit: type=1300 audit(1696279544.979:1381): arch=c000003e syscall=254 success=no exit=-13 a0=5d a1=c0081f4870 a2=fc6 a3=0 items=0 ppid=2240 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c78,c1001 key=(null) Oct 2 20:45:44.979000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5d a1=c0081f4870 a2=fc6 a3=0 items=0 ppid=2240 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c78,c1001 key=(null) Oct 2 20:45:45.597037 kernel: audit: type=1327 audit(1696279544.979:1381): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313331002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Oct 2 20:45:44.979000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313331002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Oct 2 20:45:45.690174 kernel: audit: type=1400 audit(1696279544.979:1382): avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=521012 scontext=system_u:system_r:svirt_lxc_net_t:s0:c78,c1001 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:45:44.979000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=521012 scontext=system_u:system_r:svirt_lxc_net_t:s0:c78,c1001 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:45:44.979000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5e a1=c001023ad0 a2=fc6 a3=0 items=0 ppid=2240 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c78,c1001 key=(null) Oct 2 20:45:44.979000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313331002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Oct 2 20:45:44.979000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c78,c1001 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:45:44.979000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5e a1=c0121f4380 a2=fc6 a3=0 items=0 ppid=2240 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c78,c1001 key=(null) Oct 2 20:45:44.979000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313331002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Oct 2 20:45:44.988000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c78,c1001 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:45:44.988000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5d a1=c010b97160 a2=fc6 a3=0 items=0 ppid=2240 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c78,c1001 key=(null) Oct 2 20:45:44.988000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313331002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Oct 2 20:45:44.988000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521016 scontext=system_u:system_r:svirt_lxc_net_t:s0:c78,c1001 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:45:44.988000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5d a1=c001023f20 a2=fc6 a3=0 items=0 ppid=2240 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c78,c1001 key=(null) Oct 2 20:45:44.988000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313331002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Oct 2 20:45:44.989000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=521018 scontext=system_u:system_r:svirt_lxc_net_t:s0:c78,c1001 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:45:44.989000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5d a1=c00c30b410 a2=fc6 a3=0 items=0 ppid=2240 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c78,c1001 key=(null) Oct 2 20:45:44.989000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313331002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Oct 2 20:45:46.398937 kubelet[2560]: E1002 20:45:46.398845 2560 pod_workers.go:1294] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-bvcrg" podUID=b998aa5b-fd4c-4592-9f7b-c4ba1d884d60 Oct 2 20:45:48.396490 kubelet[2560]: E1002 20:45:48.396469 2560 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-564cd8db77-77wn4" podUID=fbc4e6de-1ede-4241-b504-4c2b83dbfccc Oct 2 20:45:49.397834 kubelet[2560]: E1002 20:45:49.397765 2560 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-564cd8db77-6mhvq" podUID=262322ed-5deb-44a7-b4eb-407b14988ddd Oct 2 20:46:00.398360 kubelet[2560]: E1002 20:46:00.398246 2560 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-564cd8db77-77wn4" podUID=fbc4e6de-1ede-4241-b504-4c2b83dbfccc Oct 2 20:46:00.580000 audit[2365]: AVC avc: denied { watch } for pid=2365 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c425,c522 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:46:00.608869 kernel: kauditd_printk_skb: 14 callbacks suppressed Oct 2 20:46:00.608911 kernel: audit: type=1400 audit(1696279560.580:1387): avc: denied { watch } for pid=2365 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c425,c522 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:46:00.580000 audit[2365]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001048520 a2=fc6 a3=0 items=0 ppid=2217 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c425,c522 key=(null) Oct 2 20:46:00.821854 kernel: audit: type=1300 audit(1696279560.580:1387): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001048520 a2=fc6 a3=0 items=0 ppid=2217 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c425,c522 key=(null) Oct 2 20:46:00.821929 kernel: audit: type=1327 audit(1696279560.580:1387): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:46:00.580000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:46:00.581000 audit[2365]: AVC avc: denied { watch } for pid=2365 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c425,c522 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:46:01.003311 kernel: audit: type=1400 audit(1696279560.581:1388): avc: denied { watch } for pid=2365 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c425,c522 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:46:01.003336 kernel: audit: type=1300 audit(1696279560.581:1388): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001048540 a2=fc6 a3=0 items=0 ppid=2217 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c425,c522 key=(null) Oct 2 20:46:00.581000 audit[2365]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001048540 a2=fc6 a3=0 items=0 ppid=2217 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c425,c522 key=(null) Oct 2 20:46:01.123574 kernel: audit: type=1327 audit(1696279560.581:1388): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:46:00.581000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:46:01.216612 kernel: audit: type=1400 audit(1696279560.583:1389): avc: denied { watch } for pid=2365 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c425,c522 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:46:00.583000 audit[2365]: AVC avc: denied { watch } for pid=2365 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c425,c522 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:46:01.306482 kernel: audit: type=1300 audit(1696279560.583:1389): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000086e60 a2=fc6 a3=0 items=0 ppid=2217 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c425,c522 key=(null) Oct 2 20:46:00.583000 audit[2365]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000086e60 a2=fc6 a3=0 items=0 ppid=2217 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c425,c522 key=(null) Oct 2 20:46:01.397195 kubelet[2560]: E1002 20:46:01.397184 2560 pod_workers.go:1294] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-bvcrg" podUID=b998aa5b-fd4c-4592-9f7b-c4ba1d884d60 Oct 2 20:46:01.428671 kernel: audit: type=1327 audit(1696279560.583:1389): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:46:00.583000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:46:00.583000 audit[2365]: AVC avc: denied { watch } for pid=2365 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c425,c522 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:46:01.611805 kernel: audit: type=1400 audit(1696279560.583:1390): avc: denied { watch } for pid=2365 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c425,c522 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:46:00.583000 audit[2365]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0011aba60 a2=fc6 a3=0 items=0 ppid=2217 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c425,c522 key=(null) Oct 2 20:46:00.583000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:46:02.398102 kubelet[2560]: E1002 20:46:02.398035 2560 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-564cd8db77-6mhvq" podUID=262322ed-5deb-44a7-b4eb-407b14988ddd Oct 2 20:46:13.397996 kubelet[2560]: E1002 20:46:13.397920 2560 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-564cd8db77-77wn4" podUID=fbc4e6de-1ede-4241-b504-4c2b83dbfccc Oct 2 20:46:14.398249 kubelet[2560]: E1002 20:46:14.398155 2560 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-564cd8db77-6mhvq" podUID=262322ed-5deb-44a7-b4eb-407b14988ddd Oct 2 20:46:15.399335 kubelet[2560]: E1002 20:46:15.399265 2560 pod_workers.go:1294] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-bvcrg" podUID=b998aa5b-fd4c-4592-9f7b-c4ba1d884d60 Oct 2 20:46:26.398167 kubelet[2560]: E1002 20:46:26.398064 2560 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-564cd8db77-6mhvq" podUID=262322ed-5deb-44a7-b4eb-407b14988ddd Oct 2 20:46:26.399030 kubelet[2560]: E1002 20:46:26.398564 2560 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-564cd8db77-77wn4" podUID=fbc4e6de-1ede-4241-b504-4c2b83dbfccc Oct 2 20:46:29.399071 kubelet[2560]: E1002 20:46:29.398943 2560 pod_workers.go:1294] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-bvcrg" podUID=b998aa5b-fd4c-4592-9f7b-c4ba1d884d60 Oct 2 20:46:38.398925 kubelet[2560]: E1002 20:46:38.398829 2560 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-564cd8db77-6mhvq" podUID=262322ed-5deb-44a7-b4eb-407b14988ddd Oct 2 20:46:40.398395 kubelet[2560]: E1002 20:46:40.398290 2560 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-564cd8db77-77wn4" podUID=fbc4e6de-1ede-4241-b504-4c2b83dbfccc Oct 2 20:46:41.399300 kubelet[2560]: E1002 20:46:41.399230 2560 pod_workers.go:1294] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-bvcrg" podUID=b998aa5b-fd4c-4592-9f7b-c4ba1d884d60 Oct 2 20:46:44.770000 audit[2365]: AVC avc: denied { watch } for pid=2365 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521016 scontext=system_u:system_r:svirt_lxc_net_t:s0:c425,c522 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:46:44.796816 kernel: kauditd_printk_skb: 2 callbacks suppressed Oct 2 20:46:44.796890 kernel: audit: type=1400 audit(1696279604.770:1391): avc: denied { watch } for pid=2365 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521016 scontext=system_u:system_r:svirt_lxc_net_t:s0:c425,c522 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:46:44.770000 audit[2365]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0021572f0 a2=fc6 a3=0 items=0 ppid=2217 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c425,c522 key=(null) Oct 2 20:46:45.007457 kernel: audit: type=1300 audit(1696279604.770:1391): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0021572f0 a2=fc6 a3=0 items=0 ppid=2217 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c425,c522 key=(null) Oct 2 20:46:45.007545 kernel: audit: type=1327 audit(1696279604.770:1391): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:46:44.770000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:46:45.099800 kernel: audit: type=1400 audit(1696279604.770:1392): avc: denied { watch } for pid=2365 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c425,c522 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:46:44.770000 audit[2365]: AVC avc: denied { watch } for pid=2365 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c425,c522 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:46:45.189224 kernel: audit: type=1300 audit(1696279604.770:1392): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000975c20 a2=fc6 a3=0 items=0 ppid=2217 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c425,c522 key=(null) Oct 2 20:46:44.770000 audit[2365]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000975c20 a2=fc6 a3=0 items=0 ppid=2217 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c425,c522 key=(null) Oct 2 20:46:45.309476 kernel: audit: type=1327 audit(1696279604.770:1392): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:46:44.770000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:46:44.979000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c78,c1001 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:46:45.492320 kernel: audit: type=1400 audit(1696279604.979:1393): avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c78,c1001 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:46:45.492356 kernel: audit: type=1300 audit(1696279604.979:1393): arch=c000003e syscall=254 success=no exit=-13 a0=5d a1=c00b0be3a0 a2=fc6 a3=0 items=0 ppid=2240 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c78,c1001 key=(null) Oct 2 20:46:44.979000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5d a1=c00b0be3a0 a2=fc6 a3=0 items=0 ppid=2240 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c78,c1001 key=(null) Oct 2 20:46:45.590536 kernel: audit: type=1327 audit(1696279604.979:1393): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313331002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Oct 2 20:46:44.979000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313331002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Oct 2 20:46:45.683521 kernel: audit: type=1400 audit(1696279604.979:1394): avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521016 scontext=system_u:system_r:svirt_lxc_net_t:s0:c78,c1001 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:46:44.979000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521016 scontext=system_u:system_r:svirt_lxc_net_t:s0:c78,c1001 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:46:44.979000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5d a1=c008a3ed80 a2=fc6 a3=0 items=0 ppid=2240 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c78,c1001 key=(null) Oct 2 20:46:44.979000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313331002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Oct 2 20:46:44.979000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=521012 scontext=system_u:system_r:svirt_lxc_net_t:s0:c78,c1001 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:46:44.979000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5d a1=c00a4de930 a2=fc6 a3=0 items=0 ppid=2240 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c78,c1001 key=(null) Oct 2 20:46:44.979000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313331002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Oct 2 20:46:44.988000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521016 scontext=system_u:system_r:svirt_lxc_net_t:s0:c78,c1001 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:46:44.988000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5d a1=c00ad5ef00 a2=fc6 a3=0 items=0 ppid=2240 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c78,c1001 key=(null) Oct 2 20:46:44.988000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313331002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Oct 2 20:46:44.988000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c78,c1001 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:46:44.988000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5d a1=c00aa32c20 a2=fc6 a3=0 items=0 ppid=2240 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c78,c1001 key=(null) Oct 2 20:46:44.988000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313331002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Oct 2 20:46:44.989000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=521018 scontext=system_u:system_r:svirt_lxc_net_t:s0:c78,c1001 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:46:44.989000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5d a1=c008a3ee10 a2=fc6 a3=0 items=0 ppid=2240 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c78,c1001 key=(null) Oct 2 20:46:44.989000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313331002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Oct 2 20:46:49.397635 kubelet[2560]: E1002 20:46:49.397532 2560 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-564cd8db77-6mhvq" podUID=262322ed-5deb-44a7-b4eb-407b14988ddd Oct 2 20:46:52.398175 kubelet[2560]: E1002 20:46:52.398077 2560 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-564cd8db77-77wn4" podUID=fbc4e6de-1ede-4241-b504-4c2b83dbfccc Oct 2 20:46:56.398568 kubelet[2560]: E1002 20:46:56.398470 2560 pod_workers.go:1294] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-bvcrg" podUID=b998aa5b-fd4c-4592-9f7b-c4ba1d884d60 Oct 2 20:47:00.581000 audit[2365]: AVC avc: denied { watch } for pid=2365 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c425,c522 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:47:00.610302 kernel: kauditd_printk_skb: 14 callbacks suppressed Oct 2 20:47:00.610369 kernel: audit: type=1400 audit(1696279620.581:1399): avc: denied { watch } for pid=2365 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c425,c522 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:47:00.581000 audit[2365]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0024cd600 a2=fc6 a3=0 items=0 ppid=2217 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c425,c522 key=(null) Oct 2 20:47:00.820850 kernel: audit: type=1300 audit(1696279620.581:1399): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0024cd600 a2=fc6 a3=0 items=0 ppid=2217 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c425,c522 key=(null) Oct 2 20:47:00.820884 kernel: audit: type=1327 audit(1696279620.581:1399): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:47:00.581000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:47:00.582000 audit[2365]: AVC avc: denied { watch } for pid=2365 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c425,c522 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:47:01.002899 kernel: audit: type=1400 audit(1696279620.582:1400): avc: denied { watch } for pid=2365 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c425,c522 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:47:01.002965 kernel: audit: type=1300 audit(1696279620.582:1400): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0024cd620 a2=fc6 a3=0 items=0 ppid=2217 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c425,c522 key=(null) Oct 2 20:47:00.582000 audit[2365]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0024cd620 a2=fc6 a3=0 items=0 ppid=2217 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c425,c522 key=(null) Oct 2 20:47:01.123543 kernel: audit: type=1327 audit(1696279620.582:1400): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:47:00.582000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:47:00.583000 audit[2365]: AVC avc: denied { watch } for pid=2365 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c425,c522 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:47:01.307488 kernel: audit: type=1400 audit(1696279620.583:1401): avc: denied { watch } for pid=2365 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c425,c522 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:47:01.307519 kernel: audit: type=1300 audit(1696279620.583:1401): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001d181a0 a2=fc6 a3=0 items=0 ppid=2217 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c425,c522 key=(null) Oct 2 20:47:00.583000 audit[2365]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001d181a0 a2=fc6 a3=0 items=0 ppid=2217 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c425,c522 key=(null) Oct 2 20:47:01.428804 kernel: audit: type=1327 audit(1696279620.583:1401): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:47:00.583000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:47:01.523654 kernel: audit: type=1400 audit(1696279620.583:1402): avc: denied { watch } for pid=2365 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c425,c522 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:47:00.583000 audit[2365]: AVC avc: denied { watch } for pid=2365 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c425,c522 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:47:00.583000 audit[2365]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c00099a080 a2=fc6 a3=0 items=0 ppid=2217 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c425,c522 key=(null) Oct 2 20:47:00.583000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:47:04.398050 kubelet[2560]: E1002 20:47:04.397975 2560 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-564cd8db77-6mhvq" podUID=262322ed-5deb-44a7-b4eb-407b14988ddd Oct 2 20:47:05.398221 kubelet[2560]: E1002 20:47:05.398157 2560 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-564cd8db77-77wn4" podUID=fbc4e6de-1ede-4241-b504-4c2b83dbfccc Oct 2 20:47:11.399155 kubelet[2560]: E1002 20:47:11.399030 2560 pod_workers.go:1294] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-bvcrg" podUID=b998aa5b-fd4c-4592-9f7b-c4ba1d884d60 Oct 2 20:47:18.397926 kubelet[2560]: E1002 20:47:18.397785 2560 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-564cd8db77-6mhvq" podUID=262322ed-5deb-44a7-b4eb-407b14988ddd Oct 2 20:47:18.398904 kubelet[2560]: E1002 20:47:18.397932 2560 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-564cd8db77-77wn4" podUID=fbc4e6de-1ede-4241-b504-4c2b83dbfccc Oct 2 20:47:23.398574 kubelet[2560]: E1002 20:47:23.398470 2560 pod_workers.go:1294] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-bvcrg" podUID=b998aa5b-fd4c-4592-9f7b-c4ba1d884d60 Oct 2 20:47:30.397727 kubelet[2560]: E1002 20:47:30.397626 2560 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-564cd8db77-77wn4" podUID=fbc4e6de-1ede-4241-b504-4c2b83dbfccc Oct 2 20:47:32.397969 kubelet[2560]: E1002 20:47:32.397881 2560 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-564cd8db77-6mhvq" podUID=262322ed-5deb-44a7-b4eb-407b14988ddd Oct 2 20:47:38.399906 kubelet[2560]: E1002 20:47:38.399812 2560 pod_workers.go:1294] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-bvcrg" podUID=b998aa5b-fd4c-4592-9f7b-c4ba1d884d60 Oct 2 20:47:41.397732 kubelet[2560]: E1002 20:47:41.397630 2560 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-564cd8db77-77wn4" podUID=fbc4e6de-1ede-4241-b504-4c2b83dbfccc Oct 2 20:47:44.770000 audit[2365]: AVC avc: denied { watch } for pid=2365 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c425,c522 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:47:44.798807 kernel: kauditd_printk_skb: 2 callbacks suppressed Oct 2 20:47:44.798857 kernel: audit: type=1400 audit(1696279664.770:1403): avc: denied { watch } for pid=2365 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c425,c522 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:47:44.770000 audit[2365]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0024ccf20 a2=fc6 a3=0 items=0 ppid=2217 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c425,c522 key=(null) Oct 2 20:47:44.890311 kernel: audit: type=1300 audit(1696279664.770:1403): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0024ccf20 a2=fc6 a3=0 items=0 ppid=2217 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c425,c522 key=(null) Oct 2 20:47:45.010378 kernel: audit: type=1327 audit(1696279664.770:1403): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:47:44.770000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:47:44.770000 audit[2365]: AVC avc: denied { watch } for pid=2365 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521016 scontext=system_u:system_r:svirt_lxc_net_t:s0:c425,c522 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:47:45.196486 kernel: audit: type=1400 audit(1696279664.770:1404): avc: denied { watch } for pid=2365 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521016 scontext=system_u:system_r:svirt_lxc_net_t:s0:c425,c522 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:47:45.196524 kernel: audit: type=1300 audit(1696279664.770:1404): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00116ab40 a2=fc6 a3=0 items=0 ppid=2217 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c425,c522 key=(null) Oct 2 20:47:44.770000 audit[2365]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00116ab40 a2=fc6 a3=0 items=0 ppid=2217 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c425,c522 key=(null) Oct 2 20:47:45.317177 kernel: audit: type=1327 audit(1696279664.770:1404): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:47:44.770000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:47:45.395952 kubelet[2560]: E1002 20:47:45.395938 2560 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-564cd8db77-6mhvq" podUID=262322ed-5deb-44a7-b4eb-407b14988ddd Oct 2 20:47:45.410244 kernel: audit: type=1400 audit(1696279664.980:1405): avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=521012 scontext=system_u:system_r:svirt_lxc_net_t:s0:c78,c1001 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:47:44.980000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=521012 scontext=system_u:system_r:svirt_lxc_net_t:s0:c78,c1001 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:47:45.500791 kernel: audit: type=1300 audit(1696279664.980:1405): arch=c000003e syscall=254 success=no exit=-13 a0=5d a1=c00255e5a0 a2=fc6 a3=0 items=0 ppid=2240 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c78,c1001 key=(null) Oct 2 20:47:44.980000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5d a1=c00255e5a0 a2=fc6 a3=0 items=0 ppid=2240 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c78,c1001 key=(null) Oct 2 20:47:45.599029 kernel: audit: type=1327 audit(1696279664.980:1405): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313331002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Oct 2 20:47:44.980000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313331002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Oct 2 20:47:45.692031 kernel: audit: type=1400 audit(1696279664.980:1406): avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521016 scontext=system_u:system_r:svirt_lxc_net_t:s0:c78,c1001 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:47:44.980000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521016 scontext=system_u:system_r:svirt_lxc_net_t:s0:c78,c1001 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:47:44.980000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5d a1=c00b184ed0 a2=fc6 a3=0 items=0 ppid=2240 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c78,c1001 key=(null) Oct 2 20:47:44.980000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313331002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Oct 2 20:47:44.980000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c78,c1001 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:47:44.980000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5e a1=c00b641840 a2=fc6 a3=0 items=0 ppid=2240 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c78,c1001 key=(null) Oct 2 20:47:44.980000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313331002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Oct 2 20:47:44.989000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c78,c1001 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:47:44.989000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5d a1=c00eae8120 a2=fc6 a3=0 items=0 ppid=2240 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c78,c1001 key=(null) Oct 2 20:47:44.989000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313331002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Oct 2 20:47:44.989000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521016 scontext=system_u:system_r:svirt_lxc_net_t:s0:c78,c1001 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:47:44.989000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5d a1=c01119ac00 a2=fc6 a3=0 items=0 ppid=2240 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c78,c1001 key=(null) Oct 2 20:47:44.989000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313331002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Oct 2 20:47:44.990000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=521018 scontext=system_u:system_r:svirt_lxc_net_t:s0:c78,c1001 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:47:44.990000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5d a1=c01119acf0 a2=fc6 a3=0 items=0 ppid=2240 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c78,c1001 key=(null) Oct 2 20:47:44.990000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313331002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Oct 2 20:47:51.398355 kubelet[2560]: E1002 20:47:51.398273 2560 pod_workers.go:1294] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-bvcrg" podUID=b998aa5b-fd4c-4592-9f7b-c4ba1d884d60 Oct 2 20:47:56.397341 kubelet[2560]: E1002 20:47:56.397269 2560 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-564cd8db77-77wn4" podUID=fbc4e6de-1ede-4241-b504-4c2b83dbfccc Oct 2 20:47:57.398362 kubelet[2560]: E1002 20:47:57.398255 2560 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-564cd8db77-6mhvq" podUID=262322ed-5deb-44a7-b4eb-407b14988ddd Oct 2 20:48:00.582000 audit[2365]: AVC avc: denied { watch } for pid=2365 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c425,c522 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:48:00.611217 kernel: kauditd_printk_skb: 14 callbacks suppressed Oct 2 20:48:00.611433 kernel: audit: type=1400 audit(1696279680.582:1411): avc: denied { watch } for pid=2365 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c425,c522 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:48:00.582000 audit[2365]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0015f7400 a2=fc6 a3=0 items=0 ppid=2217 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c425,c522 key=(null) Oct 2 20:48:00.822537 kernel: audit: type=1300 audit(1696279680.582:1411): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0015f7400 a2=fc6 a3=0 items=0 ppid=2217 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c425,c522 key=(null) Oct 2 20:48:00.822611 kernel: audit: type=1327 audit(1696279680.582:1411): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:48:00.582000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:48:00.914827 kernel: audit: type=1400 audit(1696279680.583:1412): avc: denied { watch } for pid=2365 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c425,c522 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:48:00.583000 audit[2365]: AVC avc: denied { watch } for pid=2365 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c425,c522 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:48:01.004161 kernel: audit: type=1300 audit(1696279680.583:1412): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0025464e0 a2=fc6 a3=0 items=0 ppid=2217 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c425,c522 key=(null) Oct 2 20:48:00.583000 audit[2365]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0025464e0 a2=fc6 a3=0 items=0 ppid=2217 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c425,c522 key=(null) Oct 2 20:48:01.124463 kernel: audit: type=1327 audit(1696279680.583:1412): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:48:00.583000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:48:01.217615 kernel: audit: type=1400 audit(1696279680.584:1413): avc: denied { watch } for pid=2365 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c425,c522 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:48:00.584000 audit[2365]: AVC avc: denied { watch } for pid=2365 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c425,c522 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:48:01.307631 kernel: audit: type=1300 audit(1696279680.584:1413): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0024cd8c0 a2=fc6 a3=0 items=0 ppid=2217 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c425,c522 key=(null) Oct 2 20:48:00.584000 audit[2365]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0024cd8c0 a2=fc6 a3=0 items=0 ppid=2217 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c425,c522 key=(null) Oct 2 20:48:01.428196 kernel: audit: type=1327 audit(1696279680.584:1413): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:48:00.584000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:48:00.584000 audit[2365]: AVC avc: denied { watch } for pid=2365 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c425,c522 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:48:01.611763 kernel: audit: type=1400 audit(1696279680.584:1414): avc: denied { watch } for pid=2365 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c425,c522 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:48:00.584000 audit[2365]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002607660 a2=fc6 a3=0 items=0 ppid=2217 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c425,c522 key=(null) Oct 2 20:48:00.584000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:48:03.398759 kubelet[2560]: E1002 20:48:03.398652 2560 pod_workers.go:1294] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-bvcrg" podUID=b998aa5b-fd4c-4592-9f7b-c4ba1d884d60 Oct 2 20:48:11.398438 kubelet[2560]: E1002 20:48:11.398338 2560 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-564cd8db77-77wn4" podUID=fbc4e6de-1ede-4241-b504-4c2b83dbfccc Oct 2 20:48:12.397909 kubelet[2560]: E1002 20:48:12.397797 2560 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-564cd8db77-6mhvq" podUID=262322ed-5deb-44a7-b4eb-407b14988ddd Oct 2 20:48:13.764704 systemd[1]: Started sshd@7-139.178.89.131:22-139.178.89.65:38536.service. Oct 2 20:48:13.764000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-139.178.89.131:22-139.178.89.65:38536 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:48:13.802473 kernel: kauditd_printk_skb: 2 callbacks suppressed Oct 2 20:48:13.802563 kernel: audit: type=1130 audit(1696279693.764:1415): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-139.178.89.131:22-139.178.89.65:38536 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:48:13.919000 audit[7967]: USER_ACCT pid=7967 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 20:48:13.919912 sshd[7967]: Accepted publickey for core from 139.178.89.65 port 38536 ssh2: RSA SHA256:M4fPbwtaE29dxMxiSyaa1yIvxglYsCEa+0scmSZWaB4 Oct 2 20:48:13.921174 sshd[7967]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 20:48:13.923470 systemd-logind[1455]: New session 10 of user core. Oct 2 20:48:13.924119 systemd[1]: Started session-10.scope. Oct 2 20:48:14.007217 sshd[7967]: pam_unix(sshd:session): session closed for user core Oct 2 20:48:14.008721 systemd[1]: sshd@7-139.178.89.131:22-139.178.89.65:38536.service: Deactivated successfully. Oct 2 20:48:14.009171 systemd[1]: session-10.scope: Deactivated successfully. Oct 2 20:48:14.009619 systemd-logind[1455]: Session 10 logged out. Waiting for processes to exit. Oct 2 20:48:14.010135 systemd-logind[1455]: Removed session 10. Oct 2 20:48:13.920000 audit[7967]: CRED_ACQ pid=7967 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 20:48:14.101804 kernel: audit: type=1101 audit(1696279693.919:1416): pid=7967 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 20:48:14.101891 kernel: audit: type=1103 audit(1696279693.920:1417): pid=7967 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 20:48:14.101913 kernel: audit: type=1006 audit(1696279693.920:1418): pid=7967 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 Oct 2 20:48:14.160452 kernel: audit: type=1300 audit(1696279693.920:1418): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe3d7fa640 a2=3 a3=0 items=0 ppid=1 pid=7967 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:48:13.920000 audit[7967]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe3d7fa640 a2=3 a3=0 items=0 ppid=1 pid=7967 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:48:14.253093 kernel: audit: type=1327 audit(1696279693.920:1418): proctitle=737368643A20636F7265205B707269765D Oct 2 20:48:13.920000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 20:48:14.283918 kernel: audit: type=1105 audit(1696279693.926:1419): pid=7967 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 20:48:13.926000 audit[7967]: USER_START pid=7967 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 20:48:14.379178 kernel: audit: type=1103 audit(1696279693.926:1420): pid=7969 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 20:48:13.926000 audit[7969]: CRED_ACQ pid=7969 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 20:48:14.468278 kernel: audit: type=1106 audit(1696279694.007:1421): pid=7967 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 20:48:14.007000 audit[7967]: USER_END pid=7967 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 20:48:14.563852 kernel: audit: type=1104 audit(1696279694.007:1422): pid=7967 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 20:48:14.007000 audit[7967]: CRED_DISP pid=7967 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 20:48:14.008000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-139.178.89.131:22-139.178.89.65:38536 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:48:17.399190 env[1465]: time="2023-10-02T20:48:17.399049180Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\"" Oct 2 20:48:17.658503 env[1465]: time="2023-10-02T20:48:17.658223862Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 20:48:17.659236 env[1465]: time="2023-10-02T20:48:17.659111871Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 20:48:17.659668 kubelet[2560]: E1002 20:48:17.659577 2560 remote_image.go:167] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 20:48:17.659668 kubelet[2560]: E1002 20:48:17.659666 2560 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 20:48:17.660719 kubelet[2560]: E1002 20:48:17.659893 2560 kuberuntime_manager.go:1212] container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.25.0,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:etccalico,ReadOnly:false,MountPath:/etc/calico,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,},VolumeMount{Name:kube-api-access-vxrfd,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},} start failed in pod csi-node-driver-bvcrg_calico-system(b998aa5b-fd4c-4592-9f7b-c4ba1d884d60): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/csi:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/csi:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 20:48:17.661849 env[1465]: time="2023-10-02T20:48:17.661773625Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\"" Oct 2 20:48:17.931080 env[1465]: time="2023-10-02T20:48:17.930797795Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 20:48:17.932077 env[1465]: time="2023-10-02T20:48:17.931909664Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 20:48:17.932591 kubelet[2560]: E1002 20:48:17.932498 2560 remote_image.go:167] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 20:48:17.932591 kubelet[2560]: E1002 20:48:17.932592 2560 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 20:48:17.932914 kubelet[2560]: E1002 20:48:17.932790 2560 kuberuntime_manager.go:1212] container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-vxrfd,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},} start failed in pod csi-node-driver-bvcrg_calico-system(b998aa5b-fd4c-4592-9f7b-c4ba1d884d60): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 20:48:17.933264 kubelet[2560]: E1002 20:48:17.932929 2560 pod_workers.go:1294] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/csi-node-driver-bvcrg" podUID=b998aa5b-fd4c-4592-9f7b-c4ba1d884d60 Oct 2 20:48:24.016722 systemd[1]: Started sshd@8-139.178.89.131:22-139.178.89.65:41510.service. Oct 2 20:48:24.016000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-139.178.89.131:22-139.178.89.65:41510 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:48:24.044034 kernel: kauditd_printk_skb: 1 callbacks suppressed Oct 2 20:48:24.044142 kernel: audit: type=1130 audit(1696279704.016:1424): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-139.178.89.131:22-139.178.89.65:41510 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:48:24.163569 sshd[8071]: Accepted publickey for core from 139.178.89.65 port 41510 ssh2: RSA SHA256:M4fPbwtaE29dxMxiSyaa1yIvxglYsCEa+0scmSZWaB4 Oct 2 20:48:24.163000 audit[8071]: USER_ACCT pid=8071 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 20:48:24.164610 sshd[8071]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 20:48:24.166893 systemd-logind[1455]: New session 11 of user core. Oct 2 20:48:24.167341 systemd[1]: Started session-11.scope. Oct 2 20:48:24.247161 sshd[8071]: pam_unix(sshd:session): session closed for user core Oct 2 20:48:24.248640 systemd[1]: sshd@8-139.178.89.131:22-139.178.89.65:41510.service: Deactivated successfully. Oct 2 20:48:24.249081 systemd[1]: session-11.scope: Deactivated successfully. Oct 2 20:48:24.249482 systemd-logind[1455]: Session 11 logged out. Waiting for processes to exit. Oct 2 20:48:24.249957 systemd-logind[1455]: Removed session 11. Oct 2 20:48:24.164000 audit[8071]: CRED_ACQ pid=8071 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 20:48:24.345165 kernel: audit: type=1101 audit(1696279704.163:1425): pid=8071 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 20:48:24.345201 kernel: audit: type=1103 audit(1696279704.164:1426): pid=8071 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 20:48:24.345218 kernel: audit: type=1006 audit(1696279704.164:1427): pid=8071 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 Oct 2 20:48:24.403517 kernel: audit: type=1300 audit(1696279704.164:1427): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe26dd7590 a2=3 a3=0 items=0 ppid=1 pid=8071 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:48:24.164000 audit[8071]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe26dd7590 a2=3 a3=0 items=0 ppid=1 pid=8071 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:48:24.495158 kernel: audit: type=1327 audit(1696279704.164:1427): proctitle=737368643A20636F7265205B707269765D Oct 2 20:48:24.164000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 20:48:24.525638 kernel: audit: type=1105 audit(1696279704.169:1428): pid=8071 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 20:48:24.169000 audit[8071]: USER_START pid=8071 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 20:48:24.619910 kernel: audit: type=1103 audit(1696279704.169:1429): pid=8073 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 20:48:24.169000 audit[8073]: CRED_ACQ pid=8073 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 20:48:24.708918 kernel: audit: type=1106 audit(1696279704.247:1430): pid=8071 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 20:48:24.247000 audit[8071]: USER_END pid=8071 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 20:48:24.247000 audit[8071]: CRED_DISP pid=8071 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 20:48:24.893476 kernel: audit: type=1104 audit(1696279704.247:1431): pid=8071 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 20:48:24.248000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-139.178.89.131:22-139.178.89.65:41510 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:48:25.398087 env[1465]: time="2023-10-02T20:48:25.397964197Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\"" Oct 2 20:48:25.632596 env[1465]: time="2023-10-02T20:48:25.632450621Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 20:48:25.633525 env[1465]: time="2023-10-02T20:48:25.633387438Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 20:48:25.633953 kubelet[2560]: E1002 20:48:25.633854 2560 remote_image.go:167] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 20:48:25.633953 kubelet[2560]: E1002 20:48:25.633944 2560 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 20:48:25.634895 kubelet[2560]: E1002 20:48:25.634196 2560 kuberuntime_manager.go:1212] container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.25.0,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-twprp,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/version,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:90,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/code/filecheck],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:5,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:5,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*false,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},} start failed in pod calico-apiserver-564cd8db77-77wn4_calico-apiserver(fbc4e6de-1ede-4241-b504-4c2b83dbfccc): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 20:48:25.634895 kubelet[2560]: E1002 20:48:25.634298 2560 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-apiserver/calico-apiserver-564cd8db77-77wn4" podUID=fbc4e6de-1ede-4241-b504-4c2b83dbfccc Oct 2 20:48:27.398068 env[1465]: time="2023-10-02T20:48:27.397920437Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\"" Oct 2 20:48:27.626039 env[1465]: time="2023-10-02T20:48:27.625877711Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 20:48:27.626980 env[1465]: time="2023-10-02T20:48:27.626874162Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 20:48:27.627498 kubelet[2560]: E1002 20:48:27.627401 2560 remote_image.go:167] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 20:48:27.627498 kubelet[2560]: E1002 20:48:27.627502 2560 kuberuntime_image.go:53] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 20:48:27.628367 kubelet[2560]: E1002 20:48:27.627719 2560 kuberuntime_manager.go:1212] container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.25.0,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-rxs68,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/version,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:90,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/code/filecheck],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:5,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:5,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*false,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},} start failed in pod calico-apiserver-564cd8db77-6mhvq_calico-apiserver(262322ed-5deb-44a7-b4eb-407b14988ddd): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 20:48:27.628367 kubelet[2560]: E1002 20:48:27.627822 2560 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-apiserver/calico-apiserver-564cd8db77-6mhvq" podUID=262322ed-5deb-44a7-b4eb-407b14988ddd Oct 2 20:48:29.399090 kubelet[2560]: E1002 20:48:29.398992 2560 pod_workers.go:1294] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-bvcrg" podUID=b998aa5b-fd4c-4592-9f7b-c4ba1d884d60 Oct 2 20:48:34.256751 systemd[1]: Started sshd@9-139.178.89.131:22-139.178.89.65:53982.service. Oct 2 20:48:34.255000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-139.178.89.131:22-139.178.89.65:53982 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:48:34.283826 kernel: kauditd_printk_skb: 1 callbacks suppressed Oct 2 20:48:34.283874 kernel: audit: type=1130 audit(1696279714.255:1433): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-139.178.89.131:22-139.178.89.65:53982 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:48:34.401000 audit[8177]: USER_ACCT pid=8177 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 20:48:34.402764 sshd[8177]: Accepted publickey for core from 139.178.89.65 port 53982 ssh2: RSA SHA256:M4fPbwtaE29dxMxiSyaa1yIvxglYsCEa+0scmSZWaB4 Oct 2 20:48:34.403605 sshd[8177]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 20:48:34.405873 systemd-logind[1455]: New session 12 of user core. Oct 2 20:48:34.406428 systemd[1]: Started session-12.scope. Oct 2 20:48:34.489640 sshd[8177]: pam_unix(sshd:session): session closed for user core Oct 2 20:48:34.491518 systemd[1]: sshd@9-139.178.89.131:22-139.178.89.65:53982.service: Deactivated successfully. Oct 2 20:48:34.492031 systemd[1]: session-12.scope: Deactivated successfully. Oct 2 20:48:34.492371 systemd-logind[1455]: Session 12 logged out. Waiting for processes to exit. Oct 2 20:48:34.492949 systemd[1]: Started sshd@10-139.178.89.131:22-139.178.89.65:53992.service. Oct 2 20:48:34.493390 systemd-logind[1455]: Removed session 12. Oct 2 20:48:34.402000 audit[8177]: CRED_ACQ pid=8177 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 20:48:34.587458 kernel: audit: type=1101 audit(1696279714.401:1434): pid=8177 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 20:48:34.587498 kernel: audit: type=1103 audit(1696279714.402:1435): pid=8177 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 20:48:34.587516 kernel: audit: type=1006 audit(1696279714.402:1436): pid=8177 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=12 res=1 Oct 2 20:48:34.645938 kernel: audit: type=1300 audit(1696279714.402:1436): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdd5e65cc0 a2=3 a3=0 items=0 ppid=1 pid=8177 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:48:34.402000 audit[8177]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdd5e65cc0 a2=3 a3=0 items=0 ppid=1 pid=8177 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:48:34.674424 sshd[8203]: Accepted publickey for core from 139.178.89.65 port 53992 ssh2: RSA SHA256:M4fPbwtaE29dxMxiSyaa1yIvxglYsCEa+0scmSZWaB4 Oct 2 20:48:34.675579 sshd[8203]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 20:48:34.677816 systemd-logind[1455]: New session 13 of user core. Oct 2 20:48:34.678281 systemd[1]: Started session-13.scope. Oct 2 20:48:34.737835 kernel: audit: type=1327 audit(1696279714.402:1436): proctitle=737368643A20636F7265205B707269765D Oct 2 20:48:34.402000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 20:48:34.768386 kernel: audit: type=1105 audit(1696279714.407:1437): pid=8177 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 20:48:34.407000 audit[8177]: USER_START pid=8177 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 20:48:34.862574 kernel: audit: type=1103 audit(1696279714.407:1438): pid=8179 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 20:48:34.407000 audit[8179]: CRED_ACQ pid=8179 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 20:48:34.904136 sshd[8203]: pam_unix(sshd:session): session closed for user core Oct 2 20:48:34.906014 systemd[1]: sshd@10-139.178.89.131:22-139.178.89.65:53992.service: Deactivated successfully. Oct 2 20:48:34.906403 systemd[1]: session-13.scope: Deactivated successfully. Oct 2 20:48:34.906761 systemd-logind[1455]: Session 13 logged out. Waiting for processes to exit. Oct 2 20:48:34.907433 systemd[1]: Started sshd@11-139.178.89.131:22-139.178.89.65:54006.service. Oct 2 20:48:34.907834 systemd-logind[1455]: Removed session 13. Oct 2 20:48:34.488000 audit[8177]: USER_END pid=8177 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 20:48:35.046935 kernel: audit: type=1106 audit(1696279714.488:1439): pid=8177 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 20:48:35.046986 kernel: audit: type=1104 audit(1696279714.488:1440): pid=8177 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 20:48:34.488000 audit[8177]: CRED_DISP pid=8177 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 20:48:35.075423 sshd[8226]: Accepted publickey for core from 139.178.89.65 port 54006 ssh2: RSA SHA256:M4fPbwtaE29dxMxiSyaa1yIvxglYsCEa+0scmSZWaB4 Oct 2 20:48:35.076218 sshd[8226]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 20:48:35.078204 systemd-logind[1455]: New session 14 of user core. Oct 2 20:48:35.078748 systemd[1]: Started session-14.scope. Oct 2 20:48:34.490000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-139.178.89.131:22-139.178.89.65:53982 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:48:34.491000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-139.178.89.131:22-139.178.89.65:53992 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:48:34.672000 audit[8203]: USER_ACCT pid=8203 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 20:48:34.674000 audit[8203]: CRED_ACQ pid=8203 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 20:48:34.674000 audit[8203]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd8497a5e0 a2=3 a3=0 items=0 ppid=1 pid=8203 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:48:34.674000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 20:48:34.678000 audit[8203]: USER_START pid=8203 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 20:48:34.679000 audit[8205]: CRED_ACQ pid=8205 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 20:48:34.903000 audit[8203]: USER_END pid=8203 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 20:48:34.903000 audit[8203]: CRED_DISP pid=8203 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 20:48:34.904000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-139.178.89.131:22-139.178.89.65:53992 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:48:34.906000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-139.178.89.131:22-139.178.89.65:54006 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:48:35.074000 audit[8226]: USER_ACCT pid=8226 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 20:48:35.074000 audit[8226]: CRED_ACQ pid=8226 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 20:48:35.074000 audit[8226]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe1e329340 a2=3 a3=0 items=0 ppid=1 pid=8226 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:48:35.074000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 20:48:35.079000 audit[8226]: USER_START pid=8226 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 20:48:35.079000 audit[8228]: CRED_ACQ pid=8228 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 20:48:35.156856 sshd[8226]: pam_unix(sshd:session): session closed for user core Oct 2 20:48:35.156000 audit[8226]: USER_END pid=8226 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 20:48:35.156000 audit[8226]: CRED_DISP pid=8226 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 20:48:35.158278 systemd[1]: sshd@11-139.178.89.131:22-139.178.89.65:54006.service: Deactivated successfully. Oct 2 20:48:35.157000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-139.178.89.131:22-139.178.89.65:54006 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:48:35.158728 systemd[1]: session-14.scope: Deactivated successfully. Oct 2 20:48:35.159100 systemd-logind[1455]: Session 14 logged out. Waiting for processes to exit. Oct 2 20:48:35.159549 systemd-logind[1455]: Removed session 14. Oct 2 20:48:39.397442 kubelet[2560]: E1002 20:48:39.397333 2560 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-564cd8db77-77wn4" podUID=fbc4e6de-1ede-4241-b504-4c2b83dbfccc Oct 2 20:48:42.397810 kubelet[2560]: E1002 20:48:42.397739 2560 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-564cd8db77-6mhvq" podUID=262322ed-5deb-44a7-b4eb-407b14988ddd Oct 2 20:48:42.398659 kubelet[2560]: E1002 20:48:42.398619 2560 pod_workers.go:1294] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-bvcrg" podUID=b998aa5b-fd4c-4592-9f7b-c4ba1d884d60 Oct 2 20:48:44.770000 audit[2365]: AVC avc: denied { watch } for pid=2365 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c425,c522 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:48:44.815132 kernel: kauditd_printk_skb: 23 callbacks suppressed Oct 2 20:48:44.815216 kernel: audit: type=1400 audit(1696279724.770:1460): avc: denied { watch } for pid=2365 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c425,c522 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:48:44.770000 audit[2365]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0026ddaa0 a2=fc6 a3=0 items=0 ppid=2217 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c425,c522 key=(null) Oct 2 20:48:45.024916 kernel: audit: type=1300 audit(1696279724.770:1460): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0026ddaa0 a2=fc6 a3=0 items=0 ppid=2217 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c425,c522 key=(null) Oct 2 20:48:45.024956 kernel: audit: type=1327 audit(1696279724.770:1460): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:48:44.770000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:48:45.117393 kernel: audit: type=1400 audit(1696279724.770:1461): avc: denied { watch } for pid=2365 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521016 scontext=system_u:system_r:svirt_lxc_net_t:s0:c425,c522 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:48:44.770000 audit[2365]: AVC avc: denied { watch } for pid=2365 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521016 scontext=system_u:system_r:svirt_lxc_net_t:s0:c425,c522 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:48:45.159152 systemd[1]: Started sshd@12-139.178.89.131:22-139.178.89.65:49740.service. Oct 2 20:48:45.209686 kernel: audit: type=1300 audit(1696279724.770:1461): arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c0023b4b40 a2=fc6 a3=0 items=0 ppid=2217 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c425,c522 key=(null) Oct 2 20:48:44.770000 audit[2365]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c0023b4b40 a2=fc6 a3=0 items=0 ppid=2217 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c425,c522 key=(null) Oct 2 20:48:45.328749 kernel: audit: type=1327 audit(1696279724.770:1461): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:48:44.770000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 20:48:45.357229 sshd[8341]: Accepted publickey for core from 139.178.89.65 port 49740 ssh2: RSA SHA256:M4fPbwtaE29dxMxiSyaa1yIvxglYsCEa+0scmSZWaB4 Oct 2 20:48:45.358691 sshd[8341]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 20:48:45.360939 systemd-logind[1455]: New session 15 of user core. Oct 2 20:48:45.361447 systemd[1]: Started session-15.scope. Oct 2 20:48:44.980000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521016 scontext=system_u:system_r:svirt_lxc_net_t:s0:c78,c1001 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:48:45.441089 sshd[8341]: pam_unix(sshd:session): session closed for user core Oct 2 20:48:45.442532 systemd[1]: sshd@12-139.178.89.131:22-139.178.89.65:49740.service: Deactivated successfully. Oct 2 20:48:45.442969 systemd[1]: session-15.scope: Deactivated successfully. Oct 2 20:48:45.443255 systemd-logind[1455]: Session 15 logged out. Waiting for processes to exit. Oct 2 20:48:45.443752 systemd-logind[1455]: Removed session 15. Oct 2 20:48:45.512300 kernel: audit: type=1400 audit(1696279724.980:1462): avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521016 scontext=system_u:system_r:svirt_lxc_net_t:s0:c78,c1001 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:48:45.512336 kernel: audit: type=1300 audit(1696279724.980:1462): arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c00a91af90 a2=fc6 a3=0 items=0 ppid=2240 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c78,c1001 key=(null) Oct 2 20:48:44.980000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c00a91af90 a2=fc6 a3=0 items=0 ppid=2240 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c78,c1001 key=(null) Oct 2 20:48:45.610284 kernel: audit: type=1327 audit(1696279724.980:1462): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313331002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Oct 2 20:48:44.980000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313331002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Oct 2 20:48:45.702971 kernel: audit: type=1400 audit(1696279724.980:1463): avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=521012 scontext=system_u:system_r:svirt_lxc_net_t:s0:c78,c1001 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:48:44.980000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=521012 scontext=system_u:system_r:svirt_lxc_net_t:s0:c78,c1001 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:48:44.980000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c78,c1001 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:48:44.980000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c003daf830 a2=fc6 a3=0 items=0 ppid=2240 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c78,c1001 key=(null) Oct 2 20:48:44.980000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313331002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Oct 2 20:48:44.980000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c0136ebb40 a2=fc6 a3=0 items=0 ppid=2240 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c78,c1001 key=(null) Oct 2 20:48:44.980000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313331002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Oct 2 20:48:44.989000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521016 scontext=system_u:system_r:svirt_lxc_net_t:s0:c78,c1001 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:48:44.989000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c003daf950 a2=fc6 a3=0 items=0 ppid=2240 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c78,c1001 key=(null) Oct 2 20:48:44.989000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313331002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Oct 2 20:48:44.989000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c78,c1001 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:48:44.989000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c00e7c6240 a2=fc6 a3=0 items=0 ppid=2240 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c78,c1001 key=(null) Oct 2 20:48:44.989000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313331002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Oct 2 20:48:44.990000 audit[2416]: AVC avc: denied { watch } for pid=2416 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=521018 scontext=system_u:system_r:svirt_lxc_net_t:s0:c78,c1001 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 20:48:44.990000 audit[2416]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c003daf9e0 a2=fc6 a3=0 items=0 ppid=2240 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c78,c1001 key=(null) Oct 2 20:48:44.990000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E38392E313331002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Oct 2 20:48:45.157000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-139.178.89.131:22-139.178.89.65:49740 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 20:48:45.355000 audit[8341]: USER_ACCT pid=8341 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 20:48:45.357000 audit[8341]: CRED_ACQ pid=8341 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 20:48:45.357000 audit[8341]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcff9890b0 a2=3 a3=0 items=0 ppid=1 pid=8341 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 20:48:45.357000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 20:48:45.362000 audit[8341]: USER_START pid=8341 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 20:48:45.362000 audit[8343]: CRED_ACQ pid=8343 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 20:48:45.440000 audit[8341]: USER_END pid=8341 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 20:48:45.440000 audit[8341]: CRED_DISP pid=8341 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 20:48:45.441000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-139.178.89.131:22-139.178.89.65:49740 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'