Oct  2 21:31:48.547706 kernel: Linux version 5.15.132-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Mon Oct 2 17:52:37 -00 2023
Oct  2 21:31:48.547718 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.first_boot=detected flatcar.oem.id=packet flatcar.autologin verity.usrhash=96b0fdb9f11bf1422adc9955c78c8182df387766badfd0b94e08fb9688739ee1
Oct  2 21:31:48.547725 kernel: BIOS-provided physical RAM map:
Oct  2 21:31:48.547729 kernel: BIOS-e820: [mem 0x0000000000000000-0x00000000000997ff] usable
Oct  2 21:31:48.547733 kernel: BIOS-e820: [mem 0x0000000000099800-0x000000000009ffff] reserved
Oct  2 21:31:48.547736 kernel: BIOS-e820: [mem 0x00000000000e0000-0x00000000000fffff] reserved
Oct  2 21:31:48.547741 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000003fffffff] usable
Oct  2 21:31:48.547745 kernel: BIOS-e820: [mem 0x0000000040000000-0x00000000403fffff] reserved
Oct  2 21:31:48.547748 kernel: BIOS-e820: [mem 0x0000000040400000-0x00000000825d7fff] usable
Oct  2 21:31:48.547752 kernel: BIOS-e820: [mem 0x00000000825d8000-0x00000000825d8fff] ACPI NVS
Oct  2 21:31:48.547756 kernel: BIOS-e820: [mem 0x00000000825d9000-0x00000000825d9fff] reserved
Oct  2 21:31:48.547760 kernel: BIOS-e820: [mem 0x00000000825da000-0x000000008afccfff] usable
Oct  2 21:31:48.547764 kernel: BIOS-e820: [mem 0x000000008afcd000-0x000000008c0b1fff] reserved
Oct  2 21:31:48.547768 kernel: BIOS-e820: [mem 0x000000008c0b2000-0x000000008c23afff] usable
Oct  2 21:31:48.547773 kernel: BIOS-e820: [mem 0x000000008c23b000-0x000000008c66cfff] ACPI NVS
Oct  2 21:31:48.547778 kernel: BIOS-e820: [mem 0x000000008c66d000-0x000000008eefefff] reserved
Oct  2 21:31:48.547782 kernel: BIOS-e820: [mem 0x000000008eeff000-0x000000008eefffff] usable
Oct  2 21:31:48.547786 kernel: BIOS-e820: [mem 0x000000008ef00000-0x000000008fffffff] reserved
Oct  2 21:31:48.547790 kernel: BIOS-e820: [mem 0x00000000e0000000-0x00000000efffffff] reserved
Oct  2 21:31:48.547794 kernel: BIOS-e820: [mem 0x00000000fe000000-0x00000000fe010fff] reserved
Oct  2 21:31:48.547798 kernel: BIOS-e820: [mem 0x00000000fec00000-0x00000000fec00fff] reserved
Oct  2 21:31:48.547802 kernel: BIOS-e820: [mem 0x00000000fee00000-0x00000000fee00fff] reserved
Oct  2 21:31:48.547806 kernel: BIOS-e820: [mem 0x00000000ff000000-0x00000000ffffffff] reserved
Oct  2 21:31:48.547810 kernel: BIOS-e820: [mem 0x0000000100000000-0x000000086effffff] usable
Oct  2 21:31:48.547814 kernel: NX (Execute Disable) protection: active
Oct  2 21:31:48.547818 kernel: SMBIOS 3.2.1 present.
Oct  2 21:31:48.547823 kernel: DMI: Supermicro X11SCM-F/X11SCM-F, BIOS 1.9 09/16/2022
Oct  2 21:31:48.547827 kernel: tsc: Detected 3400.000 MHz processor
Oct  2 21:31:48.547831 kernel: tsc: Detected 3399.906 MHz TSC
Oct  2 21:31:48.547835 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved
Oct  2 21:31:48.547840 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable
Oct  2 21:31:48.547845 kernel: last_pfn = 0x86f000 max_arch_pfn = 0x400000000
Oct  2 21:31:48.547849 kernel: x86/PAT: Configuration [0-7]: WB  WC  UC- UC  WB  WP  UC- WT  
Oct  2 21:31:48.547853 kernel: last_pfn = 0x8ef00 max_arch_pfn = 0x400000000
Oct  2 21:31:48.547857 kernel: Using GB pages for direct mapping
Oct  2 21:31:48.547862 kernel: ACPI: Early table checksum verification disabled
Oct  2 21:31:48.547866 kernel: ACPI: RSDP 0x00000000000F05B0 000024 (v02 SUPERM)
Oct  2 21:31:48.547871 kernel: ACPI: XSDT 0x000000008C54E0C8 00010C (v01 SUPERM SUPERM   01072009 AMI  00010013)
Oct  2 21:31:48.547875 kernel: ACPI: FACP 0x000000008C58A670 000114 (v06                 01072009 AMI  00010013)
Oct  2 21:31:48.547879 kernel: ACPI: DSDT 0x000000008C54E268 03C404 (v02 SUPERM SMCI--MB 01072009 INTL 20160527)
Oct  2 21:31:48.547885 kernel: ACPI: FACS 0x000000008C66CF80 000040
Oct  2 21:31:48.547890 kernel: ACPI: APIC 0x000000008C58A788 00012C (v04                 01072009 AMI  00010013)
Oct  2 21:31:48.547895 kernel: ACPI: FPDT 0x000000008C58A8B8 000044 (v01                 01072009 AMI  00010013)
Oct  2 21:31:48.547900 kernel: ACPI: FIDT 0x000000008C58A900 00009C (v01 SUPERM SMCI--MB 01072009 AMI  00010013)
Oct  2 21:31:48.547904 kernel: ACPI: MCFG 0x000000008C58A9A0 00003C (v01 SUPERM SMCI--MB 01072009 MSFT 00000097)
Oct  2 21:31:48.547909 kernel: ACPI: SPMI 0x000000008C58A9E0 000041 (v05 SUPERM SMCI--MB 00000000 AMI. 00000000)
Oct  2 21:31:48.547913 kernel: ACPI: SSDT 0x000000008C58AA28 001B1C (v02 CpuRef CpuSsdt  00003000 INTL 20160527)
Oct  2 21:31:48.547918 kernel: ACPI: SSDT 0x000000008C58C548 0031C6 (v02 SaSsdt SaSsdt   00003000 INTL 20160527)
Oct  2 21:31:48.547922 kernel: ACPI: SSDT 0x000000008C58F710 00232B (v02 PegSsd PegSsdt  00001000 INTL 20160527)
Oct  2 21:31:48.547927 kernel: ACPI: HPET 0x000000008C591A40 000038 (v01 SUPERM SMCI--MB 00000002      01000013)
Oct  2 21:31:48.547932 kernel: ACPI: SSDT 0x000000008C591A78 000FAE (v02 SUPERM Ther_Rvp 00001000 INTL 20160527)
Oct  2 21:31:48.547937 kernel: ACPI: SSDT 0x000000008C592A28 0008F4 (v02 INTEL  xh_mossb 00000000 INTL 20160527)
Oct  2 21:31:48.547942 kernel: ACPI: UEFI 0x000000008C593320 000042 (v01 SUPERM SMCI--MB 00000002      01000013)
Oct  2 21:31:48.547946 kernel: ACPI: LPIT 0x000000008C593368 000094 (v01 SUPERM SMCI--MB 00000002      01000013)
Oct  2 21:31:48.547951 kernel: ACPI: SSDT 0x000000008C593400 0027DE (v02 SUPERM PtidDevc 00001000 INTL 20160527)
Oct  2 21:31:48.547955 kernel: ACPI: SSDT 0x000000008C595BE0 0014E2 (v02 SUPERM TbtTypeC 00000000 INTL 20160527)
Oct  2 21:31:48.547960 kernel: ACPI: DBGP 0x000000008C5970C8 000034 (v01 SUPERM SMCI--MB 00000002      01000013)
Oct  2 21:31:48.547964 kernel: ACPI: DBG2 0x000000008C597100 000054 (v00 SUPERM SMCI--MB 00000002      01000013)
Oct  2 21:31:48.547970 kernel: ACPI: SSDT 0x000000008C597158 001B67 (v02 SUPERM UsbCTabl 00001000 INTL 20160527)
Oct  2 21:31:48.547974 kernel: ACPI: DMAR 0x000000008C598CC0 000070 (v01 INTEL  EDK2     00000002      01000013)
Oct  2 21:31:48.547979 kernel: ACPI: SSDT 0x000000008C598D30 000144 (v02 Intel  ADebTabl 00001000 INTL 20160527)
Oct  2 21:31:48.547983 kernel: ACPI: TPM2 0x000000008C598E78 000034 (v04 SUPERM SMCI--MB 00000001 AMI  00000000)
Oct  2 21:31:48.547988 kernel: ACPI: SSDT 0x000000008C598EB0 000D8F (v02 INTEL  SpsNm    00000002 INTL 20160527)
Oct  2 21:31:48.547992 kernel: ACPI: WSMT 0x000000008C599C40 000028 (v01 SUPERM          01072009 AMI  00010013)
Oct  2 21:31:48.547997 kernel: ACPI: EINJ 0x000000008C599C68 000130 (v01 AMI    AMI.EINJ 00000000 AMI. 00000000)
Oct  2 21:31:48.548001 kernel: ACPI: ERST 0x000000008C599D98 000230 (v01 AMIER  AMI.ERST 00000000 AMI. 00000000)
Oct  2 21:31:48.548006 kernel: ACPI: BERT 0x000000008C599FC8 000030 (v01 AMI    AMI.BERT 00000000 AMI. 00000000)
Oct  2 21:31:48.548011 kernel: ACPI: HEST 0x000000008C599FF8 00027C (v01 AMI    AMI.HEST 00000000 AMI. 00000000)
Oct  2 21:31:48.548016 kernel: ACPI: SSDT 0x000000008C59A278 000162 (v01 SUPERM SMCCDN   00000000 INTL 20181221)
Oct  2 21:31:48.548020 kernel: ACPI: Reserving FACP table memory at [mem 0x8c58a670-0x8c58a783]
Oct  2 21:31:48.548025 kernel: ACPI: Reserving DSDT table memory at [mem 0x8c54e268-0x8c58a66b]
Oct  2 21:31:48.548030 kernel: ACPI: Reserving FACS table memory at [mem 0x8c66cf80-0x8c66cfbf]
Oct  2 21:31:48.548034 kernel: ACPI: Reserving APIC table memory at [mem 0x8c58a788-0x8c58a8b3]
Oct  2 21:31:48.548038 kernel: ACPI: Reserving FPDT table memory at [mem 0x8c58a8b8-0x8c58a8fb]
Oct  2 21:31:48.548043 kernel: ACPI: Reserving FIDT table memory at [mem 0x8c58a900-0x8c58a99b]
Oct  2 21:31:48.548048 kernel: ACPI: Reserving MCFG table memory at [mem 0x8c58a9a0-0x8c58a9db]
Oct  2 21:31:48.548053 kernel: ACPI: Reserving SPMI table memory at [mem 0x8c58a9e0-0x8c58aa20]
Oct  2 21:31:48.548057 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c58aa28-0x8c58c543]
Oct  2 21:31:48.548062 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c58c548-0x8c58f70d]
Oct  2 21:31:48.548066 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c58f710-0x8c591a3a]
Oct  2 21:31:48.548071 kernel: ACPI: Reserving HPET table memory at [mem 0x8c591a40-0x8c591a77]
Oct  2 21:31:48.548075 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c591a78-0x8c592a25]
Oct  2 21:31:48.548080 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c592a28-0x8c59331b]
Oct  2 21:31:48.548084 kernel: ACPI: Reserving UEFI table memory at [mem 0x8c593320-0x8c593361]
Oct  2 21:31:48.548090 kernel: ACPI: Reserving LPIT table memory at [mem 0x8c593368-0x8c5933fb]
Oct  2 21:31:48.548094 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c593400-0x8c595bdd]
Oct  2 21:31:48.548099 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c595be0-0x8c5970c1]
Oct  2 21:31:48.548103 kernel: ACPI: Reserving DBGP table memory at [mem 0x8c5970c8-0x8c5970fb]
Oct  2 21:31:48.548108 kernel: ACPI: Reserving DBG2 table memory at [mem 0x8c597100-0x8c597153]
Oct  2 21:31:48.548112 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c597158-0x8c598cbe]
Oct  2 21:31:48.548117 kernel: ACPI: Reserving DMAR table memory at [mem 0x8c598cc0-0x8c598d2f]
Oct  2 21:31:48.548121 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c598d30-0x8c598e73]
Oct  2 21:31:48.548126 kernel: ACPI: Reserving TPM2 table memory at [mem 0x8c598e78-0x8c598eab]
Oct  2 21:31:48.548131 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c598eb0-0x8c599c3e]
Oct  2 21:31:48.548136 kernel: ACPI: Reserving WSMT table memory at [mem 0x8c599c40-0x8c599c67]
Oct  2 21:31:48.548140 kernel: ACPI: Reserving EINJ table memory at [mem 0x8c599c68-0x8c599d97]
Oct  2 21:31:48.548145 kernel: ACPI: Reserving ERST table memory at [mem 0x8c599d98-0x8c599fc7]
Oct  2 21:31:48.548149 kernel: ACPI: Reserving BERT table memory at [mem 0x8c599fc8-0x8c599ff7]
Oct  2 21:31:48.548154 kernel: ACPI: Reserving HEST table memory at [mem 0x8c599ff8-0x8c59a273]
Oct  2 21:31:48.548159 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c59a278-0x8c59a3d9]
Oct  2 21:31:48.548163 kernel: No NUMA configuration found
Oct  2 21:31:48.548168 kernel: Faking a node at [mem 0x0000000000000000-0x000000086effffff]
Oct  2 21:31:48.548173 kernel: NODE_DATA(0) allocated [mem 0x86effa000-0x86effffff]
Oct  2 21:31:48.548178 kernel: Zone ranges:
Oct  2 21:31:48.548182 kernel:   DMA      [mem 0x0000000000001000-0x0000000000ffffff]
Oct  2 21:31:48.548187 kernel:   DMA32    [mem 0x0000000001000000-0x00000000ffffffff]
Oct  2 21:31:48.548191 kernel:   Normal   [mem 0x0000000100000000-0x000000086effffff]
Oct  2 21:31:48.548196 kernel: Movable zone start for each node
Oct  2 21:31:48.548200 kernel: Early memory node ranges
Oct  2 21:31:48.548205 kernel:   node   0: [mem 0x0000000000001000-0x0000000000098fff]
Oct  2 21:31:48.548209 kernel:   node   0: [mem 0x0000000000100000-0x000000003fffffff]
Oct  2 21:31:48.548214 kernel:   node   0: [mem 0x0000000040400000-0x00000000825d7fff]
Oct  2 21:31:48.548219 kernel:   node   0: [mem 0x00000000825da000-0x000000008afccfff]
Oct  2 21:31:48.548224 kernel:   node   0: [mem 0x000000008c0b2000-0x000000008c23afff]
Oct  2 21:31:48.548228 kernel:   node   0: [mem 0x000000008eeff000-0x000000008eefffff]
Oct  2 21:31:48.548233 kernel:   node   0: [mem 0x0000000100000000-0x000000086effffff]
Oct  2 21:31:48.548237 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000086effffff]
Oct  2 21:31:48.548242 kernel: On node 0, zone DMA: 1 pages in unavailable ranges
Oct  2 21:31:48.548250 kernel: On node 0, zone DMA: 103 pages in unavailable ranges
Oct  2 21:31:48.548255 kernel: On node 0, zone DMA32: 1024 pages in unavailable ranges
Oct  2 21:31:48.548260 kernel: On node 0, zone DMA32: 2 pages in unavailable ranges
Oct  2 21:31:48.548265 kernel: On node 0, zone DMA32: 4325 pages in unavailable ranges
Oct  2 21:31:48.548271 kernel: On node 0, zone DMA32: 11460 pages in unavailable ranges
Oct  2 21:31:48.548276 kernel: On node 0, zone Normal: 4352 pages in unavailable ranges
Oct  2 21:31:48.548280 kernel: On node 0, zone Normal: 4096 pages in unavailable ranges
Oct  2 21:31:48.548285 kernel: ACPI: PM-Timer IO Port: 0x1808
Oct  2 21:31:48.548290 kernel: ACPI: LAPIC_NMI (acpi_id[0x01] high edge lint[0x1])
Oct  2 21:31:48.548295 kernel: ACPI: LAPIC_NMI (acpi_id[0x02] high edge lint[0x1])
Oct  2 21:31:48.548300 kernel: ACPI: LAPIC_NMI (acpi_id[0x03] high edge lint[0x1])
Oct  2 21:31:48.548305 kernel: ACPI: LAPIC_NMI (acpi_id[0x04] high edge lint[0x1])
Oct  2 21:31:48.548310 kernel: ACPI: LAPIC_NMI (acpi_id[0x05] high edge lint[0x1])
Oct  2 21:31:48.548315 kernel: ACPI: LAPIC_NMI (acpi_id[0x06] high edge lint[0x1])
Oct  2 21:31:48.548320 kernel: ACPI: LAPIC_NMI (acpi_id[0x07] high edge lint[0x1])
Oct  2 21:31:48.548325 kernel: ACPI: LAPIC_NMI (acpi_id[0x08] high edge lint[0x1])
Oct  2 21:31:48.548329 kernel: ACPI: LAPIC_NMI (acpi_id[0x09] high edge lint[0x1])
Oct  2 21:31:48.548334 kernel: ACPI: LAPIC_NMI (acpi_id[0x0a] high edge lint[0x1])
Oct  2 21:31:48.548339 kernel: ACPI: LAPIC_NMI (acpi_id[0x0b] high edge lint[0x1])
Oct  2 21:31:48.548344 kernel: ACPI: LAPIC_NMI (acpi_id[0x0c] high edge lint[0x1])
Oct  2 21:31:48.548350 kernel: ACPI: LAPIC_NMI (acpi_id[0x0d] high edge lint[0x1])
Oct  2 21:31:48.548354 kernel: ACPI: LAPIC_NMI (acpi_id[0x0e] high edge lint[0x1])
Oct  2 21:31:48.548359 kernel: ACPI: LAPIC_NMI (acpi_id[0x0f] high edge lint[0x1])
Oct  2 21:31:48.548364 kernel: ACPI: LAPIC_NMI (acpi_id[0x10] high edge lint[0x1])
Oct  2 21:31:48.548369 kernel: IOAPIC[0]: apic_id 2, version 32, address 0xfec00000, GSI 0-119
Oct  2 21:31:48.548374 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl)
Oct  2 21:31:48.548379 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level)
Oct  2 21:31:48.548383 kernel: ACPI: Using ACPI (MADT) for SMP configuration information
Oct  2 21:31:48.548388 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000
Oct  2 21:31:48.548394 kernel: TSC deadline timer available
Oct  2 21:31:48.548399 kernel: smpboot: Allowing 16 CPUs, 0 hotplug CPUs
Oct  2 21:31:48.548404 kernel: [mem 0x90000000-0xdfffffff] available for PCI devices
Oct  2 21:31:48.548408 kernel: Booting paravirtualized kernel on bare hardware
Oct  2 21:31:48.548413 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns
Oct  2 21:31:48.548418 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:16 nr_node_ids:1
Oct  2 21:31:48.548423 kernel: percpu: Embedded 55 pages/cpu s185624 r8192 d31464 u262144
Oct  2 21:31:48.548428 kernel: pcpu-alloc: s185624 r8192 d31464 u262144 alloc=1*2097152
Oct  2 21:31:48.548434 kernel: pcpu-alloc: [0] 00 01 02 03 04 05 06 07 [0] 08 09 10 11 12 13 14 15 
Oct  2 21:31:48.548441 kernel: Built 1 zonelists, mobility grouping on.  Total pages: 8232415
Oct  2 21:31:48.548465 kernel: Policy zone: Normal
Oct  2 21:31:48.548471 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.first_boot=detected flatcar.oem.id=packet flatcar.autologin verity.usrhash=96b0fdb9f11bf1422adc9955c78c8182df387766badfd0b94e08fb9688739ee1
Oct  2 21:31:48.548476 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space.
Oct  2 21:31:48.548481 kernel: Dentry cache hash table entries: 4194304 (order: 13, 33554432 bytes, linear)
Oct  2 21:31:48.548486 kernel: Inode-cache hash table entries: 2097152 (order: 12, 16777216 bytes, linear)
Oct  2 21:31:48.548504 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off
Oct  2 21:31:48.548511 kernel: Memory: 32724720K/33452980K available (12294K kernel code, 2274K rwdata, 13692K rodata, 45372K init, 4176K bss, 728000K reserved, 0K cma-reserved)
Oct  2 21:31:48.548516 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=16, Nodes=1
Oct  2 21:31:48.548520 kernel: ftrace: allocating 34453 entries in 135 pages
Oct  2 21:31:48.548525 kernel: ftrace: allocated 135 pages with 4 groups
Oct  2 21:31:48.548530 kernel: rcu: Hierarchical RCU implementation.
Oct  2 21:31:48.548535 kernel: rcu:         RCU event tracing is enabled.
Oct  2 21:31:48.548540 kernel: rcu:         RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=16.
Oct  2 21:31:48.548545 kernel:         Rude variant of Tasks RCU enabled.
Oct  2 21:31:48.548550 kernel:         Tracing variant of Tasks RCU enabled.
Oct  2 21:31:48.548556 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies.
Oct  2 21:31:48.548561 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=16
Oct  2 21:31:48.548566 kernel: NR_IRQS: 33024, nr_irqs: 2184, preallocated irqs: 16
Oct  2 21:31:48.548571 kernel: random: crng init done
Oct  2 21:31:48.548575 kernel: Console: colour dummy device 80x25
Oct  2 21:31:48.548580 kernel: printk: console [tty0] enabled
Oct  2 21:31:48.548585 kernel: printk: console [ttyS1] enabled
Oct  2 21:31:48.548590 kernel: ACPI: Core revision 20210730
Oct  2 21:31:48.548595 kernel: hpet: HPET dysfunctional in PC10. Force disabled.
Oct  2 21:31:48.548600 kernel: APIC: Switch to symmetric I/O mode setup
Oct  2 21:31:48.548605 kernel: DMAR: Host address width 39
Oct  2 21:31:48.548610 kernel: DMAR: DRHD base: 0x000000fed91000 flags: 0x1
Oct  2 21:31:48.548615 kernel: DMAR: dmar0: reg_base_addr fed91000 ver 1:0 cap d2008c40660462 ecap f050da
Oct  2 21:31:48.548620 kernel: DMAR: RMRR base: 0x0000008cf18000 end: 0x0000008d161fff
Oct  2 21:31:48.548624 kernel: DMAR-IR: IOAPIC id 2 under DRHD base  0xfed91000 IOMMU 0
Oct  2 21:31:48.548629 kernel: DMAR-IR: HPET id 0 under DRHD base 0xfed91000
Oct  2 21:31:48.548634 kernel: DMAR-IR: Queued invalidation will be enabled to support x2apic and Intr-remapping.
Oct  2 21:31:48.548639 kernel: DMAR-IR: Enabled IRQ remapping in x2apic mode
Oct  2 21:31:48.548644 kernel: x2apic enabled
Oct  2 21:31:48.548650 kernel: Switched APIC routing to cluster x2apic.
Oct  2 21:31:48.548655 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x3101f59f5e6, max_idle_ns: 440795259996 ns
Oct  2 21:31:48.548660 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 6799.81 BogoMIPS (lpj=3399906)
Oct  2 21:31:48.548664 kernel: CPU0: Thermal monitoring enabled (TM1)
Oct  2 21:31:48.548669 kernel: process: using mwait in idle threads
Oct  2 21:31:48.548674 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8
Oct  2 21:31:48.548679 kernel: Last level dTLB entries: 4KB 64, 2MB 0, 4MB 0, 1GB 4
Oct  2 21:31:48.548683 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization
Oct  2 21:31:48.548688 kernel: Spectre V2 : WARNING: Unprivileged eBPF is enabled with eIBRS on, data leaks possible via Spectre v2 BHB attacks!
Oct  2 21:31:48.548694 kernel: Spectre V2 : Mitigation: Enhanced IBRS
Oct  2 21:31:48.548699 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch
Oct  2 21:31:48.548703 kernel: Spectre V2 : Spectre v2 / PBRSB-eIBRS: Retire a single CALL on VMEXIT
Oct  2 21:31:48.548708 kernel: RETBleed: Mitigation: Enhanced IBRS
Oct  2 21:31:48.548713 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier
Oct  2 21:31:48.548718 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp
Oct  2 21:31:48.548722 kernel: TAA: Mitigation: TSX disabled
Oct  2 21:31:48.548727 kernel: MMIO Stale Data: Mitigation: Clear CPU buffers
Oct  2 21:31:48.548732 kernel: SRBDS: Mitigation: Microcode
Oct  2 21:31:48.548737 kernel: GDS: Vulnerable: No microcode
Oct  2 21:31:48.548742 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers'
Oct  2 21:31:48.548747 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers'
Oct  2 21:31:48.548752 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers'
Oct  2 21:31:48.548757 kernel: x86/fpu: Supporting XSAVE feature 0x008: 'MPX bounds registers'
Oct  2 21:31:48.548761 kernel: x86/fpu: Supporting XSAVE feature 0x010: 'MPX CSR'
Oct  2 21:31:48.548766 kernel: x86/fpu: xstate_offset[2]:  576, xstate_sizes[2]:  256
Oct  2 21:31:48.548771 kernel: x86/fpu: xstate_offset[3]:  832, xstate_sizes[3]:   64
Oct  2 21:31:48.548776 kernel: x86/fpu: xstate_offset[4]:  896, xstate_sizes[4]:   64
Oct  2 21:31:48.548780 kernel: x86/fpu: Enabled xstate features 0x1f, context size is 960 bytes, using 'compacted' format.
Oct  2 21:31:48.548785 kernel: Freeing SMP alternatives memory: 32K
Oct  2 21:31:48.548790 kernel: pid_max: default: 32768 minimum: 301
Oct  2 21:31:48.548795 kernel: LSM: Security Framework initializing
Oct  2 21:31:48.548799 kernel: SELinux:  Initializing.
Oct  2 21:31:48.548805 kernel: Mount-cache hash table entries: 65536 (order: 7, 524288 bytes, linear)
Oct  2 21:31:48.548810 kernel: Mountpoint-cache hash table entries: 65536 (order: 7, 524288 bytes, linear)
Oct  2 21:31:48.548815 kernel: smpboot: Estimated ratio of average max frequency by base frequency (times 1024): 1445
Oct  2 21:31:48.548820 kernel: smpboot: CPU0: Intel(R) Xeon(R) E-2278G CPU @ 3.40GHz (family: 0x6, model: 0x9e, stepping: 0xd)
Oct  2 21:31:48.548824 kernel: Performance Events: PEBS fmt3+, Skylake events, 32-deep LBR, full-width counters, Intel PMU driver.
Oct  2 21:31:48.548829 kernel: ... version:                4
Oct  2 21:31:48.548834 kernel: ... bit width:              48
Oct  2 21:31:48.548839 kernel: ... generic registers:      4
Oct  2 21:31:48.548844 kernel: ... value mask:             0000ffffffffffff
Oct  2 21:31:48.548849 kernel: ... max period:             00007fffffffffff
Oct  2 21:31:48.548854 kernel: ... fixed-purpose events:   3
Oct  2 21:31:48.548859 kernel: ... event mask:             000000070000000f
Oct  2 21:31:48.548864 kernel: signal: max sigframe size: 2032
Oct  2 21:31:48.548869 kernel: rcu: Hierarchical SRCU implementation.
Oct  2 21:31:48.548873 kernel: NMI watchdog: Enabled. Permanently consumes one hw-PMU counter.
Oct  2 21:31:48.548878 kernel: smp: Bringing up secondary CPUs ...
Oct  2 21:31:48.548883 kernel: x86: Booting SMP configuration:
Oct  2 21:31:48.548888 kernel: .... node  #0, CPUs:        #1  #2  #3  #4  #5  #6  #7  #8
Oct  2 21:31:48.548893 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details.
Oct  2 21:31:48.548899 kernel:   #9 #10 #11 #12 #13 #14 #15
Oct  2 21:31:48.548904 kernel: smp: Brought up 1 node, 16 CPUs
Oct  2 21:31:48.548908 kernel: smpboot: Max logical packages: 1
Oct  2 21:31:48.548913 kernel: smpboot: Total of 16 processors activated (108796.99 BogoMIPS)
Oct  2 21:31:48.548918 kernel: devtmpfs: initialized
Oct  2 21:31:48.548923 kernel: x86/mm: Memory block size: 128MB
Oct  2 21:31:48.548928 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x825d8000-0x825d8fff] (4096 bytes)
Oct  2 21:31:48.548933 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x8c23b000-0x8c66cfff] (4399104 bytes)
Oct  2 21:31:48.548938 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns
Oct  2 21:31:48.548943 kernel: futex hash table entries: 4096 (order: 6, 262144 bytes, linear)
Oct  2 21:31:48.548948 kernel: pinctrl core: initialized pinctrl subsystem
Oct  2 21:31:48.548953 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family
Oct  2 21:31:48.548958 kernel: audit: initializing netlink subsys (disabled)
Oct  2 21:31:48.548963 kernel: audit: type=2000 audit(1696282302.040:1): state=initialized audit_enabled=0 res=1
Oct  2 21:31:48.548967 kernel: thermal_sys: Registered thermal governor 'step_wise'
Oct  2 21:31:48.548972 kernel: thermal_sys: Registered thermal governor 'user_space'
Oct  2 21:31:48.548977 kernel: cpuidle: using governor menu
Oct  2 21:31:48.548983 kernel: ACPI: bus type PCI registered
Oct  2 21:31:48.548987 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5
Oct  2 21:31:48.548992 kernel: dca service started, version 1.12.1
Oct  2 21:31:48.548997 kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xe0000000-0xefffffff] (base 0xe0000000)
Oct  2 21:31:48.549002 kernel: PCI: MMCONFIG at [mem 0xe0000000-0xefffffff] reserved in E820
Oct  2 21:31:48.549007 kernel: PCI: Using configuration type 1 for base access
Oct  2 21:31:48.549012 kernel: ENERGY_PERF_BIAS: Set to 'normal', was 'performance'
Oct  2 21:31:48.549016 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible.
Oct  2 21:31:48.549021 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages
Oct  2 21:31:48.549027 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages
Oct  2 21:31:48.549032 kernel: ACPI: Added _OSI(Module Device)
Oct  2 21:31:48.549036 kernel: ACPI: Added _OSI(Processor Device)
Oct  2 21:31:48.549041 kernel: ACPI: Added _OSI(3.0 _SCP Extensions)
Oct  2 21:31:48.549046 kernel: ACPI: Added _OSI(Processor Aggregator Device)
Oct  2 21:31:48.549051 kernel: ACPI: Added _OSI(Linux-Dell-Video)
Oct  2 21:31:48.549056 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio)
Oct  2 21:31:48.549061 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics)
Oct  2 21:31:48.549066 kernel: ACPI: 12 ACPI AML tables successfully acquired and loaded
Oct  2 21:31:48.549071 kernel: ACPI: Dynamic OEM Table Load:
Oct  2 21:31:48.549076 kernel: ACPI: SSDT 0xFFFF8EB10020EC00 0000F4 (v02 PmRef  Cpu0Psd  00003000 INTL 20160527)
Oct  2 21:31:48.549081 kernel: ACPI: \_SB_.PR00: _OSC native thermal LVT Acked
Oct  2 21:31:48.549086 kernel: ACPI: Dynamic OEM Table Load:
Oct  2 21:31:48.549091 kernel: ACPI: SSDT 0xFFFF8EB101AE0800 000400 (v02 PmRef  Cpu0Cst  00003001 INTL 20160527)
Oct  2 21:31:48.549095 kernel: ACPI: Dynamic OEM Table Load:
Oct  2 21:31:48.549100 kernel: ACPI: SSDT 0xFFFF8EB101A53000 000683 (v02 PmRef  Cpu0Ist  00003000 INTL 20160527)
Oct  2 21:31:48.549105 kernel: ACPI: Dynamic OEM Table Load:
Oct  2 21:31:48.549110 kernel: ACPI: SSDT 0xFFFF8EB101A57800 0005FC (v02 PmRef  ApIst    00003000 INTL 20160527)
Oct  2 21:31:48.549114 kernel: ACPI: Dynamic OEM Table Load:
Oct  2 21:31:48.549120 kernel: ACPI: SSDT 0xFFFF8EB10014E000 000AB0 (v02 PmRef  ApPsd    00003000 INTL 20160527)
Oct  2 21:31:48.549125 kernel: ACPI: Dynamic OEM Table Load:
Oct  2 21:31:48.549130 kernel: ACPI: SSDT 0xFFFF8EB101AE5800 00030A (v02 PmRef  ApCst    00003000 INTL 20160527)
Oct  2 21:31:48.549134 kernel: ACPI: Interpreter enabled
Oct  2 21:31:48.549139 kernel: ACPI: PM: (supports S0 S5)
Oct  2 21:31:48.549144 kernel: ACPI: Using IOAPIC for interrupt routing
Oct  2 21:31:48.549149 kernel: HEST: Enabling Firmware First mode for corrected errors.
Oct  2 21:31:48.549154 kernel: mce: [Firmware Bug]: Ignoring request to disable invalid MCA bank 14.
Oct  2 21:31:48.549159 kernel: HEST: Table parsing has been initialized.
Oct  2 21:31:48.549165 kernel: GHES: APEI firmware first mode is enabled by APEI bit and WHEA _OSC.
Oct  2 21:31:48.549169 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug
Oct  2 21:31:48.549174 kernel: ACPI: Enabled 9 GPEs in block 00 to 7F
Oct  2 21:31:48.549179 kernel: ACPI: PM: Power Resource [USBC]
Oct  2 21:31:48.549184 kernel: ACPI: PM: Power Resource [V0PR]
Oct  2 21:31:48.549189 kernel: ACPI: PM: Power Resource [V1PR]
Oct  2 21:31:48.549194 kernel: ACPI: PM: Power Resource [V2PR]
Oct  2 21:31:48.549198 kernel: ACPI: PM: Power Resource [WRST]
Oct  2 21:31:48.549203 kernel: ACPI: PM: Power Resource [FN00]
Oct  2 21:31:48.549209 kernel: ACPI: PM: Power Resource [FN01]
Oct  2 21:31:48.549213 kernel: ACPI: PM: Power Resource [FN02]
Oct  2 21:31:48.549218 kernel: ACPI: PM: Power Resource [FN03]
Oct  2 21:31:48.549223 kernel: ACPI: PM: Power Resource [FN04]
Oct  2 21:31:48.549228 kernel: ACPI: PM: Power Resource [PIN]
Oct  2 21:31:48.549233 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-fe])
Oct  2 21:31:48.549296 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3]
Oct  2 21:31:48.549340 kernel: acpi PNP0A08:00: _OSC: platform does not support [AER]
Oct  2 21:31:48.549382 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME PCIeCapability LTR]
Oct  2 21:31:48.549389 kernel: PCI host bridge to bus 0000:00
Oct  2 21:31:48.549431 kernel: pci_bus 0000:00: root bus resource [io  0x0000-0x0cf7 window]
Oct  2 21:31:48.549505 kernel: pci_bus 0000:00: root bus resource [io  0x0d00-0xffff window]
Oct  2 21:31:48.549541 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window]
Oct  2 21:31:48.549577 kernel: pci_bus 0000:00: root bus resource [mem 0x90000000-0xdfffffff window]
Oct  2 21:31:48.549611 kernel: pci_bus 0000:00: root bus resource [mem 0xfc800000-0xfe7fffff window]
Oct  2 21:31:48.549648 kernel: pci_bus 0000:00: root bus resource [bus 00-fe]
Oct  2 21:31:48.549697 kernel: pci 0000:00:00.0: [8086:3e31] type 00 class 0x060000
Oct  2 21:31:48.549745 kernel: pci 0000:00:01.0: [8086:1901] type 01 class 0x060400
Oct  2 21:31:48.549788 kernel: pci 0000:00:01.0: PME# supported from D0 D3hot D3cold
Oct  2 21:31:48.549834 kernel: pci 0000:00:08.0: [8086:1911] type 00 class 0x088000
Oct  2 21:31:48.549875 kernel: pci 0000:00:08.0: reg 0x10: [mem 0x9551f000-0x9551ffff 64bit]
Oct  2 21:31:48.549922 kernel: pci 0000:00:12.0: [8086:a379] type 00 class 0x118000
Oct  2 21:31:48.549963 kernel: pci 0000:00:12.0: reg 0x10: [mem 0x9551e000-0x9551efff 64bit]
Oct  2 21:31:48.550008 kernel: pci 0000:00:14.0: [8086:a36d] type 00 class 0x0c0330
Oct  2 21:31:48.550048 kernel: pci 0000:00:14.0: reg 0x10: [mem 0x95500000-0x9550ffff 64bit]
Oct  2 21:31:48.550090 kernel: pci 0000:00:14.0: PME# supported from D3hot D3cold
Oct  2 21:31:48.550134 kernel: pci 0000:00:14.2: [8086:a36f] type 00 class 0x050000
Oct  2 21:31:48.550177 kernel: pci 0000:00:14.2: reg 0x10: [mem 0x95512000-0x95513fff 64bit]
Oct  2 21:31:48.550217 kernel: pci 0000:00:14.2: reg 0x18: [mem 0x9551d000-0x9551dfff 64bit]
Oct  2 21:31:48.550260 kernel: pci 0000:00:15.0: [8086:a368] type 00 class 0x0c8000
Oct  2 21:31:48.550301 kernel: pci 0000:00:15.0: reg 0x10: [mem 0x00000000-0x00000fff 64bit]
Oct  2 21:31:48.550347 kernel: pci 0000:00:15.1: [8086:a369] type 00 class 0x0c8000
Oct  2 21:31:48.550387 kernel: pci 0000:00:15.1: reg 0x10: [mem 0x00000000-0x00000fff 64bit]
Oct  2 21:31:48.550433 kernel: pci 0000:00:16.0: [8086:a360] type 00 class 0x078000
Oct  2 21:31:48.550516 kernel: pci 0000:00:16.0: reg 0x10: [mem 0x9551a000-0x9551afff 64bit]
Oct  2 21:31:48.550558 kernel: pci 0000:00:16.0: PME# supported from D3hot
Oct  2 21:31:48.550602 kernel: pci 0000:00:16.1: [8086:a361] type 00 class 0x078000
Oct  2 21:31:48.550644 kernel: pci 0000:00:16.1: reg 0x10: [mem 0x95519000-0x95519fff 64bit]
Oct  2 21:31:48.550683 kernel: pci 0000:00:16.1: PME# supported from D3hot
Oct  2 21:31:48.550728 kernel: pci 0000:00:16.4: [8086:a364] type 00 class 0x078000
Oct  2 21:31:48.550770 kernel: pci 0000:00:16.4: reg 0x10: [mem 0x95518000-0x95518fff 64bit]
Oct  2 21:31:48.550809 kernel: pci 0000:00:16.4: PME# supported from D3hot
Oct  2 21:31:48.550854 kernel: pci 0000:00:17.0: [8086:a352] type 00 class 0x010601
Oct  2 21:31:48.550893 kernel: pci 0000:00:17.0: reg 0x10: [mem 0x95510000-0x95511fff]
Oct  2 21:31:48.550933 kernel: pci 0000:00:17.0: reg 0x14: [mem 0x95517000-0x955170ff]
Oct  2 21:31:48.550972 kernel: pci 0000:00:17.0: reg 0x18: [io  0x6050-0x6057]
Oct  2 21:31:48.551012 kernel: pci 0000:00:17.0: reg 0x1c: [io  0x6040-0x6043]
Oct  2 21:31:48.551058 kernel: pci 0000:00:17.0: reg 0x20: [io  0x6020-0x603f]
Oct  2 21:31:48.551099 kernel: pci 0000:00:17.0: reg 0x24: [mem 0x95516000-0x955167ff]
Oct  2 21:31:48.551138 kernel: pci 0000:00:17.0: PME# supported from D3hot
Oct  2 21:31:48.551183 kernel: pci 0000:00:1b.0: [8086:a340] type 01 class 0x060400
Oct  2 21:31:48.551224 kernel: pci 0000:00:1b.0: PME# supported from D0 D3hot D3cold
Oct  2 21:31:48.551271 kernel: pci 0000:00:1b.4: [8086:a32c] type 01 class 0x060400
Oct  2 21:31:48.551314 kernel: pci 0000:00:1b.4: PME# supported from D0 D3hot D3cold
Oct  2 21:31:48.551361 kernel: pci 0000:00:1b.5: [8086:a32d] type 01 class 0x060400
Oct  2 21:31:48.551403 kernel: pci 0000:00:1b.5: PME# supported from D0 D3hot D3cold
Oct  2 21:31:48.551465 kernel: pci 0000:00:1c.0: [8086:a338] type 01 class 0x060400
Oct  2 21:31:48.551519 kernel: pci 0000:00:1c.0: PME# supported from D0 D3hot D3cold
Oct  2 21:31:48.551564 kernel: pci 0000:00:1c.3: [8086:a33b] type 01 class 0x060400
Oct  2 21:31:48.551607 kernel: pci 0000:00:1c.3: PME# supported from D0 D3hot D3cold
Oct  2 21:31:48.551651 kernel: pci 0000:00:1e.0: [8086:a328] type 00 class 0x078000
Oct  2 21:31:48.551692 kernel: pci 0000:00:1e.0: reg 0x10: [mem 0x00000000-0x00000fff 64bit]
Oct  2 21:31:48.551738 kernel: pci 0000:00:1f.0: [8086:a309] type 00 class 0x060100
Oct  2 21:31:48.551784 kernel: pci 0000:00:1f.4: [8086:a323] type 00 class 0x0c0500
Oct  2 21:31:48.551824 kernel: pci 0000:00:1f.4: reg 0x10: [mem 0x95514000-0x955140ff 64bit]
Oct  2 21:31:48.551865 kernel: pci 0000:00:1f.4: reg 0x20: [io  0xefa0-0xefbf]
Oct  2 21:31:48.551910 kernel: pci 0000:00:1f.5: [8086:a324] type 00 class 0x0c8000
Oct  2 21:31:48.551951 kernel: pci 0000:00:1f.5: reg 0x10: [mem 0xfe010000-0xfe010fff]
Oct  2 21:31:48.551998 kernel: pci 0000:01:00.0: [15b3:1015] type 00 class 0x020000
Oct  2 21:31:48.552043 kernel: pci 0000:01:00.0: reg 0x10: [mem 0x92000000-0x93ffffff 64bit pref]
Oct  2 21:31:48.552085 kernel: pci 0000:01:00.0: reg 0x30: [mem 0x95200000-0x952fffff pref]
Oct  2 21:31:48.552127 kernel: pci 0000:01:00.0: PME# supported from D3cold
Oct  2 21:31:48.552169 kernel: pci 0000:01:00.0: reg 0x1a4: [mem 0x00000000-0x000fffff 64bit pref]
Oct  2 21:31:48.552211 kernel: pci 0000:01:00.0: VF(n) BAR0 space: [mem 0x00000000-0x007fffff 64bit pref] (contains BAR0 for 8 VFs)
Oct  2 21:31:48.552258 kernel: pci 0000:01:00.1: [15b3:1015] type 00 class 0x020000
Oct  2 21:31:48.552300 kernel: pci 0000:01:00.1: reg 0x10: [mem 0x90000000-0x91ffffff 64bit pref]
Oct  2 21:31:48.552344 kernel: pci 0000:01:00.1: reg 0x30: [mem 0x95100000-0x951fffff pref]
Oct  2 21:31:48.552385 kernel: pci 0000:01:00.1: PME# supported from D3cold
Oct  2 21:31:48.552427 kernel: pci 0000:01:00.1: reg 0x1a4: [mem 0x00000000-0x000fffff 64bit pref]
Oct  2 21:31:48.552513 kernel: pci 0000:01:00.1: VF(n) BAR0 space: [mem 0x00000000-0x007fffff 64bit pref] (contains BAR0 for 8 VFs)
Oct  2 21:31:48.552555 kernel: pci 0000:00:01.0: PCI bridge to [bus 01]
Oct  2 21:31:48.552595 kernel: pci 0000:00:01.0:   bridge window [mem 0x95100000-0x952fffff]
Oct  2 21:31:48.552636 kernel: pci 0000:00:01.0:   bridge window [mem 0x90000000-0x93ffffff 64bit pref]
Oct  2 21:31:48.552675 kernel: pci 0000:00:1b.0: PCI bridge to [bus 02]
Oct  2 21:31:48.552724 kernel: pci 0000:03:00.0: [8086:1533] type 00 class 0x020000
Oct  2 21:31:48.552766 kernel: pci 0000:03:00.0: reg 0x10: [mem 0x95400000-0x9547ffff]
Oct  2 21:31:48.552809 kernel: pci 0000:03:00.0: reg 0x18: [io  0x5000-0x501f]
Oct  2 21:31:48.552851 kernel: pci 0000:03:00.0: reg 0x1c: [mem 0x95480000-0x95483fff]
Oct  2 21:31:48.552893 kernel: pci 0000:03:00.0: PME# supported from D0 D3hot D3cold
Oct  2 21:31:48.552935 kernel: pci 0000:00:1b.4: PCI bridge to [bus 03]
Oct  2 21:31:48.552975 kernel: pci 0000:00:1b.4:   bridge window [io  0x5000-0x5fff]
Oct  2 21:31:48.553018 kernel: pci 0000:00:1b.4:   bridge window [mem 0x95400000-0x954fffff]
Oct  2 21:31:48.553063 kernel: pci 0000:04:00.0: [8086:1533] type 00 class 0x020000
Oct  2 21:31:48.553106 kernel: pci 0000:04:00.0: reg 0x10: [mem 0x95300000-0x9537ffff]
Oct  2 21:31:48.553147 kernel: pci 0000:04:00.0: reg 0x18: [io  0x4000-0x401f]
Oct  2 21:31:48.553224 kernel: pci 0000:04:00.0: reg 0x1c: [mem 0x95380000-0x95383fff]
Oct  2 21:31:48.553286 kernel: pci 0000:04:00.0: PME# supported from D0 D3hot D3cold
Oct  2 21:31:48.553328 kernel: pci 0000:00:1b.5: PCI bridge to [bus 04]
Oct  2 21:31:48.553368 kernel: pci 0000:00:1b.5:   bridge window [io  0x4000-0x4fff]
Oct  2 21:31:48.553410 kernel: pci 0000:00:1b.5:   bridge window [mem 0x95300000-0x953fffff]
Oct  2 21:31:48.553478 kernel: pci 0000:00:1c.0: PCI bridge to [bus 05]
Oct  2 21:31:48.553543 kernel: pci 0000:06:00.0: [1a03:1150] type 01 class 0x060400
Oct  2 21:31:48.553586 kernel: pci 0000:06:00.0: enabling Extended Tags
Oct  2 21:31:48.553628 kernel: pci 0000:06:00.0: supports D1 D2
Oct  2 21:31:48.553671 kernel: pci 0000:06:00.0: PME# supported from D0 D1 D2 D3hot D3cold
Oct  2 21:31:48.553712 kernel: pci 0000:00:1c.3: PCI bridge to [bus 06-07]
Oct  2 21:31:48.553754 kernel: pci 0000:00:1c.3:   bridge window [io  0x3000-0x3fff]
Oct  2 21:31:48.553797 kernel: pci 0000:00:1c.3:   bridge window [mem 0x94000000-0x950fffff]
Oct  2 21:31:48.553844 kernel: pci_bus 0000:07: extended config space not accessible
Oct  2 21:31:48.553891 kernel: pci 0000:07:00.0: [1a03:2000] type 00 class 0x030000
Oct  2 21:31:48.553936 kernel: pci 0000:07:00.0: reg 0x10: [mem 0x94000000-0x94ffffff]
Oct  2 21:31:48.553980 kernel: pci 0000:07:00.0: reg 0x14: [mem 0x95000000-0x9501ffff]
Oct  2 21:31:48.554025 kernel: pci 0000:07:00.0: reg 0x18: [io  0x3000-0x307f]
Oct  2 21:31:48.554068 kernel: pci 0000:07:00.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff]
Oct  2 21:31:48.554114 kernel: pci 0000:07:00.0: supports D1 D2
Oct  2 21:31:48.554158 kernel: pci 0000:07:00.0: PME# supported from D0 D1 D2 D3hot D3cold
Oct  2 21:31:48.554201 kernel: pci 0000:06:00.0: PCI bridge to [bus 07]
Oct  2 21:31:48.554242 kernel: pci 0000:06:00.0:   bridge window [io  0x3000-0x3fff]
Oct  2 21:31:48.554284 kernel: pci 0000:06:00.0:   bridge window [mem 0x94000000-0x950fffff]
Oct  2 21:31:48.554291 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 0
Oct  2 21:31:48.554297 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 1
Oct  2 21:31:48.554303 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 0
Oct  2 21:31:48.554308 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 0
Oct  2 21:31:48.554314 kernel: ACPI: PCI: Interrupt link LNKE configured for IRQ 0
Oct  2 21:31:48.554319 kernel: ACPI: PCI: Interrupt link LNKF configured for IRQ 0
Oct  2 21:31:48.554324 kernel: ACPI: PCI: Interrupt link LNKG configured for IRQ 0
Oct  2 21:31:48.554329 kernel: ACPI: PCI: Interrupt link LNKH configured for IRQ 0
Oct  2 21:31:48.554334 kernel: iommu: Default domain type: Translated 
Oct  2 21:31:48.554339 kernel: iommu: DMA domain TLB invalidation policy: lazy mode 
Oct  2 21:31:48.554383 kernel: pci 0000:07:00.0: vgaarb: setting as boot VGA device
Oct  2 21:31:48.554427 kernel: pci 0000:07:00.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none
Oct  2 21:31:48.554520 kernel: pci 0000:07:00.0: vgaarb: bridge control possible
Oct  2 21:31:48.554528 kernel: vgaarb: loaded
Oct  2 21:31:48.554533 kernel: pps_core: LinuxPPS API ver. 1 registered
Oct  2 21:31:48.554539 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti <giometti@linux.it>
Oct  2 21:31:48.554544 kernel: PTP clock support registered
Oct  2 21:31:48.554549 kernel: PCI: Using ACPI for IRQ routing
Oct  2 21:31:48.554555 kernel: PCI: pci_cache_line_size set to 64 bytes
Oct  2 21:31:48.554560 kernel: e820: reserve RAM buffer [mem 0x00099800-0x0009ffff]
Oct  2 21:31:48.554566 kernel: e820: reserve RAM buffer [mem 0x825d8000-0x83ffffff]
Oct  2 21:31:48.554571 kernel: e820: reserve RAM buffer [mem 0x8afcd000-0x8bffffff]
Oct  2 21:31:48.554576 kernel: e820: reserve RAM buffer [mem 0x8c23b000-0x8fffffff]
Oct  2 21:31:48.554581 kernel: e820: reserve RAM buffer [mem 0x8ef00000-0x8fffffff]
Oct  2 21:31:48.554586 kernel: e820: reserve RAM buffer [mem 0x86f000000-0x86fffffff]
Oct  2 21:31:48.554591 kernel: clocksource: Switched to clocksource tsc-early
Oct  2 21:31:48.554597 kernel: VFS: Disk quotas dquot_6.6.0
Oct  2 21:31:48.554602 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes)
Oct  2 21:31:48.554607 kernel: pnp: PnP ACPI init
Oct  2 21:31:48.554651 kernel: system 00:00: [mem 0x40000000-0x403fffff] has been reserved
Oct  2 21:31:48.554693 kernel: pnp 00:02: [dma 0 disabled]
Oct  2 21:31:48.554732 kernel: pnp 00:03: [dma 0 disabled]
Oct  2 21:31:48.554774 kernel: system 00:04: [io  0x0680-0x069f] has been reserved
Oct  2 21:31:48.554811 kernel: system 00:04: [io  0x164e-0x164f] has been reserved
Oct  2 21:31:48.554851 kernel: system 00:05: [io  0x1854-0x1857] has been reserved
Oct  2 21:31:48.554892 kernel: system 00:06: [mem 0xfed10000-0xfed17fff] has been reserved
Oct  2 21:31:48.554928 kernel: system 00:06: [mem 0xfed18000-0xfed18fff] has been reserved
Oct  2 21:31:48.554967 kernel: system 00:06: [mem 0xfed19000-0xfed19fff] has been reserved
Oct  2 21:31:48.555003 kernel: system 00:06: [mem 0xe0000000-0xefffffff] has been reserved
Oct  2 21:31:48.555038 kernel: system 00:06: [mem 0xfed20000-0xfed3ffff] has been reserved
Oct  2 21:31:48.555074 kernel: system 00:06: [mem 0xfed90000-0xfed93fff] could not be reserved
Oct  2 21:31:48.555111 kernel: system 00:06: [mem 0xfed45000-0xfed8ffff] has been reserved
Oct  2 21:31:48.555148 kernel: system 00:06: [mem 0xfee00000-0xfeefffff] could not be reserved
Oct  2 21:31:48.555188 kernel: system 00:07: [io  0x1800-0x18fe] could not be reserved
Oct  2 21:31:48.555225 kernel: system 00:07: [mem 0xfd000000-0xfd69ffff] has been reserved
Oct  2 21:31:48.555261 kernel: system 00:07: [mem 0xfd6c0000-0xfd6cffff] has been reserved
Oct  2 21:31:48.555297 kernel: system 00:07: [mem 0xfd6f0000-0xfdffffff] has been reserved
Oct  2 21:31:48.555333 kernel: system 00:07: [mem 0xfe000000-0xfe01ffff] could not be reserved
Oct  2 21:31:48.555369 kernel: system 00:07: [mem 0xfe200000-0xfe7fffff] has been reserved
Oct  2 21:31:48.555406 kernel: system 00:07: [mem 0xff000000-0xffffffff] has been reserved
Oct  2 21:31:48.555473 kernel: system 00:08: [io  0x2000-0x20fe] has been reserved
Oct  2 21:31:48.555481 kernel: pnp: PnP ACPI: found 10 devices
Oct  2 21:31:48.555487 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns
Oct  2 21:31:48.555512 kernel: NET: Registered PF_INET protocol family
Oct  2 21:31:48.555517 kernel: IP idents hash table entries: 262144 (order: 9, 2097152 bytes, linear)
Oct  2 21:31:48.555522 kernel: tcp_listen_portaddr_hash hash table entries: 16384 (order: 6, 262144 bytes, linear)
Oct  2 21:31:48.555527 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear)
Oct  2 21:31:48.555534 kernel: TCP established hash table entries: 262144 (order: 9, 2097152 bytes, linear)
Oct  2 21:31:48.555539 kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear)
Oct  2 21:31:48.555545 kernel: TCP: Hash tables configured (established 262144 bind 65536)
Oct  2 21:31:48.555550 kernel: UDP hash table entries: 16384 (order: 7, 524288 bytes, linear)
Oct  2 21:31:48.555555 kernel: UDP-Lite hash table entries: 16384 (order: 7, 524288 bytes, linear)
Oct  2 21:31:48.555560 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family
Oct  2 21:31:48.555565 kernel: NET: Registered PF_XDP protocol family
Oct  2 21:31:48.555607 kernel: pci 0000:00:15.0: BAR 0: assigned [mem 0x95515000-0x95515fff 64bit]
Oct  2 21:31:48.555649 kernel: pci 0000:00:15.1: BAR 0: assigned [mem 0x9551b000-0x9551bfff 64bit]
Oct  2 21:31:48.555690 kernel: pci 0000:00:1e.0: BAR 0: assigned [mem 0x9551c000-0x9551cfff 64bit]
Oct  2 21:31:48.555733 kernel: pci 0000:01:00.0: BAR 7: no space for [mem size 0x00800000 64bit pref]
Oct  2 21:31:48.555777 kernel: pci 0000:01:00.0: BAR 7: failed to assign [mem size 0x00800000 64bit pref]
Oct  2 21:31:48.555819 kernel: pci 0000:01:00.1: BAR 7: no space for [mem size 0x00800000 64bit pref]
Oct  2 21:31:48.555862 kernel: pci 0000:01:00.1: BAR 7: failed to assign [mem size 0x00800000 64bit pref]
Oct  2 21:31:48.555902 kernel: pci 0000:00:01.0: PCI bridge to [bus 01]
Oct  2 21:31:48.555943 kernel: pci 0000:00:01.0:   bridge window [mem 0x95100000-0x952fffff]
Oct  2 21:31:48.555985 kernel: pci 0000:00:01.0:   bridge window [mem 0x90000000-0x93ffffff 64bit pref]
Oct  2 21:31:48.556026 kernel: pci 0000:00:1b.0: PCI bridge to [bus 02]
Oct  2 21:31:48.556066 kernel: pci 0000:00:1b.4: PCI bridge to [bus 03]
Oct  2 21:31:48.556107 kernel: pci 0000:00:1b.4:   bridge window [io  0x5000-0x5fff]
Oct  2 21:31:48.556148 kernel: pci 0000:00:1b.4:   bridge window [mem 0x95400000-0x954fffff]
Oct  2 21:31:48.556191 kernel: pci 0000:00:1b.5: PCI bridge to [bus 04]
Oct  2 21:31:48.556232 kernel: pci 0000:00:1b.5:   bridge window [io  0x4000-0x4fff]
Oct  2 21:31:48.556273 kernel: pci 0000:00:1b.5:   bridge window [mem 0x95300000-0x953fffff]
Oct  2 21:31:48.556313 kernel: pci 0000:00:1c.0: PCI bridge to [bus 05]
Oct  2 21:31:48.556355 kernel: pci 0000:06:00.0: PCI bridge to [bus 07]
Oct  2 21:31:48.556398 kernel: pci 0000:06:00.0:   bridge window [io  0x3000-0x3fff]
Oct  2 21:31:48.556442 kernel: pci 0000:06:00.0:   bridge window [mem 0x94000000-0x950fffff]
Oct  2 21:31:48.556527 kernel: pci 0000:00:1c.3: PCI bridge to [bus 06-07]
Oct  2 21:31:48.556571 kernel: pci 0000:00:1c.3:   bridge window [io  0x3000-0x3fff]
Oct  2 21:31:48.556612 kernel: pci 0000:00:1c.3:   bridge window [mem 0x94000000-0x950fffff]
Oct  2 21:31:48.556649 kernel: pci_bus 0000:00: Some PCI device resources are unassigned, try booting with pci=realloc
Oct  2 21:31:48.556684 kernel: pci_bus 0000:00: resource 4 [io  0x0000-0x0cf7 window]
Oct  2 21:31:48.556720 kernel: pci_bus 0000:00: resource 5 [io  0x0d00-0xffff window]
Oct  2 21:31:48.556755 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window]
Oct  2 21:31:48.556790 kernel: pci_bus 0000:00: resource 7 [mem 0x90000000-0xdfffffff window]
Oct  2 21:31:48.556825 kernel: pci_bus 0000:00: resource 8 [mem 0xfc800000-0xfe7fffff window]
Oct  2 21:31:48.556867 kernel: pci_bus 0000:01: resource 1 [mem 0x95100000-0x952fffff]
Oct  2 21:31:48.556908 kernel: pci_bus 0000:01: resource 2 [mem 0x90000000-0x93ffffff 64bit pref]
Oct  2 21:31:48.556954 kernel: pci_bus 0000:03: resource 0 [io  0x5000-0x5fff]
Oct  2 21:31:48.556993 kernel: pci_bus 0000:03: resource 1 [mem 0x95400000-0x954fffff]
Oct  2 21:31:48.557034 kernel: pci_bus 0000:04: resource 0 [io  0x4000-0x4fff]
Oct  2 21:31:48.557072 kernel: pci_bus 0000:04: resource 1 [mem 0x95300000-0x953fffff]
Oct  2 21:31:48.557113 kernel: pci_bus 0000:06: resource 0 [io  0x3000-0x3fff]
Oct  2 21:31:48.557152 kernel: pci_bus 0000:06: resource 1 [mem 0x94000000-0x950fffff]
Oct  2 21:31:48.557193 kernel: pci_bus 0000:07: resource 0 [io  0x3000-0x3fff]
Oct  2 21:31:48.557232 kernel: pci_bus 0000:07: resource 1 [mem 0x94000000-0x950fffff]
Oct  2 21:31:48.557239 kernel: PCI: CLS 64 bytes, default 64
Oct  2 21:31:48.557244 kernel: DMAR: No ATSR found
Oct  2 21:31:48.557250 kernel: DMAR: No SATC found
Oct  2 21:31:48.557255 kernel: DMAR: dmar0: Using Queued invalidation
Oct  2 21:31:48.557295 kernel: pci 0000:00:00.0: Adding to iommu group 0
Oct  2 21:31:48.557339 kernel: pci 0000:00:01.0: Adding to iommu group 1
Oct  2 21:31:48.557381 kernel: pci 0000:00:08.0: Adding to iommu group 2
Oct  2 21:31:48.557421 kernel: pci 0000:00:12.0: Adding to iommu group 3
Oct  2 21:31:48.557489 kernel: pci 0000:00:14.0: Adding to iommu group 4
Oct  2 21:31:48.557550 kernel: pci 0000:00:14.2: Adding to iommu group 4
Oct  2 21:31:48.557590 kernel: pci 0000:00:15.0: Adding to iommu group 5
Oct  2 21:31:48.557632 kernel: pci 0000:00:15.1: Adding to iommu group 5
Oct  2 21:31:48.557672 kernel: pci 0000:00:16.0: Adding to iommu group 6
Oct  2 21:31:48.557715 kernel: pci 0000:00:16.1: Adding to iommu group 6
Oct  2 21:31:48.557756 kernel: pci 0000:00:16.4: Adding to iommu group 6
Oct  2 21:31:48.557796 kernel: pci 0000:00:17.0: Adding to iommu group 7
Oct  2 21:31:48.557839 kernel: pci 0000:00:1b.0: Adding to iommu group 8
Oct  2 21:31:48.557879 kernel: pci 0000:00:1b.4: Adding to iommu group 9
Oct  2 21:31:48.557920 kernel: pci 0000:00:1b.5: Adding to iommu group 10
Oct  2 21:31:48.557960 kernel: pci 0000:00:1c.0: Adding to iommu group 11
Oct  2 21:31:48.558001 kernel: pci 0000:00:1c.3: Adding to iommu group 12
Oct  2 21:31:48.558042 kernel: pci 0000:00:1e.0: Adding to iommu group 13
Oct  2 21:31:48.558083 kernel: pci 0000:00:1f.0: Adding to iommu group 14
Oct  2 21:31:48.558124 kernel: pci 0000:00:1f.4: Adding to iommu group 14
Oct  2 21:31:48.558164 kernel: pci 0000:00:1f.5: Adding to iommu group 14
Oct  2 21:31:48.558207 kernel: pci 0000:01:00.0: Adding to iommu group 1
Oct  2 21:31:48.558249 kernel: pci 0000:01:00.1: Adding to iommu group 1
Oct  2 21:31:48.558291 kernel: pci 0000:03:00.0: Adding to iommu group 15
Oct  2 21:31:48.558333 kernel: pci 0000:04:00.0: Adding to iommu group 16
Oct  2 21:31:48.558378 kernel: pci 0000:06:00.0: Adding to iommu group 17
Oct  2 21:31:48.558422 kernel: pci 0000:07:00.0: Adding to iommu group 17
Oct  2 21:31:48.558430 kernel: DMAR: Intel(R) Virtualization Technology for Directed I/O
Oct  2 21:31:48.558435 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB)
Oct  2 21:31:48.558444 kernel: software IO TLB: mapped [mem 0x0000000086fcd000-0x000000008afcd000] (64MB)
Oct  2 21:31:48.558474 kernel: RAPL PMU: API unit is 2^-32 Joules, 3 fixed counters, 655360 ms ovfl timer
Oct  2 21:31:48.558479 kernel: RAPL PMU: hw unit of domain pp0-core 2^-14 Joules
Oct  2 21:31:48.558485 kernel: RAPL PMU: hw unit of domain package 2^-14 Joules
Oct  2 21:31:48.558509 kernel: RAPL PMU: hw unit of domain dram 2^-14 Joules
Oct  2 21:31:48.558556 kernel: platform rtc_cmos: registered platform RTC device (no PNP device found)
Oct  2 21:31:48.558565 kernel: Initialise system trusted keyrings
Oct  2 21:31:48.558570 kernel: workingset: timestamp_bits=39 max_order=23 bucket_order=0
Oct  2 21:31:48.558575 kernel: Key type asymmetric registered
Oct  2 21:31:48.558580 kernel: Asymmetric key parser 'x509' registered
Oct  2 21:31:48.558585 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249)
Oct  2 21:31:48.558590 kernel: io scheduler mq-deadline registered
Oct  2 21:31:48.558597 kernel: io scheduler kyber registered
Oct  2 21:31:48.558602 kernel: io scheduler bfq registered
Oct  2 21:31:48.558642 kernel: pcieport 0000:00:01.0: PME: Signaling with IRQ 121
Oct  2 21:31:48.558685 kernel: pcieport 0000:00:1b.0: PME: Signaling with IRQ 122
Oct  2 21:31:48.558726 kernel: pcieport 0000:00:1b.4: PME: Signaling with IRQ 123
Oct  2 21:31:48.558767 kernel: pcieport 0000:00:1b.5: PME: Signaling with IRQ 124
Oct  2 21:31:48.558809 kernel: pcieport 0000:00:1c.0: PME: Signaling with IRQ 125
Oct  2 21:31:48.558849 kernel: pcieport 0000:00:1c.3: PME: Signaling with IRQ 126
Oct  2 21:31:48.558896 kernel: thermal LNXTHERM:00: registered as thermal_zone0
Oct  2 21:31:48.558904 kernel: ACPI: thermal: Thermal Zone [TZ00] (28 C)
Oct  2 21:31:48.558910 kernel: ERST: Error Record Serialization Table (ERST) support is initialized.
Oct  2 21:31:48.558915 kernel: pstore: Registered erst as persistent store backend
Oct  2 21:31:48.558920 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00
Oct  2 21:31:48.558925 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled
Oct  2 21:31:48.558930 kernel: 00:02: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A
Oct  2 21:31:48.558936 kernel: 00:03: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A
Oct  2 21:31:48.558942 kernel: hpet_acpi_add: no address or irqs in _CRS
Oct  2 21:31:48.558985 kernel: tpm_tis MSFT0101:00: 2.0 TPM (device-id 0x1B, rev-id 16)
Oct  2 21:31:48.558993 kernel: i8042: PNP: No PS/2 controller found.
Oct  2 21:31:48.559029 kernel: rtc_cmos rtc_cmos: RTC can wake from S4
Oct  2 21:31:48.559067 kernel: rtc_cmos rtc_cmos: registered as rtc0
Oct  2 21:31:48.559105 kernel: rtc_cmos rtc_cmos: setting system clock to 2023-10-02T21:31:47 UTC (1696282307)
Oct  2 21:31:48.559142 kernel: rtc_cmos rtc_cmos: alarms up to one month, y3k, 114 bytes nvram
Oct  2 21:31:48.559149 kernel: fail to initialize ptp_kvm
Oct  2 21:31:48.559155 kernel: intel_pstate: Intel P-state driver initializing
Oct  2 21:31:48.559161 kernel: intel_pstate: Disabling energy efficiency optimization
Oct  2 21:31:48.559166 kernel: intel_pstate: HWP enabled
Oct  2 21:31:48.559171 kernel: vesafb: mode is 1024x768x8, linelength=1024, pages=0
Oct  2 21:31:48.559176 kernel: vesafb: scrolling: redraw
Oct  2 21:31:48.559181 kernel: vesafb: Pseudocolor: size=0:8:8:8, shift=0:0:0:0
Oct  2 21:31:48.559187 kernel: vesafb: framebuffer at 0x94000000, mapped to 0x00000000ee2ab89e, using 768k, total 768k
Oct  2 21:31:48.559192 kernel: Console: switching to colour frame buffer device 128x48
Oct  2 21:31:48.559197 kernel: fb0: VESA VGA frame buffer device
Oct  2 21:31:48.559203 kernel: NET: Registered PF_INET6 protocol family
Oct  2 21:31:48.559208 kernel: Segment Routing with IPv6
Oct  2 21:31:48.559213 kernel: In-situ OAM (IOAM) with IPv6
Oct  2 21:31:48.559219 kernel: NET: Registered PF_PACKET protocol family
Oct  2 21:31:48.559224 kernel: Key type dns_resolver registered
Oct  2 21:31:48.559229 kernel: microcode: sig=0x906ed, pf=0x2, revision=0xf4
Oct  2 21:31:48.559234 kernel: microcode: Microcode Update Driver: v2.2.
Oct  2 21:31:48.559239 kernel: IPI shorthand broadcast: enabled
Oct  2 21:31:48.559244 kernel: sched_clock: Marking stable (1680557824, 1338912495)->(4436849777, -1417379458)
Oct  2 21:31:48.559250 kernel: registered taskstats version 1
Oct  2 21:31:48.559255 kernel: Loading compiled-in X.509 certificates
Oct  2 21:31:48.559261 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.132-flatcar: 6f9e51af8b3ef67eb6e93ecfe77d55665ad3d861'
Oct  2 21:31:48.559266 kernel: Key type .fscrypt registered
Oct  2 21:31:48.559271 kernel: Key type fscrypt-provisioning registered
Oct  2 21:31:48.559276 kernel: pstore: Using crash dump compression: deflate
Oct  2 21:31:48.559281 kernel: ima: Allocated hash algorithm: sha1
Oct  2 21:31:48.559286 kernel: ima: No architecture policies found
Oct  2 21:31:48.559291 kernel: Freeing unused kernel image (initmem) memory: 45372K
Oct  2 21:31:48.559297 kernel: Write protecting the kernel read-only data: 28672k
Oct  2 21:31:48.559302 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K
Oct  2 21:31:48.559308 kernel: Freeing unused kernel image (rodata/data gap) memory: 644K
Oct  2 21:31:48.559313 kernel: Run /init as init process
Oct  2 21:31:48.559318 kernel:   with arguments:
Oct  2 21:31:48.559323 kernel:     /init
Oct  2 21:31:48.559328 kernel:   with environment:
Oct  2 21:31:48.559333 kernel:     HOME=/
Oct  2 21:31:48.559339 kernel:     TERM=linux
Oct  2 21:31:48.559344 kernel:     BOOT_IMAGE=/flatcar/vmlinuz-a
Oct  2 21:31:48.559350 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified)
Oct  2 21:31:48.559357 systemd[1]: Detected architecture x86-64.
Oct  2 21:31:48.559363 systemd[1]: Running in initrd.
Oct  2 21:31:48.559368 systemd[1]: No hostname configured, using default hostname.
Oct  2 21:31:48.559373 systemd[1]: Hostname set to <localhost>.
Oct  2 21:31:48.559378 systemd[1]: Initializing machine ID from random generator.
Oct  2 21:31:48.559385 systemd[1]: Queued start job for default target initrd.target.
Oct  2 21:31:48.559390 systemd[1]: Started systemd-ask-password-console.path.
Oct  2 21:31:48.559396 systemd[1]: Reached target cryptsetup.target.
Oct  2 21:31:48.559401 systemd[1]: Reached target paths.target.
Oct  2 21:31:48.559406 systemd[1]: Reached target slices.target.
Oct  2 21:31:48.559411 systemd[1]: Reached target swap.target.
Oct  2 21:31:48.559416 systemd[1]: Reached target timers.target.
Oct  2 21:31:48.559422 systemd[1]: Listening on iscsid.socket.
Oct  2 21:31:48.559428 systemd[1]: Listening on iscsiuio.socket.
Oct  2 21:31:48.559434 systemd[1]: Listening on systemd-journald-audit.socket.
Oct  2 21:31:48.559441 systemd[1]: Listening on systemd-journald-dev-log.socket.
Oct  2 21:31:48.559468 systemd[1]: Listening on systemd-journald.socket.
Oct  2 21:31:48.559474 kernel: tsc: Refined TSC clocksource calibration: 3407.999 MHz
Oct  2 21:31:48.559479 systemd[1]: Listening on systemd-networkd.socket.
Oct  2 21:31:48.559485 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x311fd336761, max_idle_ns: 440795243819 ns
Oct  2 21:31:48.559510 kernel: clocksource: Switched to clocksource tsc
Oct  2 21:31:48.559516 systemd[1]: Listening on systemd-udevd-control.socket.
Oct  2 21:31:48.559521 systemd[1]: Listening on systemd-udevd-kernel.socket.
Oct  2 21:31:48.559527 systemd[1]: Reached target sockets.target.
Oct  2 21:31:48.559532 systemd[1]: Starting kmod-static-nodes.service...
Oct  2 21:31:48.559537 systemd[1]: Finished network-cleanup.service.
Oct  2 21:31:48.559543 systemd[1]: Starting systemd-fsck-usr.service...
Oct  2 21:31:48.559548 systemd[1]: Starting systemd-journald.service...
Oct  2 21:31:48.559553 systemd[1]: Starting systemd-modules-load.service...
Oct  2 21:31:48.559561 systemd-journald[267]: Journal started
Oct  2 21:31:48.559587 systemd-journald[267]: Runtime Journal (/run/log/journal/bda1a58c5e9546b29ec22ac412bea195) is 8.0M, max 640.1M, 632.1M free.
Oct  2 21:31:48.562048 systemd-modules-load[268]: Inserted module 'overlay'
Oct  2 21:31:48.567000 audit: BPF prog-id=6 op=LOAD
Oct  2 21:31:48.586445 kernel: audit: type=1334 audit(1696282308.567:2): prog-id=6 op=LOAD
Oct  2 21:31:48.586460 systemd[1]: Starting systemd-resolved.service...
Oct  2 21:31:48.635444 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this.
Oct  2 21:31:48.635460 systemd[1]: Starting systemd-vconsole-setup.service...
Oct  2 21:31:48.667477 kernel: Bridge firewalling registered
Oct  2 21:31:48.667510 systemd[1]: Started systemd-journald.service.
Oct  2 21:31:48.682371 systemd-modules-load[268]: Inserted module 'br_netfilter'
Oct  2 21:31:48.689000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:31:48.688258 systemd-resolved[271]: Positive Trust Anchors:
Oct  2 21:31:48.787523 kernel: audit: type=1130 audit(1696282308.689:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:31:48.787533 kernel: SCSI subsystem initialized
Oct  2 21:31:48.787541 kernel: audit: type=1130 audit(1696282308.741:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:31:48.741000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:31:48.688263 systemd-resolved[271]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d
Oct  2 21:31:48.888541 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log.
Oct  2 21:31:48.888555 kernel: audit: type=1130 audit(1696282308.812:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:31:48.888563 kernel: device-mapper: uevent: version 1.0.3
Oct  2 21:31:48.888570 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com
Oct  2 21:31:48.812000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:31:48.688282 systemd-resolved[271]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test
Oct  2 21:31:48.979672 kernel: audit: type=1130 audit(1696282308.913:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:31:48.913000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:31:48.689944 systemd-resolved[271]: Defaulting to hostname 'linux'.
Oct  2 21:31:48.987000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:31:48.690638 systemd[1]: Started systemd-resolved.service.
Oct  2 21:31:49.089897 kernel: audit: type=1130 audit(1696282308.987:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:31:49.089911 kernel: audit: type=1130 audit(1696282309.042:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:31:49.042000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:31:48.742608 systemd[1]: Finished kmod-static-nodes.service.
Oct  2 21:31:48.813596 systemd[1]: Finished systemd-fsck-usr.service.
Oct  2 21:31:48.911838 systemd-modules-load[268]: Inserted module 'dm_multipath'
Oct  2 21:31:48.914744 systemd[1]: Finished systemd-modules-load.service.
Oct  2 21:31:48.988850 systemd[1]: Finished systemd-vconsole-setup.service.
Oct  2 21:31:49.043743 systemd[1]: Reached target nss-lookup.target.
Oct  2 21:31:49.099051 systemd[1]: Starting dracut-cmdline-ask.service...
Oct  2 21:31:49.113037 systemd[1]: Starting systemd-sysctl.service...
Oct  2 21:31:49.113373 systemd[1]: Starting systemd-tmpfiles-setup-dev.service...
Oct  2 21:31:49.116136 systemd[1]: Finished systemd-tmpfiles-setup-dev.service.
Oct  2 21:31:49.114000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:31:49.116910 systemd[1]: Finished systemd-sysctl.service.
Oct  2 21:31:49.166652 kernel: audit: type=1130 audit(1696282309.114:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:31:49.177000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:31:49.178793 systemd[1]: Finished dracut-cmdline-ask.service.
Oct  2 21:31:49.241525 kernel: audit: type=1130 audit(1696282309.177:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:31:49.226000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:31:49.228088 systemd[1]: Starting dracut-cmdline.service...
Oct  2 21:31:49.253546 dracut-cmdline[293]: dracut-dracut-053
Oct  2 21:31:49.253546 dracut-cmdline[293]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LA
Oct  2 21:31:49.253546 dracut-cmdline[293]: BEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.first_boot=detected flatcar.oem.id=packet flatcar.autologin verity.usrhash=96b0fdb9f11bf1422adc9955c78c8182df387766badfd0b94e08fb9688739ee1
Oct  2 21:31:49.320508 kernel: Loading iSCSI transport class v2.0-870.
Oct  2 21:31:49.320520 kernel: iscsi: registered transport (tcp)
Oct  2 21:31:49.367799 kernel: iscsi: registered transport (qla4xxx)
Oct  2 21:31:49.367847 kernel: QLogic iSCSI HBA Driver
Oct  2 21:31:49.383391 systemd[1]: Finished dracut-cmdline.service.
Oct  2 21:31:49.382000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:31:49.383908 systemd[1]: Starting dracut-pre-udev.service...
Oct  2 21:31:49.441509 kernel: raid6: avx2x4   gen() 47790 MB/s
Oct  2 21:31:49.476501 kernel: raid6: avx2x4   xor() 20813 MB/s
Oct  2 21:31:49.511474 kernel: raid6: avx2x2   gen() 53879 MB/s
Oct  2 21:31:49.546513 kernel: raid6: avx2x2   xor() 32168 MB/s
Oct  2 21:31:49.581516 kernel: raid6: avx2x1   gen() 45026 MB/s
Oct  2 21:31:49.616509 kernel: raid6: avx2x1   xor() 27216 MB/s
Oct  2 21:31:49.651508 kernel: raid6: sse2x4   gen() 20849 MB/s
Oct  2 21:31:49.685472 kernel: raid6: sse2x4   xor() 11726 MB/s
Oct  2 21:31:49.719513 kernel: raid6: sse2x2   gen() 21665 MB/s
Oct  2 21:31:49.753474 kernel: raid6: sse2x2   xor() 13464 MB/s
Oct  2 21:31:49.787513 kernel: raid6: sse2x1   gen() 18292 MB/s
Oct  2 21:31:49.839337 kernel: raid6: sse2x1   xor()  8898 MB/s
Oct  2 21:31:49.839353 kernel: raid6: using algorithm avx2x2 gen() 53879 MB/s
Oct  2 21:31:49.839360 kernel: raid6: .... xor() 32168 MB/s, rmw enabled
Oct  2 21:31:49.857559 kernel: raid6: using avx2x2 recovery algorithm
Oct  2 21:31:49.903445 kernel: xor: automatically using best checksumming function   avx       
Oct  2 21:31:49.982487 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no
Oct  2 21:31:49.987200 systemd[1]: Finished dracut-pre-udev.service.
Oct  2 21:31:49.985000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:31:49.986000 audit: BPF prog-id=7 op=LOAD
Oct  2 21:31:49.986000 audit: BPF prog-id=8 op=LOAD
Oct  2 21:31:49.987925 systemd[1]: Starting systemd-udevd.service...
Oct  2 21:31:49.996003 systemd-udevd[472]: Using default interface naming scheme 'v252'.
Oct  2 21:31:50.024000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:31:50.009739 systemd[1]: Started systemd-udevd.service.
Oct  2 21:31:50.050599 dracut-pre-trigger[485]: rd.md=0: removing MD RAID activation
Oct  2 21:31:50.026095 systemd[1]: Starting dracut-pre-trigger.service...
Oct  2 21:31:50.067000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:31:50.055483 systemd[1]: Finished dracut-pre-trigger.service.
Oct  2 21:31:50.069746 systemd[1]: Starting systemd-udev-trigger.service...
Oct  2 21:31:50.120163 systemd[1]: Finished systemd-udev-trigger.service.
Oct  2 21:31:50.153936 kernel: cryptd: max_cpu_qlen set to 1000
Oct  2 21:31:50.153958 kernel: libata version 3.00 loaded.
Oct  2 21:31:50.153969 kernel: ACPI: bus type USB registered
Oct  2 21:31:50.118000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:31:50.184783 kernel: usbcore: registered new interface driver usbfs
Oct  2 21:31:50.184828 kernel: usbcore: registered new interface driver hub
Oct  2 21:31:50.220116 kernel: usbcore: registered new device driver usb
Oct  2 21:31:50.220446 kernel: AVX2 version of gcm_enc/dec engaged.
Oct  2 21:31:50.220464 kernel: igb: Intel(R) Gigabit Ethernet Network Driver
Oct  2 21:31:50.271505 kernel: igb: Copyright (c) 2007-2014 Intel Corporation.
Oct  2 21:31:50.272446 kernel: AES CTR mode by8 optimization enabled
Oct  2 21:31:50.272462 kernel: ahci 0000:00:17.0: version 3.0
Oct  2 21:31:50.299490 kernel: xhci_hcd 0000:00:14.0: xHCI Host Controller
Oct  2 21:31:50.299568 kernel: mlx5_core 0000:01:00.0: firmware version: 14.28.2006
Oct  2 21:31:50.299625 kernel: ahci 0000:00:17.0: AHCI 0001.0301 32 slots 7 ports 6 Gbps 0x7f impl SATA mode
Oct  2 21:31:50.299679 kernel: ahci 0000:00:17.0: flags: 64bit ncq sntf clo only pio slum part ems deso sadm sds apst 
Oct  2 21:31:50.307487 kernel: xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 1
Oct  2 21:31:50.312482 kernel: xhci_hcd 0000:00:14.0: hcc params 0x200077c1 hci version 0x110 quirks 0x0000000000009810
Oct  2 21:31:50.312552 kernel: pps pps0: new PPS source ptp0
Oct  2 21:31:50.312615 kernel: igb 0000:03:00.0: added PHC on eth0
Oct  2 21:31:50.312673 kernel: igb 0000:03:00.0: Intel(R) Gigabit Ethernet Network Connection
Oct  2 21:31:50.312724 kernel: igb 0000:03:00.0: eth0: (PCIe:2.5Gb/s:Width x1) 3c:ec:ef:70:d7:7c
Oct  2 21:31:50.312777 kernel: igb 0000:03:00.0: eth0: PBA No: 010000-000
Oct  2 21:31:50.312827 kernel: igb 0000:03:00.0: Using MSI-X interrupts. 4 rx queue(s), 4 tx queue(s)
Oct  2 21:31:50.320445 kernel: scsi host0: ahci
Oct  2 21:31:50.320547 kernel: scsi host1: ahci
Oct  2 21:31:50.320613 kernel: scsi host2: ahci
Oct  2 21:31:50.320682 kernel: scsi host3: ahci
Oct  2 21:31:50.320764 kernel: scsi host4: ahci
Oct  2 21:31:50.320827 kernel: scsi host5: ahci
Oct  2 21:31:50.320891 kernel: scsi host6: ahci
Oct  2 21:31:50.320955 kernel: ata1: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516100 irq 132
Oct  2 21:31:50.320964 kernel: ata2: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516180 irq 132
Oct  2 21:31:50.320972 kernel: ata3: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516200 irq 132
Oct  2 21:31:50.320980 kernel: ata4: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516280 irq 132
Oct  2 21:31:50.320987 kernel: ata5: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516300 irq 132
Oct  2 21:31:50.320997 kernel: ata6: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516380 irq 132
Oct  2 21:31:50.321005 kernel: ata7: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516400 irq 132
Oct  2 21:31:50.343318 kernel: mlx5_core 0000:01:00.0: 63.008 Gb/s available PCIe bandwidth (8.0 GT/s PCIe x8 link)
Oct  2 21:31:50.349487 kernel: xhci_hcd 0000:00:14.0: xHCI Host Controller
Oct  2 21:31:50.349556 kernel: pps pps1: new PPS source ptp1
Oct  2 21:31:50.349612 kernel: igb 0000:04:00.0: added PHC on eth1
Oct  2 21:31:50.349668 kernel: igb 0000:04:00.0: Intel(R) Gigabit Ethernet Network Connection
Oct  2 21:31:50.349719 kernel: igb 0000:04:00.0: eth1: (PCIe:2.5Gb/s:Width x1) 3c:ec:ef:70:d7:7d
Oct  2 21:31:50.349770 kernel: igb 0000:04:00.0: eth1: PBA No: 010000-000
Oct  2 21:31:50.349820 kernel: igb 0000:04:00.0: Using MSI-X interrupts. 4 rx queue(s), 4 tx queue(s)
Oct  2 21:31:50.631505 kernel: mlx5_core 0000:01:00.0: E-Switch: Total vports 10, per vport: max uc(1024) max mc(16384)
Oct  2 21:31:50.631579 kernel: ata1: SATA link up 6.0 Gbps (SStatus 133 SControl 300)
Oct  2 21:31:50.632481 kernel: ata1.00: ATA-10: Micron_5200_MTFDDAK480TDN,  D1MU020, max UDMA/133
Oct  2 21:31:50.632497 kernel: ata6: SATA link down (SStatus 0 SControl 300)
Oct  2 21:31:50.632505 kernel: ata2: SATA link up 6.0 Gbps (SStatus 133 SControl 300)
Oct  2 21:31:50.632512 kernel: ata3: SATA link down (SStatus 0 SControl 300)
Oct  2 21:31:50.633507 kernel: ata7: SATA link down (SStatus 0 SControl 300)
Oct  2 21:31:50.633522 kernel: ata5: SATA link down (SStatus 0 SControl 300)
Oct  2 21:31:50.633529 kernel: ata2.00: ATA-10: Micron_5200_MTFDDAK480TDN,  D1MU020, max UDMA/133
Oct  2 21:31:50.635513 kernel: xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 2
Oct  2 21:31:50.635582 kernel: ata4: SATA link down (SStatus 0 SControl 300)
Oct  2 21:31:50.636517 kernel: ata1.00: 937703088 sectors, multi 16: LBA48 NCQ (depth 32), AA
Oct  2 21:31:50.636532 kernel: ata1.00: Features: NCQ-prio
Oct  2 21:31:50.637506 kernel: ata2.00: 937703088 sectors, multi 16: LBA48 NCQ (depth 32), AA
Oct  2 21:31:50.637521 kernel: ata2.00: Features: NCQ-prio
Oct  2 21:31:50.641444 kernel: ata1.00: configured for UDMA/133
Oct  2 21:31:50.641459 kernel: scsi 0:0:0:0: Direct-Access     ATA      Micron_5200_MTFD U020 PQ: 0 ANSI: 5
Oct  2 21:31:50.641535 kernel: ata2.00: configured for UDMA/133
Oct  2 21:31:50.641543 kernel: scsi 1:0:0:0: Direct-Access     ATA      Micron_5200_MTFD U020 PQ: 0 ANSI: 5
Oct  2 21:31:50.677468 kernel: igb 0000:03:00.0 eno1: renamed from eth0
Oct  2 21:31:50.677558 kernel: xhci_hcd 0000:00:14.0: Host supports USB 3.1 Enhanced SuperSpeed
Oct  2 21:31:51.029512 kernel: ata1.00: Enabling discard_zeroes_data
Oct  2 21:31:51.029531 kernel: hub 1-0:1.0: USB hub found
Oct  2 21:31:51.041341 kernel: ata2.00: Enabling discard_zeroes_data
Oct  2 21:31:51.068356 kernel: hub 1-0:1.0: 16 ports detected
Oct  2 21:31:51.068431 kernel: sd 1:0:0:0: [sdb] 937703088 512-byte logical blocks: (480 GB/447 GiB)
Oct  2 21:31:51.068525 kernel: sd 0:0:0:0: [sda] 937703088 512-byte logical blocks: (480 GB/447 GiB)
Oct  2 21:31:51.068597 kernel: sd 0:0:0:0: [sda] 4096-byte physical blocks
Oct  2 21:31:51.068675 kernel: sd 0:0:0:0: [sda] Write Protect is off
Oct  2 21:31:51.068751 kernel: sd 0:0:0:0: [sda] Mode Sense: 00 3a 00 00
Oct  2 21:31:51.068808 kernel: sd 0:0:0:0: [sda] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA
Oct  2 21:31:51.068862 kernel: ata1.00: Enabling discard_zeroes_data
Oct  2 21:31:51.068870 kernel: igb 0000:04:00.0 eno2: renamed from eth1
Oct  2 21:31:51.071574 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk.
Oct  2 21:31:51.071594 kernel: GPT:9289727 != 937703087
Oct  2 21:31:51.071606 kernel: GPT:Alternate GPT header not at the end of the disk.
Oct  2 21:31:51.071617 kernel: GPT:9289727 != 937703087
Oct  2 21:31:51.071627 kernel: GPT: Use GNU Parted to correct GPT errors.
Oct  2 21:31:51.071638 kernel:  sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9
Oct  2 21:31:51.071648 kernel: ata1.00: Enabling discard_zeroes_data
Oct  2 21:31:51.071657 kernel: sd 0:0:0:0: [sda] Attached SCSI disk
Oct  2 21:31:51.092000 kernel: hub 2-0:1.0: USB hub found
Oct  2 21:31:51.092078 kernel: sd 1:0:0:0: [sdb] 4096-byte physical blocks
Oct  2 21:31:51.092138 kernel: sd 1:0:0:0: [sdb] Write Protect is off
Oct  2 21:31:51.104508 kernel: hub 2-0:1.0: 10 ports detected
Oct  2 21:31:51.134061 kernel: sd 1:0:0:0: [sdb] Mode Sense: 00 3a 00 00
Oct  2 21:31:51.134157 kernel: sd 1:0:0:0: [sdb] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA
Oct  2 21:31:51.136476 kernel: usb: port power management may be unreliable
Oct  2 21:31:51.136492 kernel: mlx5_core 0000:01:00.0: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0)
Oct  2 21:31:51.160505 kernel: ata2.00: Enabling discard_zeroes_data
Oct  2 21:31:51.327815 kernel: usb 1-14: new high-speed USB device number 2 using xhci_hcd
Oct  2 21:31:51.336445 kernel: ata2.00: Enabling discard_zeroes_data
Oct  2 21:31:51.336462 kernel: mlx5_core 0000:01:00.0: Supported tc offload range - chains: 4294967294, prios: 4294967295
Oct  2 21:31:51.355875 kernel: mlx5_core 0000:01:00.1: firmware version: 14.28.2006
Oct  2 21:31:51.355951 kernel: sd 1:0:0:0: [sdb] Attached SCSI disk
Oct  2 21:31:51.387313 kernel: mlx5_core 0000:01:00.1: 63.008 Gb/s available PCIe bandwidth (8.0 GT/s PCIe x8 link)
Oct  2 21:31:51.434500 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/sda6 scanned by (udev-worker) (522)
Oct  2 21:31:51.435706 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device.
Oct  2 21:31:51.587547 kernel: hub 1-14:1.0: USB hub found
Oct  2 21:31:51.587631 kernel: hub 1-14:1.0: 4 ports detected
Oct  2 21:31:51.579842 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device.
Oct  2 21:31:51.597543 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device.
Oct  2 21:31:51.602713 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device.
Oct  2 21:31:51.639779 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device.
Oct  2 21:31:51.659954 systemd[1]: Starting disk-uuid.service...
Oct  2 21:31:51.690541 kernel: ata1.00: Enabling discard_zeroes_data
Oct  2 21:31:51.690556 kernel:  sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9
Oct  2 21:31:51.690608 disk-uuid[651]: Primary Header is updated.
Oct  2 21:31:51.690608 disk-uuid[651]: Secondary Entries is updated.
Oct  2 21:31:51.690608 disk-uuid[651]: Secondary Header is updated.
Oct  2 21:31:51.837478 kernel: ata1.00: Enabling discard_zeroes_data
Oct  2 21:31:51.837491 kernel: mlx5_core 0000:01:00.1: E-Switch: Total vports 10, per vport: max uc(1024) max mc(16384)
Oct  2 21:31:51.837580 kernel:  sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9
Oct  2 21:31:51.837588 kernel: port_module: 9 callbacks suppressed
Oct  2 21:31:51.837594 kernel: mlx5_core 0000:01:00.1: Port module event: module 1, Cable plugged
Oct  2 21:31:51.837666 kernel: ata1.00: Enabling discard_zeroes_data
Oct  2 21:31:51.837710 kernel: mlx5_core 0000:01:00.1: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0)
Oct  2 21:31:51.837769 kernel:  sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9
Oct  2 21:31:51.890497 kernel: usb 1-14.1: new low-speed USB device number 3 using xhci_hcd
Oct  2 21:31:52.005449 kernel: mlx5_core 0000:01:00.1: Supported tc offload range - chains: 4294967294, prios: 4294967295
Oct  2 21:31:52.005548 kernel: hid: raw HID events driver (C) Jiri Kosina
Oct  2 21:31:52.039445 kernel: mlx5_core 0000:01:00.0 enp1s0f0np0: renamed from eth0
Oct  2 21:31:52.071501 kernel: usbcore: registered new interface driver usbhid
Oct  2 21:31:52.071517 kernel: usbhid: USB HID core driver
Oct  2 21:31:52.089446 kernel: mlx5_core 0000:01:00.1 enp1s0f1np1: renamed from eth1
Oct  2 21:31:52.124523 kernel: input: HID 0557:2419 as /devices/pci0000:00/0000:00:14.0/usb1/1-14/1-14.1/1-14.1:1.0/0003:0557:2419.0001/input/input0
Oct  2 21:31:52.246767 kernel: hid-generic 0003:0557:2419.0001: input,hidraw0: USB HID v1.00 Keyboard [HID 0557:2419] on usb-0000:00:14.0-14.1/input0
Oct  2 21:31:52.246898 kernel: input: HID 0557:2419 as /devices/pci0000:00/0000:00:14.0/usb1/1-14/1-14.1/1-14.1:1.1/0003:0557:2419.0002/input/input1
Oct  2 21:31:52.246908 kernel: hid-generic 0003:0557:2419.0002: input,hidraw1: USB HID v1.00 Mouse [HID 0557:2419] on usb-0000:00:14.0-14.1/input1
Oct  2 21:31:52.767708 kernel: ata1.00: Enabling discard_zeroes_data
Oct  2 21:31:52.788397 disk-uuid[652]: The operation has completed successfully.
Oct  2 21:31:52.796590 kernel:  sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9
Oct  2 21:31:52.827809 systemd[1]: disk-uuid.service: Deactivated successfully.
Oct  2 21:31:52.929693 kernel: audit: type=1130 audit(1696282312.833:19): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:31:52.929709 kernel: audit: type=1131 audit(1696282312.833:20): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:31:52.833000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:31:52.833000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:31:52.827852 systemd[1]: Finished disk-uuid.service.
Oct  2 21:31:52.961485 kernel: device-mapper: verity: sha256 using implementation "sha256-generic"
Oct  2 21:31:52.835178 systemd[1]: Starting verity-setup.service...
Oct  2 21:31:53.043362 systemd[1]: Found device dev-mapper-usr.device.
Oct  2 21:31:53.055841 systemd[1]: Mounting sysusr-usr.mount...
Oct  2 21:31:53.067079 systemd[1]: Finished verity-setup.service.
Oct  2 21:31:53.081000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:31:53.133447 kernel: audit: type=1130 audit(1696282313.081:21): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:31:53.192444 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none.
Oct  2 21:31:53.192568 systemd[1]: Mounted sysusr-usr.mount.
Oct  2 21:31:53.199727 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met.
Oct  2 21:31:53.200127 systemd[1]: Starting ignition-setup.service...
Oct  2 21:31:53.297264 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm
Oct  2 21:31:53.297294 kernel: BTRFS info (device sda6): using free space tree
Oct  2 21:31:53.297311 kernel: BTRFS info (device sda6): has skinny extents
Oct  2 21:31:53.297325 kernel: BTRFS info (device sda6): enabling ssd optimizations
Oct  2 21:31:53.231895 systemd[1]: Starting parse-ip-for-networkd.service...
Oct  2 21:31:53.305974 systemd[1]: Finished parse-ip-for-networkd.service.
Oct  2 21:31:53.323000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:31:53.325047 systemd[1]: Finished ignition-setup.service.
Oct  2 21:31:53.442504 kernel: audit: type=1130 audit(1696282313.323:22): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:31:53.442520 kernel: audit: type=1130 audit(1696282313.383:23): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:31:53.383000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:31:53.385470 systemd[1]: Starting ignition-fetch-offline.service...
Oct  2 21:31:53.449000 audit: BPF prog-id=9 op=LOAD
Oct  2 21:31:53.451556 systemd[1]: Starting systemd-networkd.service...
Oct  2 21:31:53.488547 kernel: audit: type=1334 audit(1696282313.449:24): prog-id=9 op=LOAD
Oct  2 21:31:53.488227 systemd-networkd[869]: lo: Link UP
Oct  2 21:31:53.495000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:31:53.529554 ignition[856]: Ignition 2.14.0
Oct  2 21:31:53.563714 kernel: audit: type=1130 audit(1696282313.495:25): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:31:53.488229 systemd-networkd[869]: lo: Gained carrier
Oct  2 21:31:53.529558 ignition[856]: Stage: fetch-offline
Oct  2 21:31:53.584000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:31:53.488548 systemd-networkd[869]: Enumeration completed
Oct  2 21:31:53.725058 kernel: audit: type=1130 audit(1696282313.584:26): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:31:53.725074 kernel: audit: type=1130 audit(1696282313.646:27): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:31:53.725082 kernel: mlx5_core 0000:01:00.1 enp1s0f1np1: Link up
Oct  2 21:31:53.646000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:31:53.529586 ignition[856]: reading system config file "/usr/lib/ignition/base.d/base.ign"
Oct  2 21:31:53.750990 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): enp1s0f1np1: link becomes ready
Oct  2 21:31:53.488615 systemd[1]: Started systemd-networkd.service.
Oct  2 21:31:53.529599 ignition[856]: parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4
Oct  2 21:31:53.489258 systemd-networkd[869]: enp1s0f1np1: Configuring with /usr/lib/systemd/network/zz-default.network.
Oct  2 21:31:53.778000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:31:53.538216 ignition[856]: no config dir at "/usr/lib/ignition/base.platform.d/packet"
Oct  2 21:31:53.809519 iscsid[894]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi
Oct  2 21:31:53.809519 iscsid[894]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log
Oct  2 21:31:53.809519 iscsid[894]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.<reversed domain name>[:identifier].
Oct  2 21:31:53.809519 iscsid[894]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6.
Oct  2 21:31:53.809519 iscsid[894]: If using hardware iscsi like qla4xxx this message can be ignored.
Oct  2 21:31:53.809519 iscsid[894]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi
Oct  2 21:31:53.809519 iscsid[894]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf
Oct  2 21:31:53.970697 kernel: mlx5_core 0000:01:00.0 enp1s0f0np0: Link up
Oct  2 21:31:53.816000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:31:53.496638 systemd[1]: Reached target network.target.
Oct  2 21:31:53.977000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:31:53.538280 ignition[856]: parsed url from cmdline: ""
Oct  2 21:31:53.552270 unknown[856]: fetched base config from "system"
Oct  2 21:31:53.538282 ignition[856]: no config URL provided
Oct  2 21:31:53.552273 unknown[856]: fetched user config from "system"
Oct  2 21:31:53.538285 ignition[856]: reading system config file "/usr/lib/ignition/user.ign"
Oct  2 21:31:53.557011 systemd[1]: Starting iscsiuio.service...
Oct  2 21:31:53.538309 ignition[856]: parsing config with SHA512: 50efa9a7f2f71ceda84488ccd5cee1efa1edb9816aa649ef06c2ca3484ca59ea492c989e1237b2afe3566dde0a963599b9458f721e47cf3ed0e42e73a81218ea
Oct  2 21:31:53.570709 systemd[1]: Started iscsiuio.service.
Oct  2 21:31:53.553246 ignition[856]: fetch-offline: fetch-offline passed
Oct  2 21:31:53.585783 systemd[1]: Finished ignition-fetch-offline.service.
Oct  2 21:31:53.553249 ignition[856]: POST message to Packet Timeline
Oct  2 21:31:53.647769 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json).
Oct  2 21:31:53.553253 ignition[856]: POST Status error: resource requires networking
Oct  2 21:31:53.648264 systemd[1]: Starting ignition-kargs.service...
Oct  2 21:31:53.553282 ignition[856]: Ignition finished successfully
Oct  2 21:31:53.726403 systemd-networkd[869]: enp1s0f0np0: Configuring with /usr/lib/systemd/network/zz-default.network.
Oct  2 21:31:53.729320 ignition[884]: Ignition 2.14.0
Oct  2 21:31:53.739023 systemd[1]: Starting iscsid.service...
Oct  2 21:31:53.729324 ignition[884]: Stage: kargs
Oct  2 21:31:53.764599 systemd[1]: Started iscsid.service.
Oct  2 21:31:53.729380 ignition[884]: reading system config file "/usr/lib/ignition/base.d/base.ign"
Oct  2 21:31:53.779942 systemd[1]: Starting dracut-initqueue.service...
Oct  2 21:31:53.729388 ignition[884]: parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4
Oct  2 21:31:53.799633 systemd[1]: Finished dracut-initqueue.service.
Oct  2 21:31:53.730727 ignition[884]: no config dir at "/usr/lib/ignition/base.platform.d/packet"
Oct  2 21:31:53.817748 systemd[1]: Reached target remote-fs-pre.target.
Oct  2 21:31:53.732245 ignition[884]: kargs: kargs passed
Oct  2 21:31:53.863636 systemd[1]: Reached target remote-cryptsetup.target.
Oct  2 21:31:53.732248 ignition[884]: POST message to Packet Timeline
Oct  2 21:31:53.897651 systemd[1]: Reached target remote-fs.target.
Oct  2 21:31:53.732258 ignition[884]: GET https://metadata.packet.net/metadata: attempt #1
Oct  2 21:31:53.913214 systemd[1]: Starting dracut-pre-mount.service...
Oct  2 21:31:53.735485 ignition[884]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:44367->[::1]:53: read: connection refused
Oct  2 21:31:53.944693 systemd-networkd[869]: eno2: Configuring with /usr/lib/systemd/network/zz-default.network.
Oct  2 21:31:53.935854 ignition[884]: GET https://metadata.packet.net/metadata: attempt #2
Oct  2 21:31:53.959753 systemd[1]: Finished dracut-pre-mount.service.
Oct  2 21:31:53.936136 ignition[884]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:50352->[::1]:53: read: connection refused
Oct  2 21:31:53.972516 systemd-networkd[869]: eno1: Configuring with /usr/lib/systemd/network/zz-default.network.
Oct  2 21:31:54.001007 systemd-networkd[869]: enp1s0f1np1: Link UP
Oct  2 21:31:54.001179 systemd-networkd[869]: enp1s0f1np1: Gained carrier
Oct  2 21:31:54.011811 systemd-networkd[869]: enp1s0f0np0: Link UP
Oct  2 21:31:54.012055 systemd-networkd[869]: eno2: Link UP
Oct  2 21:31:54.012278 systemd-networkd[869]: eno1: Link UP
Oct  2 21:31:54.337157 ignition[884]: GET https://metadata.packet.net/metadata: attempt #3
Oct  2 21:31:54.338334 ignition[884]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:39204->[::1]:53: read: connection refused
Oct  2 21:31:54.801636 systemd-networkd[869]: enp1s0f0np0: Gained carrier
Oct  2 21:31:54.810703 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): enp1s0f0np0: link becomes ready
Oct  2 21:31:54.827650 systemd-networkd[869]: enp1s0f0np0: DHCPv4 address 139.178.70.49/31, gateway 139.178.70.48 acquired from 145.40.83.140
Oct  2 21:31:55.097942 systemd-networkd[869]: enp1s0f1np1: Gained IPv6LL
Oct  2 21:31:55.138864 ignition[884]: GET https://metadata.packet.net/metadata: attempt #4
Oct  2 21:31:55.139814 ignition[884]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:50983->[::1]:53: read: connection refused
Oct  2 21:31:55.866043 systemd-networkd[869]: enp1s0f0np0: Gained IPv6LL
Oct  2 21:31:56.740563 ignition[884]: GET https://metadata.packet.net/metadata: attempt #5
Oct  2 21:31:56.741904 ignition[884]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:42760->[::1]:53: read: connection refused
Oct  2 21:31:59.945395 ignition[884]: GET https://metadata.packet.net/metadata: attempt #6
Oct  2 21:31:59.979462 ignition[884]: GET result: OK
Oct  2 21:32:00.140702 ignition[884]: Ignition finished successfully
Oct  2 21:32:00.144678 systemd[1]: Finished ignition-kargs.service.
Oct  2 21:32:00.235769 kernel: kauditd_printk_skb: 3 callbacks suppressed
Oct  2 21:32:00.235788 kernel: audit: type=1130 audit(1696282320.155:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:32:00.155000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:32:00.165301 ignition[911]: Ignition 2.14.0
Oct  2 21:32:00.158823 systemd[1]: Starting ignition-disks.service...
Oct  2 21:32:00.165304 ignition[911]: Stage: disks
Oct  2 21:32:00.165372 ignition[911]: reading system config file "/usr/lib/ignition/base.d/base.ign"
Oct  2 21:32:00.165383 ignition[911]: parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4
Oct  2 21:32:00.166914 ignition[911]: no config dir at "/usr/lib/ignition/base.platform.d/packet"
Oct  2 21:32:00.168524 ignition[911]: disks: disks passed
Oct  2 21:32:00.168528 ignition[911]: POST message to Packet Timeline
Oct  2 21:32:00.168538 ignition[911]: GET https://metadata.packet.net/metadata: attempt #1
Oct  2 21:32:00.189646 ignition[911]: GET result: OK
Oct  2 21:32:00.351594 ignition[911]: Ignition finished successfully
Oct  2 21:32:00.354750 systemd[1]: Finished ignition-disks.service.
Oct  2 21:32:00.433538 kernel: audit: type=1130 audit(1696282320.366:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:32:00.366000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:32:00.367970 systemd[1]: Reached target initrd-root-device.target.
Oct  2 21:32:00.442654 systemd[1]: Reached target local-fs-pre.target.
Oct  2 21:32:00.442691 systemd[1]: Reached target local-fs.target.
Oct  2 21:32:00.465662 systemd[1]: Reached target sysinit.target.
Oct  2 21:32:00.465700 systemd[1]: Reached target basic.target.
Oct  2 21:32:00.487274 systemd[1]: Starting systemd-fsck-root.service...
Oct  2 21:32:00.507011 systemd-fsck[925]: ROOT: clean, 603/553520 files, 56012/553472 blocks
Oct  2 21:32:00.526817 systemd[1]: Finished systemd-fsck-root.service.
Oct  2 21:32:00.622150 kernel: audit: type=1130 audit(1696282320.535:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:32:00.622169 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none.
Oct  2 21:32:00.535000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:32:00.538534 systemd[1]: Mounting sysroot.mount...
Oct  2 21:32:00.631062 systemd[1]: Mounted sysroot.mount.
Oct  2 21:32:00.646720 systemd[1]: Reached target initrd-root-fs.target.
Oct  2 21:32:00.655309 systemd[1]: Mounting sysroot-usr.mount...
Oct  2 21:32:00.670257 systemd[1]: Starting flatcar-metadata-hostname.service...
Oct  2 21:32:00.695225 systemd[1]: Starting flatcar-static-network.service...
Oct  2 21:32:00.703599 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot).
Oct  2 21:32:00.703638 systemd[1]: Reached target ignition-diskful.target.
Oct  2 21:32:00.722175 systemd[1]: Mounted sysroot-usr.mount.
Oct  2 21:32:00.745538 systemd[1]: Mounting sysroot-usr-share-oem.mount...
Oct  2 21:32:00.893512 kernel: BTRFS: device label OEM devid 1 transid 16 /dev/sda6 scanned by mount (938)
Oct  2 21:32:00.893528 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm
Oct  2 21:32:00.893539 kernel: BTRFS info (device sda6): using free space tree
Oct  2 21:32:00.893549 kernel: BTRFS info (device sda6): has skinny extents
Oct  2 21:32:00.893556 kernel: BTRFS info (device sda6): enabling ssd optimizations
Oct  2 21:32:00.758491 systemd[1]: Starting initrd-setup-root.service...
Oct  2 21:32:00.956540 kernel: audit: type=1130 audit(1696282320.900:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:32:00.900000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:32:00.956579 coreos-metadata[933]: Oct 02 21:32:00.814 INFO Fetching https://metadata.packet.net/metadata: Attempt #1
Oct  2 21:32:00.956579 coreos-metadata[933]: Oct 02 21:32:00.835 INFO Fetch successful
Oct  2 21:32:01.147387 kernel: audit: type=1130 audit(1696282320.963:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:32:01.147480 kernel: audit: type=1130 audit(1696282321.032:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:32:01.147488 kernel: audit: type=1131 audit(1696282321.032:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:32:00.963000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:32:01.032000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:32:01.032000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:32:01.147556 coreos-metadata[932]: Oct 02 21:32:00.813 INFO Fetching https://metadata.packet.net/metadata: Attempt #1
Oct  2 21:32:01.147556 coreos-metadata[932]: Oct 02 21:32:00.835 INFO Fetch successful
Oct  2 21:32:01.147556 coreos-metadata[932]: Oct 02 21:32:00.852 INFO wrote hostname ci-3510.3.0-a-a1bcd9ea1c to /sysroot/etc/hostname
Oct  2 21:32:01.197645 initrd-setup-root[943]: cut: /sysroot/etc/passwd: No such file or directory
Oct  2 21:32:00.809235 systemd[1]: Finished initrd-setup-root.service.
Oct  2 21:32:01.223000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:32:01.251657 initrd-setup-root[951]: cut: /sysroot/etc/group: No such file or directory
Oct  2 21:32:01.291645 kernel: audit: type=1130 audit(1696282321.223:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:32:00.903752 systemd[1]: Finished flatcar-metadata-hostname.service.
Oct  2 21:32:01.300698 initrd-setup-root[959]: cut: /sysroot/etc/shadow: No such file or directory
Oct  2 21:32:00.964894 systemd[1]: flatcar-static-network.service: Deactivated successfully.
Oct  2 21:32:01.322682 initrd-setup-root[967]: cut: /sysroot/etc/gshadow: No such file or directory
Oct  2 21:32:00.964984 systemd[1]: Finished flatcar-static-network.service.
Oct  2 21:32:01.341687 ignition[1009]: INFO     : Ignition 2.14.0
Oct  2 21:32:01.341687 ignition[1009]: INFO     : Stage: mount
Oct  2 21:32:01.341687 ignition[1009]: INFO     : reading system config file "/usr/lib/ignition/base.d/base.ign"
Oct  2 21:32:01.341687 ignition[1009]: DEBUG    : parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4
Oct  2 21:32:01.341687 ignition[1009]: INFO     : no config dir at "/usr/lib/ignition/base.platform.d/packet"
Oct  2 21:32:01.341687 ignition[1009]: INFO     : mount: mount passed
Oct  2 21:32:01.341687 ignition[1009]: INFO     : POST message to Packet Timeline
Oct  2 21:32:01.341687 ignition[1009]: INFO     : GET https://metadata.packet.net/metadata: attempt #1
Oct  2 21:32:01.341687 ignition[1009]: INFO     : GET result: OK
Oct  2 21:32:01.523582 kernel: audit: type=1130 audit(1696282321.405:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:32:01.523599 kernel: BTRFS: device label OEM devid 1 transid 17 /dev/sda6 scanned by mount (1023)
Oct  2 21:32:01.523609 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm
Oct  2 21:32:01.405000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:32:01.033912 systemd[1]: Mounted sysroot-usr-share-oem.mount.
Oct  2 21:32:01.573535 kernel: BTRFS info (device sda6): using free space tree
Oct  2 21:32:01.573546 kernel: BTRFS info (device sda6): has skinny extents
Oct  2 21:32:01.573553 kernel: BTRFS info (device sda6): enabling ssd optimizations
Oct  2 21:32:01.573567 ignition[1009]: INFO     : Ignition finished successfully
Oct  2 21:32:01.156098 systemd[1]: Starting ignition-mount.service...
Oct  2 21:32:01.184999 systemd[1]: Starting sysroot-boot.service...
Oct  2 21:32:01.205307 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully.
Oct  2 21:32:01.650605 ignition[1042]: INFO     : Ignition 2.14.0
Oct  2 21:32:01.650605 ignition[1042]: INFO     : Stage: files
Oct  2 21:32:01.650605 ignition[1042]: INFO     : reading system config file "/usr/lib/ignition/base.d/base.ign"
Oct  2 21:32:01.650605 ignition[1042]: DEBUG    : parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4
Oct  2 21:32:01.650605 ignition[1042]: INFO     : no config dir at "/usr/lib/ignition/base.platform.d/packet"
Oct  2 21:32:01.650605 ignition[1042]: DEBUG    : files: compiled without relabeling support, skipping
Oct  2 21:32:01.650605 ignition[1042]: INFO     : files: ensureUsers: op(1): [started]  creating or modifying user "core"
Oct  2 21:32:01.650605 ignition[1042]: DEBUG    : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core"
Oct  2 21:32:01.650605 ignition[1042]: INFO     : files: ensureUsers: op(1): [finished] creating or modifying user "core"
Oct  2 21:32:01.650605 ignition[1042]: INFO     : files: ensureUsers: op(2): [started]  adding ssh keys to user "core"
Oct  2 21:32:01.205352 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully.
Oct  2 21:32:01.778689 ignition[1042]: INFO     : files: ensureUsers: op(2): [finished] adding ssh keys to user "core"
Oct  2 21:32:01.778689 ignition[1042]: INFO     : files: createFilesystemsFiles: createFiles: op(3): [started]  writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.3.0.tgz"
Oct  2 21:32:01.778689 ignition[1042]: INFO     : files: createFilesystemsFiles: createFiles: op(3): GET https://github.com/containernetworking/plugins/releases/download/v1.3.0/cni-plugins-linux-amd64-v1.3.0.tgz: attempt #1
Oct  2 21:32:01.209161 systemd[1]: Finished sysroot-boot.service.
Oct  2 21:32:01.394228 systemd[1]: Finished ignition-mount.service.
Oct  2 21:32:01.409040 systemd[1]: Starting ignition-files.service...
Oct  2 21:32:01.471272 systemd[1]: Mounting sysroot-usr-share-oem.mount...
Oct  2 21:32:01.612066 systemd[1]: Mounted sysroot-usr-share-oem.mount.
Oct  2 21:32:01.651123 unknown[1042]: wrote ssh authorized keys file for user: core
Oct  2 21:32:02.025198 ignition[1042]: INFO     : files: createFilesystemsFiles: createFiles: op(3): GET result: OK
Oct  2 21:32:02.134359 ignition[1042]: DEBUG    : files: createFilesystemsFiles: createFiles: op(3): file matches expected sum of: 5d0324ca8a3c90c680b6e1fddb245a2255582fa15949ba1f3c6bb7323df9d3af754dae98d6e40ac9ccafb2999c932df2c4288d418949a4915d928eb23c090540
Oct  2 21:32:02.134359 ignition[1042]: INFO     : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.3.0.tgz"
Oct  2 21:32:02.178671 ignition[1042]: INFO     : files: createFilesystemsFiles: createFiles: op(4): [started]  writing file "/sysroot/opt/crictl-v1.27.0-linux-amd64.tar.gz"
Oct  2 21:32:02.178671 ignition[1042]: INFO     : files: createFilesystemsFiles: createFiles: op(4): GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.27.0/crictl-v1.27.0-linux-amd64.tar.gz: attempt #1
Oct  2 21:32:02.401984 ignition[1042]: INFO     : files: createFilesystemsFiles: createFiles: op(4): GET result: OK
Oct  2 21:32:02.494326 ignition[1042]: DEBUG    : files: createFilesystemsFiles: createFiles: op(4): file matches expected sum of: aa622325bf05520939f9e020d7a28ab48ac23e2fae6f47d5a4e52174c88c1ebc31b464853e4fd65bd8f5331f330a6ca96fd370d247d3eeaed042da4ee2d1219a
Oct  2 21:32:02.494326 ignition[1042]: INFO     : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/crictl-v1.27.0-linux-amd64.tar.gz"
Oct  2 21:32:02.536710 ignition[1042]: INFO     : files: createFilesystemsFiles: createFiles: op(5): [started]  writing file "/sysroot/opt/bin/kubeadm"
Oct  2 21:32:02.536710 ignition[1042]: INFO     : files: createFilesystemsFiles: createFiles: op(5): GET https://storage.googleapis.com/kubernetes-release/release/v1.28.1/bin/linux/amd64/kubeadm: attempt #1
Oct  2 21:32:02.608959 ignition[1042]: INFO     : files: createFilesystemsFiles: createFiles: op(5): GET result: OK
Oct  2 21:32:03.043763 ignition[1042]: DEBUG    : files: createFilesystemsFiles: createFiles: op(5): file matches expected sum of: f4daad200c8378dfdc6cb69af28eaca4215f2b4a2dbdf75f29f9210171cb5683bc873fc000319022e6b3ad61175475d77190734713ba9136644394e8a8faafa1
Oct  2 21:32:03.067756 ignition[1042]: INFO     : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/opt/bin/kubeadm"
Oct  2 21:32:03.067756 ignition[1042]: INFO     : files: createFilesystemsFiles: createFiles: op(6): [started]  writing file "/sysroot/opt/bin/kubelet"
Oct  2 21:32:03.067756 ignition[1042]: INFO     : files: createFilesystemsFiles: createFiles: op(6): GET https://storage.googleapis.com/kubernetes-release/release/v1.28.1/bin/linux/amd64/kubelet: attempt #1
Oct  2 21:32:03.119726 ignition[1042]: INFO     : files: createFilesystemsFiles: createFiles: op(6): GET result: OK
Oct  2 21:32:03.756746 ignition[1042]: DEBUG    : files: createFilesystemsFiles: createFiles: op(6): file matches expected sum of: ce6ba764274162d38ac1c44e1fb1f0f835346f3afc5b508bb755b1b7d7170910f5812b0a1941b32e29d950e905bbd08ae761c87befad921db4d44969c8562e75
Oct  2 21:32:03.780761 ignition[1042]: INFO     : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/bin/kubelet"
Oct  2 21:32:03.780761 ignition[1042]: INFO     : files: createFilesystemsFiles: createFiles: op(7): [started]  writing file "/sysroot/opt/bin/kubectl"
Oct  2 21:32:03.780761 ignition[1042]: INFO     : files: createFilesystemsFiles: createFiles: op(7): GET https://storage.googleapis.com/kubernetes-release/release/v1.28.1/bin/linux/amd64/kubectl: attempt #1
Oct  2 21:32:03.835152 ignition[1042]: INFO     : files: createFilesystemsFiles: createFiles: op(7): GET result: OK
Oct  2 21:32:04.139456 ignition[1042]: DEBUG    : files: createFilesystemsFiles: createFiles: op(7): file matches expected sum of: 33cf3f6e37bcee4dff7ce14ab933c605d07353d4e31446dd2b52c3f05e0b150b60e531f6069f112d8a76331322a72b593537531e62104cfc7c70cb03d46f76b3
Oct  2 21:32:04.139456 ignition[1042]: INFO     : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/opt/bin/kubectl"
Oct  2 21:32:04.189687 kernel: BTRFS info: devid 1 device path /dev/sda6 changed to /dev/disk/by-label/OEM scanned by ignition (1045)
Oct  2 21:32:04.189703 ignition[1042]: INFO     : files: createFilesystemsFiles: createFiles: op(8): [started]  writing file "/sysroot/etc/docker/daemon.json"
Oct  2 21:32:04.189703 ignition[1042]: INFO     : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/docker/daemon.json"
Oct  2 21:32:04.189703 ignition[1042]: INFO     : files: createFilesystemsFiles: createFiles: op(9): [started]  writing file "/sysroot/home/core/install.sh"
Oct  2 21:32:04.189703 ignition[1042]: INFO     : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/home/core/install.sh"
Oct  2 21:32:04.189703 ignition[1042]: INFO     : files: createFilesystemsFiles: createFiles: op(a): [started]  writing file "/sysroot/home/core/nginx.yaml"
Oct  2 21:32:04.189703 ignition[1042]: INFO     : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/home/core/nginx.yaml"
Oct  2 21:32:04.189703 ignition[1042]: INFO     : files: createFilesystemsFiles: createFiles: op(b): [started]  writing file "/sysroot/etc/systemd/system/packet-phone-home.service"
Oct  2 21:32:04.189703 ignition[1042]: INFO     : files: createFilesystemsFiles: createFiles: op(b): oem config not found in "/usr/share/oem", looking on oem partition
Oct  2 21:32:04.189703 ignition[1042]: INFO     : files: createFilesystemsFiles: createFiles: op(b): op(c): [started]  mounting "/dev/disk/by-label/OEM" at "/mnt/oem2486658454"
Oct  2 21:32:04.189703 ignition[1042]: CRITICAL : files: createFilesystemsFiles: createFiles: op(b): op(c): [failed]   mounting "/dev/disk/by-label/OEM" at "/mnt/oem2486658454": device or resource busy
Oct  2 21:32:04.189703 ignition[1042]: ERROR    : files: createFilesystemsFiles: createFiles: op(b): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2486658454", trying btrfs: device or resource busy
Oct  2 21:32:04.189703 ignition[1042]: INFO     : files: createFilesystemsFiles: createFiles: op(b): op(d): [started]  mounting "/dev/disk/by-label/OEM" at "/mnt/oem2486658454"
Oct  2 21:32:04.189703 ignition[1042]: INFO     : files: createFilesystemsFiles: createFiles: op(b): op(d): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2486658454"
Oct  2 21:32:04.189703 ignition[1042]: INFO     : files: createFilesystemsFiles: createFiles: op(b): op(e): [started]  unmounting "/mnt/oem2486658454"
Oct  2 21:32:04.189703 ignition[1042]: INFO     : files: createFilesystemsFiles: createFiles: op(b): op(e): [finished] unmounting "/mnt/oem2486658454"
Oct  2 21:32:04.508652 kernel: audit: type=1130 audit(1696282324.388:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:32:04.388000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:32:04.366056 systemd[1]: Finished ignition-files.service.
Oct  2 21:32:04.517000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:32:04.526773 ignition[1042]: INFO     : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/etc/systemd/system/packet-phone-home.service"
Oct  2 21:32:04.526773 ignition[1042]: INFO     : files: op(f): [started]  processing unit "packet-phone-home.service"
Oct  2 21:32:04.526773 ignition[1042]: INFO     : files: op(f): [finished] processing unit "packet-phone-home.service"
Oct  2 21:32:04.526773 ignition[1042]: INFO     : files: op(10): [started]  processing unit "coreos-metadata-sshkeys@.service"
Oct  2 21:32:04.526773 ignition[1042]: INFO     : files: op(10): [finished] processing unit "coreos-metadata-sshkeys@.service"
Oct  2 21:32:04.526773 ignition[1042]: INFO     : files: op(11): [started]  processing unit "prepare-cni-plugins.service"
Oct  2 21:32:04.526773 ignition[1042]: INFO     : files: op(11): op(12): [started]  writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service"
Oct  2 21:32:04.526773 ignition[1042]: INFO     : files: op(11): op(12): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service"
Oct  2 21:32:04.526773 ignition[1042]: INFO     : files: op(11): [finished] processing unit "prepare-cni-plugins.service"
Oct  2 21:32:04.526773 ignition[1042]: INFO     : files: op(13): [started]  processing unit "prepare-critools.service"
Oct  2 21:32:04.526773 ignition[1042]: INFO     : files: op(13): op(14): [started]  writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service"
Oct  2 21:32:04.526773 ignition[1042]: INFO     : files: op(13): op(14): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service"
Oct  2 21:32:04.526773 ignition[1042]: INFO     : files: op(13): [finished] processing unit "prepare-critools.service"
Oct  2 21:32:04.526773 ignition[1042]: INFO     : files: op(15): [started]  setting preset to enabled for "packet-phone-home.service"
Oct  2 21:32:04.526773 ignition[1042]: INFO     : files: op(15): [finished] setting preset to enabled for "packet-phone-home.service"
Oct  2 21:32:04.526773 ignition[1042]: INFO     : files: op(16): [started]  setting preset to enabled for "coreos-metadata-sshkeys@.service "
Oct  2 21:32:04.526773 ignition[1042]: INFO     : files: op(16): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service "
Oct  2 21:32:04.526773 ignition[1042]: INFO     : files: op(17): [started]  setting preset to enabled for "prepare-cni-plugins.service"
Oct  2 21:32:04.526773 ignition[1042]: INFO     : files: op(17): [finished] setting preset to enabled for "prepare-cni-plugins.service"
Oct  2 21:32:04.533000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:32:04.533000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:32:04.600000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:32:04.600000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:32:04.700000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:32:04.821000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:32:04.396087 systemd[1]: Starting initrd-setup-root-after-ignition.service...
Oct  2 21:32:04.945789 ignition[1042]: INFO     : files: op(18): [started]  setting preset to enabled for "prepare-critools.service"
Oct  2 21:32:04.945789 ignition[1042]: INFO     : files: op(18): [finished] setting preset to enabled for "prepare-critools.service"
Oct  2 21:32:04.945789 ignition[1042]: INFO     : files: createResultFile: createFiles: op(19): [started]  writing file "/sysroot/etc/.ignition-result.json"
Oct  2 21:32:04.945789 ignition[1042]: INFO     : files: createResultFile: createFiles: op(19): [finished] writing file "/sysroot/etc/.ignition-result.json"
Oct  2 21:32:04.945789 ignition[1042]: INFO     : files: files passed
Oct  2 21:32:04.945789 ignition[1042]: INFO     : POST message to Packet Timeline
Oct  2 21:32:04.945789 ignition[1042]: INFO     : GET https://metadata.packet.net/metadata: attempt #1
Oct  2 21:32:04.945789 ignition[1042]: INFO     : GET result: OK
Oct  2 21:32:04.945789 ignition[1042]: INFO     : Ignition finished successfully
Oct  2 21:32:05.074000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:32:05.108000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:32:05.118984 initrd-setup-root-after-ignition[1077]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory
Oct  2 21:32:05.126000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:32:04.456723 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile).
Oct  2 21:32:04.457039 systemd[1]: Starting ignition-quench.service...
Oct  2 21:32:04.487896 systemd[1]: Finished initrd-setup-root-after-ignition.service.
Oct  2 21:32:04.519014 systemd[1]: ignition-quench.service: Deactivated successfully.
Oct  2 21:32:04.519104 systemd[1]: Finished ignition-quench.service.
Oct  2 21:32:05.320462 kernel: kauditd_printk_skb: 10 callbacks suppressed
Oct  2 21:32:05.320478 kernel: audit: type=1131 audit(1696282325.223:51): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:32:05.223000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:32:04.534889 systemd[1]: Reached target ignition-complete.target.
Oct  2 21:32:05.327000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:32:04.561567 systemd[1]: Starting initrd-parse-etc.service...
Oct  2 21:32:05.453963 kernel: audit: type=1131 audit(1696282325.327:52): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:32:05.453982 kernel: audit: type=1131 audit(1696282325.392:53): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:32:05.392000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:32:04.595315 systemd[1]: initrd-parse-etc.service: Deactivated successfully.
Oct  2 21:32:05.470703 ignition[1092]: INFO     : Ignition 2.14.0
Oct  2 21:32:05.470703 ignition[1092]: INFO     : Stage: umount
Oct  2 21:32:05.470703 ignition[1092]: INFO     : reading system config file "/usr/lib/ignition/base.d/base.ign"
Oct  2 21:32:05.470703 ignition[1092]: DEBUG    : parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4
Oct  2 21:32:05.470703 ignition[1092]: INFO     : no config dir at "/usr/lib/ignition/base.platform.d/packet"
Oct  2 21:32:05.470703 ignition[1092]: INFO     : umount: umount passed
Oct  2 21:32:05.470703 ignition[1092]: INFO     : POST message to Packet Timeline
Oct  2 21:32:05.470703 ignition[1092]: INFO     : GET https://metadata.packet.net/metadata: attempt #1
Oct  2 21:32:05.470703 ignition[1092]: INFO     : GET result: OK
Oct  2 21:32:05.798996 kernel: audit: type=1131 audit(1696282325.496:54): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:32:05.799013 kernel: audit: type=1131 audit(1696282325.606:55): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:32:05.799022 kernel: audit: type=1131 audit(1696282325.673:56): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:32:05.799029 kernel: audit: type=1131 audit(1696282325.740:57): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:32:05.496000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:32:05.606000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:32:05.673000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:32:05.740000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:32:05.799122 iscsid[894]: iscsid shutting down.
Oct  2 21:32:05.866016 kernel: audit: type=1131 audit(1696282325.806:58): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:32:05.806000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:32:04.595375 systemd[1]: Finished initrd-parse-etc.service.
Oct  2 21:32:05.931820 kernel: audit: type=1131 audit(1696282325.872:59): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:32:05.872000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:32:05.931853 ignition[1092]: INFO     : Ignition finished successfully
Oct  2 21:32:06.007665 kernel: audit: type=1130 audit(1696282325.939:60): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:32:05.939000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:32:05.939000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:32:04.601744 systemd[1]: Reached target initrd-fs.target.
Oct  2 21:32:04.628737 systemd[1]: Reached target initrd.target.
Oct  2 21:32:06.030000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:32:04.649907 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met.
Oct  2 21:32:06.046000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:32:04.652136 systemd[1]: Starting dracut-pre-pivot.service...
Oct  2 21:32:06.065000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:32:04.685743 systemd[1]: Finished dracut-pre-pivot.service.
Oct  2 21:32:06.082000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:32:04.703534 systemd[1]: Starting initrd-cleanup.service...
Oct  2 21:32:04.736296 systemd[1]: Stopped target nss-lookup.target.
Oct  2 21:32:06.110000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:32:04.757035 systemd[1]: Stopped target remote-cryptsetup.target.
Oct  2 21:32:04.783193 systemd[1]: Stopped target timers.target.
Oct  2 21:32:04.802123 systemd[1]: dracut-pre-pivot.service: Deactivated successfully.
Oct  2 21:32:04.802498 systemd[1]: Stopped dracut-pre-pivot.service.
Oct  2 21:32:04.823306 systemd[1]: Stopped target initrd.target.
Oct  2 21:32:06.186000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:32:04.843044 systemd[1]: Stopped target basic.target.
Oct  2 21:32:06.202000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:32:06.204000 audit: BPF prog-id=6 op=UNLOAD
Oct  2 21:32:04.865046 systemd[1]: Stopped target ignition-complete.target.
Oct  2 21:32:04.889037 systemd[1]: Stopped target ignition-diskful.target.
Oct  2 21:32:04.912030 systemd[1]: Stopped target initrd-root-device.target.
Oct  2 21:32:06.249000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:32:04.936142 systemd[1]: Stopped target remote-fs.target.
Oct  2 21:32:06.266000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:32:04.954033 systemd[1]: Stopped target remote-fs-pre.target.
Oct  2 21:32:06.282000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:32:04.975064 systemd[1]: Stopped target sysinit.target.
Oct  2 21:32:04.997052 systemd[1]: Stopped target local-fs.target.
Oct  2 21:32:06.313000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:32:05.021129 systemd[1]: Stopped target local-fs-pre.target.
Oct  2 21:32:05.046140 systemd[1]: Stopped target swap.target.
Oct  2 21:32:05.059923 systemd[1]: dracut-pre-mount.service: Deactivated successfully.
Oct  2 21:32:06.358000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:32:05.060278 systemd[1]: Stopped dracut-pre-mount.service.
Oct  2 21:32:06.375000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:32:05.076271 systemd[1]: Stopped target cryptsetup.target.
Oct  2 21:32:06.390000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:32:05.093931 systemd[1]: dracut-initqueue.service: Deactivated successfully.
Oct  2 21:32:05.094293 systemd[1]: Stopped dracut-initqueue.service.
Oct  2 21:32:06.420000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:32:05.110302 systemd[1]: ignition-fetch-offline.service: Deactivated successfully.
Oct  2 21:32:06.435000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:32:06.435000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:32:05.110676 systemd[1]: Stopped ignition-fetch-offline.service.
Oct  2 21:32:05.128263 systemd[1]: Stopped target paths.target.
Oct  2 21:32:05.148902 systemd[1]: systemd-ask-password-console.path: Deactivated successfully.
Oct  2 21:32:05.152782 systemd[1]: Stopped systemd-ask-password-console.path.
Oct  2 21:32:05.176131 systemd[1]: Stopped target slices.target.
Oct  2 21:32:05.190142 systemd[1]: Stopped target sockets.target.
Oct  2 21:32:05.207046 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully.
Oct  2 21:32:05.207427 systemd[1]: Stopped initrd-setup-root-after-ignition.service.
Oct  2 21:32:05.225175 systemd[1]: ignition-files.service: Deactivated successfully.
Oct  2 21:32:05.225644 systemd[1]: Stopped ignition-files.service.
Oct  2 21:32:05.328756 systemd[1]: flatcar-metadata-hostname.service: Deactivated successfully.
Oct  2 21:32:05.328874 systemd[1]: Stopped flatcar-metadata-hostname.service.
Oct  2 21:32:05.394701 systemd[1]: Stopping ignition-mount.service...
Oct  2 21:32:05.460835 systemd[1]: Stopping iscsid.service...
Oct  2 21:32:05.477655 systemd[1]: kmod-static-nodes.service: Deactivated successfully.
Oct  2 21:32:05.477727 systemd[1]: Stopped kmod-static-nodes.service.
Oct  2 21:32:05.498558 systemd[1]: Stopping sysroot-boot.service...
Oct  2 21:32:05.562663 systemd[1]: systemd-udev-trigger.service: Deactivated successfully.
Oct  2 21:32:06.589000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:32:05.562740 systemd[1]: Stopped systemd-udev-trigger.service.
Oct  2 21:32:05.607775 systemd[1]: dracut-pre-trigger.service: Deactivated successfully.
Oct  2 21:32:05.607913 systemd[1]: Stopped dracut-pre-trigger.service.
Oct  2 21:32:05.677181 systemd[1]: sysroot-boot.mount: Deactivated successfully.
Oct  2 21:32:05.677942 systemd[1]: iscsid.service: Deactivated successfully.
Oct  2 21:32:05.678020 systemd[1]: Stopped iscsid.service.
Oct  2 21:32:05.742117 systemd[1]: ignition-mount.service: Deactivated successfully.
Oct  2 21:32:05.742202 systemd[1]: Stopped ignition-mount.service.
Oct  2 21:32:05.808072 systemd[1]: sysroot-boot.service: Deactivated successfully.
Oct  2 21:32:05.808158 systemd[1]: Stopped sysroot-boot.service.
Oct  2 21:32:05.874767 systemd[1]: initrd-cleanup.service: Deactivated successfully.
Oct  2 21:32:05.874856 systemd[1]: Finished initrd-cleanup.service.
Oct  2 21:32:05.940804 systemd[1]: iscsid.socket: Deactivated successfully.
Oct  2 21:32:05.940847 systemd[1]: Closed iscsid.socket.
Oct  2 21:32:06.014671 systemd[1]: ignition-disks.service: Deactivated successfully.
Oct  2 21:32:06.014692 systemd[1]: Stopped ignition-disks.service.
Oct  2 21:32:06.031674 systemd[1]: ignition-kargs.service: Deactivated successfully.
Oct  2 21:32:06.031696 systemd[1]: Stopped ignition-kargs.service.
Oct  2 21:32:06.047640 systemd[1]: ignition-setup.service: Deactivated successfully.
Oct  2 21:32:06.047668 systemd[1]: Stopped ignition-setup.service.
Oct  2 21:32:06.066705 systemd[1]: initrd-setup-root.service: Deactivated successfully.
Oct  2 21:32:06.066760 systemd[1]: Stopped initrd-setup-root.service.
Oct  2 21:32:06.083983 systemd[1]: Stopping iscsiuio.service...
Oct  2 21:32:06.098231 systemd[1]: iscsiuio.service: Deactivated successfully.
Oct  2 21:32:06.098459 systemd[1]: Stopped iscsiuio.service.
Oct  2 21:32:06.112001 systemd[1]: Stopped target network.target.
Oct  2 21:32:06.126771 systemd[1]: iscsiuio.socket: Deactivated successfully.
Oct  2 21:32:06.126871 systemd[1]: Closed iscsiuio.socket.
Oct  2 21:32:06.143005 systemd[1]: Stopping systemd-networkd.service...
Oct  2 21:32:06.150611 systemd-networkd[869]: enp1s0f0np0: DHCPv6 lease lost
Oct  2 21:32:06.157894 systemd[1]: Stopping systemd-resolved.service...
Oct  2 21:32:06.158668 systemd-networkd[869]: enp1s0f1np1: DHCPv6 lease lost
Oct  2 21:32:06.701000 audit: BPF prog-id=9 op=UNLOAD
Oct  2 21:32:06.703468 systemd-journald[267]: Received SIGTERM from PID 1 (n/a).
Oct  2 21:32:06.173216 systemd[1]: systemd-resolved.service: Deactivated successfully.
Oct  2 21:32:06.173468 systemd[1]: Stopped systemd-resolved.service.
Oct  2 21:32:06.189121 systemd[1]: systemd-networkd.service: Deactivated successfully.
Oct  2 21:32:06.189360 systemd[1]: Stopped systemd-networkd.service.
Oct  2 21:32:06.204080 systemd[1]: systemd-networkd.socket: Deactivated successfully.
Oct  2 21:32:06.204171 systemd[1]: Closed systemd-networkd.socket.
Oct  2 21:32:06.220461 systemd[1]: Stopping network-cleanup.service...
Oct  2 21:32:06.233650 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully.
Oct  2 21:32:06.233892 systemd[1]: Stopped parse-ip-for-networkd.service.
Oct  2 21:32:06.251022 systemd[1]: systemd-sysctl.service: Deactivated successfully.
Oct  2 21:32:06.251169 systemd[1]: Stopped systemd-sysctl.service.
Oct  2 21:32:06.268117 systemd[1]: systemd-modules-load.service: Deactivated successfully.
Oct  2 21:32:06.268255 systemd[1]: Stopped systemd-modules-load.service.
Oct  2 21:32:06.284180 systemd[1]: Stopping systemd-udevd.service...
Oct  2 21:32:06.303657 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully.
Oct  2 21:32:06.305223 systemd[1]: systemd-udevd.service: Deactivated successfully.
Oct  2 21:32:06.305567 systemd[1]: Stopped systemd-udevd.service.
Oct  2 21:32:06.317451 systemd[1]: systemd-udevd-control.socket: Deactivated successfully.
Oct  2 21:32:06.317578 systemd[1]: Closed systemd-udevd-control.socket.
Oct  2 21:32:06.329777 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully.
Oct  2 21:32:06.329883 systemd[1]: Closed systemd-udevd-kernel.socket.
Oct  2 21:32:06.344719 systemd[1]: dracut-pre-udev.service: Deactivated successfully.
Oct  2 21:32:06.344873 systemd[1]: Stopped dracut-pre-udev.service.
Oct  2 21:32:06.359958 systemd[1]: dracut-cmdline.service: Deactivated successfully.
Oct  2 21:32:06.360105 systemd[1]: Stopped dracut-cmdline.service.
Oct  2 21:32:06.376796 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully.
Oct  2 21:32:06.376941 systemd[1]: Stopped dracut-cmdline-ask.service.
Oct  2 21:32:06.393876 systemd[1]: Starting initrd-udevadm-cleanup-db.service...
Oct  2 21:32:06.406645 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully.
Oct  2 21:32:06.406673 systemd[1]: Stopped systemd-vconsole-setup.service.
Oct  2 21:32:06.421807 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully.
Oct  2 21:32:06.421861 systemd[1]: Finished initrd-udevadm-cleanup-db.service.
Oct  2 21:32:06.579640 systemd[1]: network-cleanup.service: Deactivated successfully.
Oct  2 21:32:06.579876 systemd[1]: Stopped network-cleanup.service.
Oct  2 21:32:06.591035 systemd[1]: Reached target initrd-switch-root.target.
Oct  2 21:32:06.610592 systemd[1]: Starting initrd-switch-root.service...
Oct  2 21:32:06.650570 systemd[1]: Switching root.
Oct  2 21:32:06.704650 systemd-journald[267]: Journal stopped
Oct  2 21:32:10.605762 kernel: SELinux:  Class mctp_socket not defined in policy.
Oct  2 21:32:10.605775 kernel: SELinux:  Class anon_inode not defined in policy.
Oct  2 21:32:10.605783 kernel: SELinux: the above unknown classes and permissions will be allowed
Oct  2 21:32:10.605789 kernel: SELinux:  policy capability network_peer_controls=1
Oct  2 21:32:10.605793 kernel: SELinux:  policy capability open_perms=1
Oct  2 21:32:10.605798 kernel: SELinux:  policy capability extended_socket_class=1
Oct  2 21:32:10.605804 kernel: SELinux:  policy capability always_check_network=0
Oct  2 21:32:10.605809 kernel: SELinux:  policy capability cgroup_seclabel=1
Oct  2 21:32:10.605814 kernel: SELinux:  policy capability nnp_nosuid_transition=1
Oct  2 21:32:10.605820 kernel: SELinux:  policy capability genfs_seclabel_symlinks=0
Oct  2 21:32:10.605824 kernel: SELinux:  policy capability ioctl_skip_cloexec=0
Oct  2 21:32:10.605830 systemd[1]: Successfully loaded SELinux policy in 315.198ms.
Oct  2 21:32:10.605837 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 6.032ms.
Oct  2 21:32:10.605843 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified)
Oct  2 21:32:10.605850 systemd[1]: Detected architecture x86-64.
Oct  2 21:32:10.605856 systemd[1]: Detected first boot.
Oct  2 21:32:10.605861 systemd[1]: Hostname set to <ci-3510.3.0-a-a1bcd9ea1c>.
Oct  2 21:32:10.605867 systemd[1]: Initializing machine ID from random generator.
Oct  2 21:32:10.605873 systemd[1]: Populated /etc with preset unit settings.
Oct  2 21:32:10.605879 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon.
Oct  2 21:32:10.605885 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon.
Oct  2 21:32:10.605892 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly.
Oct  2 21:32:10.605898 systemd[1]: initrd-switch-root.service: Deactivated successfully.
Oct  2 21:32:10.605904 systemd[1]: Stopped initrd-switch-root.service.
Oct  2 21:32:10.605910 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1.
Oct  2 21:32:10.605916 systemd[1]: Created slice system-addon\x2dconfig.slice.
Oct  2 21:32:10.605922 systemd[1]: Created slice system-addon\x2drun.slice.
Oct  2 21:32:10.605928 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice.
Oct  2 21:32:10.605934 systemd[1]: Created slice system-getty.slice.
Oct  2 21:32:10.605940 systemd[1]: Created slice system-modprobe.slice.
Oct  2 21:32:10.605946 systemd[1]: Created slice system-serial\x2dgetty.slice.
Oct  2 21:32:10.605951 systemd[1]: Created slice system-system\x2dcloudinit.slice.
Oct  2 21:32:10.605957 systemd[1]: Created slice system-systemd\x2dfsck.slice.
Oct  2 21:32:10.605963 systemd[1]: Created slice user.slice.
Oct  2 21:32:10.605968 systemd[1]: Started systemd-ask-password-console.path.
Oct  2 21:32:10.605974 systemd[1]: Started systemd-ask-password-wall.path.
Oct  2 21:32:10.605981 systemd[1]: Set up automount boot.automount.
Oct  2 21:32:10.605986 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount.
Oct  2 21:32:10.605992 systemd[1]: Stopped target initrd-switch-root.target.
Oct  2 21:32:10.605998 systemd[1]: Stopped target initrd-fs.target.
Oct  2 21:32:10.606005 systemd[1]: Stopped target initrd-root-fs.target.
Oct  2 21:32:10.606011 systemd[1]: Reached target integritysetup.target.
Oct  2 21:32:10.606017 systemd[1]: Reached target remote-cryptsetup.target.
Oct  2 21:32:10.606023 systemd[1]: Reached target remote-fs.target.
Oct  2 21:32:10.606030 systemd[1]: Reached target slices.target.
Oct  2 21:32:10.606036 systemd[1]: Reached target swap.target.
Oct  2 21:32:10.606042 systemd[1]: Reached target torcx.target.
Oct  2 21:32:10.606048 systemd[1]: Reached target veritysetup.target.
Oct  2 21:32:10.606054 systemd[1]: Listening on systemd-coredump.socket.
Oct  2 21:32:10.606060 systemd[1]: Listening on systemd-initctl.socket.
Oct  2 21:32:10.606066 systemd[1]: Listening on systemd-networkd.socket.
Oct  2 21:32:10.606073 systemd[1]: Listening on systemd-udevd-control.socket.
Oct  2 21:32:10.606079 systemd[1]: Listening on systemd-udevd-kernel.socket.
Oct  2 21:32:10.606085 systemd[1]: Listening on systemd-userdbd.socket.
Oct  2 21:32:10.606091 systemd[1]: Mounting dev-hugepages.mount...
Oct  2 21:32:10.606098 systemd[1]: Mounting dev-mqueue.mount...
Oct  2 21:32:10.606104 systemd[1]: Mounting media.mount...
Oct  2 21:32:10.606110 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen).
Oct  2 21:32:10.606117 systemd[1]: Mounting sys-kernel-debug.mount...
Oct  2 21:32:10.606123 systemd[1]: Mounting sys-kernel-tracing.mount...
Oct  2 21:32:10.606129 systemd[1]: Mounting tmp.mount...
Oct  2 21:32:10.606135 systemd[1]: Starting flatcar-tmpfiles.service...
Oct  2 21:32:10.606141 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met.
Oct  2 21:32:10.606147 systemd[1]: Starting kmod-static-nodes.service...
Oct  2 21:32:10.606153 systemd[1]: Starting modprobe@configfs.service...
Oct  2 21:32:10.606160 systemd[1]: Starting modprobe@dm_mod.service...
Oct  2 21:32:10.606166 systemd[1]: Starting modprobe@drm.service...
Oct  2 21:32:10.606173 systemd[1]: Starting modprobe@efi_pstore.service...
Oct  2 21:32:10.606179 systemd[1]: Starting modprobe@fuse.service...
Oct  2 21:32:10.606185 kernel: fuse: init (API version 7.34)
Oct  2 21:32:10.606191 systemd[1]: Starting modprobe@loop.service...
Oct  2 21:32:10.606197 kernel: loop: module loaded
Oct  2 21:32:10.606203 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf).
Oct  2 21:32:10.606209 systemd[1]: systemd-fsck-root.service: Deactivated successfully.
Oct  2 21:32:10.606215 systemd[1]: Stopped systemd-fsck-root.service.
Oct  2 21:32:10.606221 systemd[1]: systemd-fsck-usr.service: Deactivated successfully.
Oct  2 21:32:10.606228 kernel: kauditd_printk_skb: 51 callbacks suppressed
Oct  2 21:32:10.606234 kernel: audit: type=1131 audit(1696282330.245:112): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:32:10.606240 systemd[1]: Stopped systemd-fsck-usr.service.
Oct  2 21:32:10.606246 kernel: audit: type=1131 audit(1696282330.333:113): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:32:10.606252 systemd[1]: Stopped systemd-journald.service.
Oct  2 21:32:10.606258 kernel: audit: type=1130 audit(1696282330.397:114): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:32:10.606265 kernel: audit: type=1131 audit(1696282330.397:115): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:32:10.606270 kernel: audit: type=1334 audit(1696282330.483:116): prog-id=21 op=LOAD
Oct  2 21:32:10.606276 kernel: audit: type=1334 audit(1696282330.501:117): prog-id=22 op=LOAD
Oct  2 21:32:10.606281 kernel: audit: type=1334 audit(1696282330.519:118): prog-id=23 op=LOAD
Oct  2 21:32:10.606287 kernel: audit: type=1334 audit(1696282330.537:119): prog-id=19 op=UNLOAD
Oct  2 21:32:10.606292 systemd[1]: Starting systemd-journald.service...
Oct  2 21:32:10.606298 kernel: audit: type=1334 audit(1696282330.537:120): prog-id=20 op=UNLOAD
Oct  2 21:32:10.606304 systemd[1]: Starting systemd-modules-load.service...
Oct  2 21:32:10.606310 kernel: audit: type=1305 audit(1696282330.602:121): op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1
Oct  2 21:32:10.606319 systemd-journald[1244]: Journal started
Oct  2 21:32:10.606342 systemd-journald[1244]: Runtime Journal (/run/log/journal/5f74382ea3f04ed99af4e278a6e73398) is 8.0M, max 640.1M, 632.1M free.
Oct  2 21:32:07.126000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1
Oct  2 21:32:07.395000 audit[1]: AVC avc:  denied  { integrity } for  pid=1 comm="systemd" lockdown_reason="/dev/mem,kmem,port" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1
Oct  2 21:32:07.398000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1
Oct  2 21:32:07.398000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1
Oct  2 21:32:07.398000 audit: BPF prog-id=10 op=LOAD
Oct  2 21:32:07.398000 audit: BPF prog-id=10 op=UNLOAD
Oct  2 21:32:07.398000 audit: BPF prog-id=11 op=LOAD
Oct  2 21:32:07.398000 audit: BPF prog-id=11 op=UNLOAD
Oct  2 21:32:08.996000 audit: BPF prog-id=12 op=LOAD
Oct  2 21:32:08.996000 audit: BPF prog-id=3 op=UNLOAD
Oct  2 21:32:08.996000 audit: BPF prog-id=13 op=LOAD
Oct  2 21:32:08.996000 audit: BPF prog-id=14 op=LOAD
Oct  2 21:32:08.997000 audit: BPF prog-id=4 op=UNLOAD
Oct  2 21:32:08.997000 audit: BPF prog-id=5 op=UNLOAD
Oct  2 21:32:08.997000 audit: BPF prog-id=15 op=LOAD
Oct  2 21:32:08.997000 audit: BPF prog-id=12 op=UNLOAD
Oct  2 21:32:08.997000 audit: BPF prog-id=16 op=LOAD
Oct  2 21:32:08.998000 audit: BPF prog-id=17 op=LOAD
Oct  2 21:32:08.998000 audit: BPF prog-id=13 op=UNLOAD
Oct  2 21:32:08.998000 audit: BPF prog-id=14 op=UNLOAD
Oct  2 21:32:08.998000 audit: BPF prog-id=18 op=LOAD
Oct  2 21:32:08.998000 audit: BPF prog-id=15 op=UNLOAD
Oct  2 21:32:08.998000 audit: BPF prog-id=19 op=LOAD
Oct  2 21:32:08.998000 audit: BPF prog-id=20 op=LOAD
Oct  2 21:32:08.998000 audit: BPF prog-id=16 op=UNLOAD
Oct  2 21:32:08.998000 audit: BPF prog-id=17 op=UNLOAD
Oct  2 21:32:08.999000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:32:09.050000 audit: BPF prog-id=18 op=UNLOAD
Oct  2 21:32:09.053000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:32:09.053000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:32:10.245000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:32:10.333000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:32:10.397000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:32:10.397000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:32:10.483000 audit: BPF prog-id=21 op=LOAD
Oct  2 21:32:10.501000 audit: BPF prog-id=22 op=LOAD
Oct  2 21:32:10.519000 audit: BPF prog-id=23 op=LOAD
Oct  2 21:32:10.537000 audit: BPF prog-id=19 op=UNLOAD
Oct  2 21:32:10.537000 audit: BPF prog-id=20 op=UNLOAD
Oct  2 21:32:10.602000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1
Oct  2 21:32:08.996638 systemd[1]: Queued start job for default target multi-user.target.
Oct  2 21:32:07.470410 /usr/lib/systemd/system-generators/torcx-generator[1134]: time="2023-10-02T21:32:07Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.0 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.0 /var/lib/torcx/store]"
Oct  2 21:32:09.000346 systemd[1]: systemd-journald.service: Deactivated successfully.
Oct  2 21:32:07.470831 /usr/lib/systemd/system-generators/torcx-generator[1134]: time="2023-10-02T21:32:07Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json
Oct  2 21:32:07.470845 /usr/lib/systemd/system-generators/torcx-generator[1134]: time="2023-10-02T21:32:07Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json
Oct  2 21:32:07.470867 /usr/lib/systemd/system-generators/torcx-generator[1134]: time="2023-10-02T21:32:07Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12"
Oct  2 21:32:07.470874 /usr/lib/systemd/system-generators/torcx-generator[1134]: time="2023-10-02T21:32:07Z" level=debug msg="skipped missing lower profile" missing profile=oem
Oct  2 21:32:07.470896 /usr/lib/systemd/system-generators/torcx-generator[1134]: time="2023-10-02T21:32:07Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory"
Oct  2 21:32:07.470905 /usr/lib/systemd/system-generators/torcx-generator[1134]: time="2023-10-02T21:32:07Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)=
Oct  2 21:32:07.471040 /usr/lib/systemd/system-generators/torcx-generator[1134]: time="2023-10-02T21:32:07Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack
Oct  2 21:32:07.471066 /usr/lib/systemd/system-generators/torcx-generator[1134]: time="2023-10-02T21:32:07Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json
Oct  2 21:32:07.471075 /usr/lib/systemd/system-generators/torcx-generator[1134]: time="2023-10-02T21:32:07Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json
Oct  2 21:32:07.471501 /usr/lib/systemd/system-generators/torcx-generator[1134]: time="2023-10-02T21:32:07Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10
Oct  2 21:32:07.471525 /usr/lib/systemd/system-generators/torcx-generator[1134]: time="2023-10-02T21:32:07Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl
Oct  2 21:32:07.471538 /usr/lib/systemd/system-generators/torcx-generator[1134]: time="2023-10-02T21:32:07Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.0: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.0
Oct  2 21:32:07.471548 /usr/lib/systemd/system-generators/torcx-generator[1134]: time="2023-10-02T21:32:07Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store
Oct  2 21:32:07.471560 /usr/lib/systemd/system-generators/torcx-generator[1134]: time="2023-10-02T21:32:07Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.0: no such file or directory" path=/var/lib/torcx/store/3510.3.0
Oct  2 21:32:07.471569 /usr/lib/systemd/system-generators/torcx-generator[1134]: time="2023-10-02T21:32:07Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store
Oct  2 21:32:08.646400 /usr/lib/systemd/system-generators/torcx-generator[1134]: time="2023-10-02T21:32:08Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl
Oct  2 21:32:08.646560 /usr/lib/systemd/system-generators/torcx-generator[1134]: time="2023-10-02T21:32:08Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl
Oct  2 21:32:08.646622 /usr/lib/systemd/system-generators/torcx-generator[1134]: time="2023-10-02T21:32:08Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl
Oct  2 21:32:08.647029 /usr/lib/systemd/system-generators/torcx-generator[1134]: time="2023-10-02T21:32:08Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl
Oct  2 21:32:08.647078 /usr/lib/systemd/system-generators/torcx-generator[1134]: time="2023-10-02T21:32:08Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile=
Oct  2 21:32:08.647123 /usr/lib/systemd/system-generators/torcx-generator[1134]: time="2023-10-02T21:32:08Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx
Oct  2 21:32:10.602000 audit[1244]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=6 a1=7fff236fdc10 a2=4000 a3=7fff236fdcac items=0 ppid=1 pid=1244 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:32:10.602000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald"
Oct  2 21:32:10.684636 systemd[1]: Starting systemd-network-generator.service...
Oct  2 21:32:10.711483 systemd[1]: Starting systemd-remount-fs.service...
Oct  2 21:32:10.738493 systemd[1]: Starting systemd-udev-trigger.service...
Oct  2 21:32:10.781222 systemd[1]: verity-setup.service: Deactivated successfully.
Oct  2 21:32:10.781244 systemd[1]: Stopped verity-setup.service.
Oct  2 21:32:10.788000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:32:10.827482 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen).
Oct  2 21:32:10.847628 systemd[1]: Started systemd-journald.service.
Oct  2 21:32:10.854000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:32:10.856068 systemd[1]: Mounted dev-hugepages.mount.
Oct  2 21:32:10.864720 systemd[1]: Mounted dev-mqueue.mount.
Oct  2 21:32:10.871701 systemd[1]: Mounted media.mount.
Oct  2 21:32:10.878718 systemd[1]: Mounted sys-kernel-debug.mount.
Oct  2 21:32:10.887712 systemd[1]: Mounted sys-kernel-tracing.mount.
Oct  2 21:32:10.896692 systemd[1]: Mounted tmp.mount.
Oct  2 21:32:10.903773 systemd[1]: Finished flatcar-tmpfiles.service.
Oct  2 21:32:10.911000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:32:10.912782 systemd[1]: Finished kmod-static-nodes.service.
Oct  2 21:32:10.920000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:32:10.921803 systemd[1]: modprobe@configfs.service: Deactivated successfully.
Oct  2 21:32:10.921909 systemd[1]: Finished modprobe@configfs.service.
Oct  2 21:32:10.929000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:32:10.929000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:32:10.930908 systemd[1]: modprobe@dm_mod.service: Deactivated successfully.
Oct  2 21:32:10.931034 systemd[1]: Finished modprobe@dm_mod.service.
Oct  2 21:32:10.938000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:32:10.938000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:32:10.939999 systemd[1]: modprobe@drm.service: Deactivated successfully.
Oct  2 21:32:10.940145 systemd[1]: Finished modprobe@drm.service.
Oct  2 21:32:10.947000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:32:10.947000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:32:10.949104 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully.
Oct  2 21:32:10.949322 systemd[1]: Finished modprobe@efi_pstore.service.
Oct  2 21:32:10.956000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:32:10.956000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:32:10.958287 systemd[1]: modprobe@fuse.service: Deactivated successfully.
Oct  2 21:32:10.958613 systemd[1]: Finished modprobe@fuse.service.
Oct  2 21:32:10.965000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:32:10.965000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:32:10.967267 systemd[1]: modprobe@loop.service: Deactivated successfully.
Oct  2 21:32:10.967595 systemd[1]: Finished modprobe@loop.service.
Oct  2 21:32:10.974000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:32:10.974000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:32:10.976286 systemd[1]: Finished systemd-modules-load.service.
Oct  2 21:32:10.983000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:32:10.985239 systemd[1]: Finished systemd-network-generator.service.
Oct  2 21:32:10.993000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:32:10.995481 systemd[1]: Finished systemd-remount-fs.service.
Oct  2 21:32:11.003000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:32:11.005313 systemd[1]: Finished systemd-udev-trigger.service.
Oct  2 21:32:11.013000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:32:11.015841 systemd[1]: Reached target network-pre.target.
Oct  2 21:32:11.027620 systemd[1]: Mounting sys-fs-fuse-connections.mount...
Oct  2 21:32:11.038545 systemd[1]: Mounting sys-kernel-config.mount...
Oct  2 21:32:11.045712 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/).
Oct  2 21:32:11.046706 systemd[1]: Starting systemd-hwdb-update.service...
Oct  2 21:32:11.054028 systemd[1]: Starting systemd-journal-flush.service...
Oct  2 21:32:11.057538 systemd-journald[1244]: Time spent on flushing to /var/log/journal/5f74382ea3f04ed99af4e278a6e73398 is 15.285ms for 1598 entries.
Oct  2 21:32:11.057538 systemd-journald[1244]: System Journal (/var/log/journal/5f74382ea3f04ed99af4e278a6e73398) is 8.0M, max 195.6M, 187.6M free.
Oct  2 21:32:11.096752 systemd-journald[1244]: Received client request to flush runtime journal.
Oct  2 21:32:11.070557 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore).
Oct  2 21:32:11.071048 systemd[1]: Starting systemd-random-seed.service...
Oct  2 21:32:11.085566 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met.
Oct  2 21:32:11.086090 systemd[1]: Starting systemd-sysctl.service...
Oct  2 21:32:11.093216 systemd[1]: Starting systemd-sysusers.service...
Oct  2 21:32:11.100083 systemd[1]: Starting systemd-udev-settle.service...
Oct  2 21:32:11.107579 systemd[1]: Mounted sys-fs-fuse-connections.mount.
Oct  2 21:32:11.115621 systemd[1]: Mounted sys-kernel-config.mount.
Oct  2 21:32:11.123696 systemd[1]: Finished systemd-journal-flush.service.
Oct  2 21:32:11.130000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:32:11.131686 systemd[1]: Finished systemd-random-seed.service.
Oct  2 21:32:11.138000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:32:11.139713 systemd[1]: Finished systemd-sysctl.service.
Oct  2 21:32:11.146000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:32:11.147664 systemd[1]: Finished systemd-sysusers.service.
Oct  2 21:32:11.154000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:32:11.156688 systemd[1]: Reached target first-boot-complete.target.
Oct  2 21:32:11.164768 udevadm[1261]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in.
Oct  2 21:32:11.364955 systemd[1]: Finished systemd-hwdb-update.service.
Oct  2 21:32:11.373000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:32:11.373000 audit: BPF prog-id=24 op=LOAD
Oct  2 21:32:11.373000 audit: BPF prog-id=25 op=LOAD
Oct  2 21:32:11.373000 audit: BPF prog-id=7 op=UNLOAD
Oct  2 21:32:11.373000 audit: BPF prog-id=8 op=UNLOAD
Oct  2 21:32:11.375734 systemd[1]: Starting systemd-udevd.service...
Oct  2 21:32:11.386773 systemd-udevd[1262]: Using default interface naming scheme 'v252'.
Oct  2 21:32:11.407760 systemd[1]: Started systemd-udevd.service.
Oct  2 21:32:11.414000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:32:11.417394 systemd[1]: Condition check resulted in dev-ttyS1.device being skipped.
Oct  2 21:32:11.416000 audit: BPF prog-id=26 op=LOAD
Oct  2 21:32:11.418541 systemd[1]: Starting systemd-networkd.service...
Oct  2 21:32:11.462144 kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0E:00/input/input2
Oct  2 21:32:11.462196 kernel: ACPI: button: Sleep Button [SLPB]
Oct  2 21:32:11.462210 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/sda6 scanned by (udev-worker) (1278)
Oct  2 21:32:11.486664 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input3
Oct  2 21:32:11.506000 audit: BPF prog-id=27 op=LOAD
Oct  2 21:32:11.506000 audit: BPF prog-id=28 op=LOAD
Oct  2 21:32:11.506000 audit: BPF prog-id=29 op=LOAD
Oct  2 21:32:11.508517 systemd[1]: Starting systemd-userdbd.service...
Oct  2 21:32:11.547140 kernel: mousedev: PS/2 mouse device common for all mice
Oct  2 21:32:11.547225 kernel: ACPI: button: Power Button [PWRF]
Oct  2 21:32:11.534878 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device.
Oct  2 21:32:11.457000 audit[1321]: AVC avc:  denied  { confidentiality } for  pid=1321 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1
Oct  2 21:32:11.457000 audit[1321]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55f226d21d80 a1=4d8bc a2=7ff17d6c3bc5 a3=5 items=40 ppid=1262 pid=1321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:32:11.457000 audit: CWD cwd="/"
Oct  2 21:32:11.457000 audit: PATH item=0 name=(null) inode=24694 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 21:32:11.457000 audit: PATH item=1 name=(null) inode=24695 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 21:32:11.457000 audit: PATH item=2 name=(null) inode=24694 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 21:32:11.457000 audit: PATH item=3 name=(null) inode=24696 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 21:32:11.457000 audit: PATH item=4 name=(null) inode=24694 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 21:32:11.457000 audit: PATH item=5 name=(null) inode=24697 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 21:32:11.457000 audit: PATH item=6 name=(null) inode=24697 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 21:32:11.457000 audit: PATH item=7 name=(null) inode=24698 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 21:32:11.457000 audit: PATH item=8 name=(null) inode=24697 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 21:32:11.457000 audit: PATH item=9 name=(null) inode=24699 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 21:32:11.457000 audit: PATH item=10 name=(null) inode=24697 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 21:32:11.457000 audit: PATH item=11 name=(null) inode=24700 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 21:32:11.457000 audit: PATH item=12 name=(null) inode=24697 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 21:32:11.457000 audit: PATH item=13 name=(null) inode=24701 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 21:32:11.457000 audit: PATH item=14 name=(null) inode=24697 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 21:32:11.457000 audit: PATH item=15 name=(null) inode=24702 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 21:32:11.457000 audit: PATH item=16 name=(null) inode=24694 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 21:32:11.457000 audit: PATH item=17 name=(null) inode=24703 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 21:32:11.457000 audit: PATH item=18 name=(null) inode=24703 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 21:32:11.457000 audit: PATH item=19 name=(null) inode=24704 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 21:32:11.457000 audit: PATH item=20 name=(null) inode=24703 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 21:32:11.457000 audit: PATH item=21 name=(null) inode=24705 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 21:32:11.457000 audit: PATH item=22 name=(null) inode=24703 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 21:32:11.457000 audit: PATH item=23 name=(null) inode=24706 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 21:32:11.457000 audit: PATH item=24 name=(null) inode=24703 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 21:32:11.457000 audit: PATH item=25 name=(null) inode=24707 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 21:32:11.457000 audit: PATH item=26 name=(null) inode=24703 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 21:32:11.457000 audit: PATH item=27 name=(null) inode=24708 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 21:32:11.457000 audit: PATH item=28 name=(null) inode=24694 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 21:32:11.457000 audit: PATH item=29 name=(null) inode=24709 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 21:32:11.457000 audit: PATH item=30 name=(null) inode=24709 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 21:32:11.457000 audit: PATH item=31 name=(null) inode=24710 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 21:32:11.457000 audit: PATH item=32 name=(null) inode=24709 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 21:32:11.457000 audit: PATH item=33 name=(null) inode=24711 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 21:32:11.457000 audit: PATH item=34 name=(null) inode=24709 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 21:32:11.457000 audit: PATH item=35 name=(null) inode=24712 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 21:32:11.457000 audit: PATH item=36 name=(null) inode=24709 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 21:32:11.457000 audit: PATH item=37 name=(null) inode=24713 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 21:32:11.457000 audit: PATH item=38 name=(null) inode=24709 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 21:32:11.457000 audit: PATH item=39 name=(null) inode=24714 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 21:32:11.457000 audit: PROCTITLE proctitle="(udev-worker)"
Oct  2 21:32:11.610444 kernel: IPMI message handler: version 39.2
Oct  2 21:32:11.610469 kernel: i801_smbus 0000:00:1f.4: SPD Write Disable is set
Oct  2 21:32:11.648955 kernel: i801_smbus 0000:00:1f.4: SMBus using PCI interrupt
Oct  2 21:32:11.670449 kernel: i2c i2c-0: 2/4 memory slots populated (from DMI)
Oct  2 21:32:11.679883 systemd[1]: Started systemd-userdbd.service.
Oct  2 21:32:11.686000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:32:11.716445 kernel: mei_me 0000:00:16.4: Device doesn't have valid ME Interface
Oct  2 21:32:11.716570 kernel: mei_me 0000:00:16.0: Device doesn't have valid ME Interface
Oct  2 21:32:11.736447 kernel: iTCO_vendor_support: vendor-support=0
Oct  2 21:32:11.736471 kernel: ipmi device interface
Oct  2 21:32:11.818915 kernel: ipmi_si: IPMI System Interface driver
Oct  2 21:32:11.818994 kernel: iTCO_wdt iTCO_wdt: Found a Intel PCH TCO device (Version=6, TCOBASE=0x0400)
Oct  2 21:32:11.819118 kernel: ipmi_si dmi-ipmi-si.0: ipmi_platform: probing via SMBIOS
Oct  2 21:32:11.819212 kernel: iTCO_wdt iTCO_wdt: initialized. heartbeat=30 sec (nowayout=0)
Oct  2 21:32:11.838718 kernel: ipmi_platform: ipmi_si: SMBIOS: io 0xca2 regsize 1 spacing 1 irq 0
Oct  2 21:32:11.838746 kernel: ipmi_si: Adding SMBIOS-specified kcs state machine
Oct  2 21:32:11.858946 kernel: ipmi_si IPI0001:00: ipmi_platform: probing via ACPI
Oct  2 21:32:11.918447 kernel: ipmi_si IPI0001:00: ipmi_platform: [io  0x0ca2] regsize 1 spacing 1 irq 0
Oct  2 21:32:11.982130 systemd-networkd[1301]: bond0: netdev ready
Oct  2 21:32:11.982733 kernel: ipmi_si dmi-ipmi-si.0: Removing SMBIOS-specified kcs state machine in favor of ACPI
Oct  2 21:32:11.982866 kernel: ipmi_si: Adding ACPI-specified kcs state machine
Oct  2 21:32:11.982880 kernel: ipmi_si: Trying ACPI-specified kcs state machine at i/o address 0xca2, slave address 0x20, irq 0
Oct  2 21:32:11.984418 systemd-networkd[1301]: lo: Link UP
Oct  2 21:32:11.984421 systemd-networkd[1301]: lo: Gained carrier
Oct  2 21:32:11.985477 systemd-networkd[1301]: Enumeration completed
Oct  2 21:32:11.985564 systemd[1]: Started systemd-networkd.service.
Oct  2 21:32:11.985753 systemd-networkd[1301]: bond0: Configuring with /etc/systemd/network/05-bond0.network.
Oct  2 21:32:11.986540 systemd-networkd[1301]: enp1s0f1np1: Configuring with /etc/systemd/network/10-0c:42:a1:97:f6:8d.network.
Oct  2 21:32:12.005444 kernel: intel_rapl_common: Found RAPL domain package
Oct  2 21:32:12.017000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:32:12.040273 kernel: intel_rapl_common: Found RAPL domain core
Oct  2 21:32:12.040304 kernel: ipmi_si IPI0001:00: The BMC does not support clearing the recv irq bit, compensating, but the BMC needs to be fixed.
Oct  2 21:32:12.040393 kernel: intel_rapl_common: Found RAPL domain dram
Oct  2 21:32:12.118493 kernel: ipmi_si IPI0001:00: IPMI message handler: Found new BMC (man_id: 0x002a7c, prod_id: 0x1b0f, dev_id: 0x20)
Oct  2 21:32:12.218485 kernel: ipmi_si IPI0001:00: IPMI kcs interface initialized
Oct  2 21:32:12.237494 kernel: ipmi_ssif: IPMI SSIF Interface driver
Oct  2 21:32:12.239671 systemd[1]: Finished systemd-udev-settle.service.
Oct  2 21:32:12.246000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:32:12.248127 systemd[1]: Starting lvm2-activation-early.service...
Oct  2 21:32:12.264679 lvm[1364]:   WARNING: Failed to connect to lvmetad. Falling back to device scanning.
Oct  2 21:32:12.291834 systemd[1]: Finished lvm2-activation-early.service.
Oct  2 21:32:12.300000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:32:12.301551 systemd[1]: Reached target cryptsetup.target.
Oct  2 21:32:12.311060 systemd[1]: Starting lvm2-activation.service...
Oct  2 21:32:12.313158 lvm[1365]:   WARNING: Failed to connect to lvmetad. Falling back to device scanning.
Oct  2 21:32:12.345837 systemd[1]: Finished lvm2-activation.service.
Oct  2 21:32:12.353000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:32:12.354517 systemd[1]: Reached target local-fs-pre.target.
Oct  2 21:32:12.363522 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw).
Oct  2 21:32:12.363536 systemd[1]: Reached target local-fs.target.
Oct  2 21:32:12.372473 systemd[1]: Reached target machines.target.
Oct  2 21:32:12.382057 systemd[1]: Starting ldconfig.service...
Oct  2 21:32:12.389859 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met.
Oct  2 21:32:12.389880 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f).
Oct  2 21:32:12.390375 systemd[1]: Starting systemd-boot-update.service...
Oct  2 21:32:12.398943 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service...
Oct  2 21:32:12.410067 systemd[1]: Starting systemd-machine-id-commit.service...
Oct  2 21:32:12.410154 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met.
Oct  2 21:32:12.410178 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met.
Oct  2 21:32:12.410751 systemd[1]: Starting systemd-tmpfiles-setup.service...
Oct  2 21:32:12.410971 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1367 (bootctl)
Oct  2 21:32:12.411703 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service...
Oct  2 21:32:12.431815 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service.
Oct  2 21:32:12.430000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:32:12.589474 kernel: mlx5_core 0000:01:00.1 enp1s0f1np1: Link up
Oct  2 21:32:12.614318 systemd-networkd[1301]: enp1s0f0np0: Configuring with /etc/systemd/network/10-0c:42:a1:97:f6:8c.network.
Oct  2 21:32:12.614444 kernel: bond0: (slave enp1s0f1np1): Enslaving as a backup interface with an up link
Oct  2 21:32:12.614464 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond
Oct  2 21:32:12.616247 systemd-tmpfiles[1371]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring.
Oct  2 21:32:12.635494 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready
Oct  2 21:32:12.755038 systemd-tmpfiles[1371]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring.
Oct  2 21:32:12.758479 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond
Oct  2 21:32:12.809487 kernel: mlx5_core 0000:01:00.0 enp1s0f0np0: Link up
Oct  2 21:32:12.833500 kernel: bond0: (slave enp1s0f0np0): Enslaving as a backup interface with an up link
Oct  2 21:32:12.834753 systemd-networkd[1301]: bond0: Link UP
Oct  2 21:32:12.834938 systemd-networkd[1301]: enp1s0f1np1: Link UP
Oct  2 21:32:12.835051 systemd-networkd[1301]: enp1s0f1np1: Gained carrier
Oct  2 21:32:12.835993 systemd-networkd[1301]: enp1s0f1np1: Reconfiguring with /etc/systemd/network/10-0c:42:a1:97:f6:8c.network.
Oct  2 21:32:12.862082 systemd-tmpfiles[1371]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring.
Oct  2 21:32:12.872899 kernel: bond0: (slave enp1s0f1np1): link status definitely up, 10000 Mbps full duplex
Oct  2 21:32:12.872934 kernel: bond0: active interface up!
Oct  2 21:32:12.894469 kernel: bond0: (slave enp1s0f0np0): link status definitely up, 10000 Mbps full duplex
Oct  2 21:32:12.924133 systemd[1]: etc-machine\x2did.mount: Deactivated successfully.
Oct  2 21:32:12.924470 systemd[1]: Finished systemd-machine-id-commit.service.
Oct  2 21:32:12.923000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:32:12.944481 systemd-fsck[1375]: fsck.fat 4.2 (2021-01-31)
Oct  2 21:32:12.944481 systemd-fsck[1375]: /dev/sda1: 789 files, 115069/258078 clusters
Oct  2 21:32:12.945299 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service.
Oct  2 21:32:12.953000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:32:12.956632 systemd[1]: Mounting boot.mount...
Oct  2 21:32:12.967890 systemd[1]: Mounted boot.mount.
Oct  2 21:32:12.980018 systemd-networkd[1301]: bond0: Gained carrier
Oct  2 21:32:12.980185 systemd-networkd[1301]: enp1s0f0np0: Link UP
Oct  2 21:32:12.980300 systemd-networkd[1301]: enp1s0f0np0: Gained carrier
Oct  2 21:32:12.986270 systemd[1]: Finished systemd-boot-update.service.
Oct  2 21:32:12.993000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:32:12.995760 systemd-networkd[1301]: enp1s0f1np1: Link DOWN
Oct  2 21:32:12.995763 systemd-networkd[1301]: enp1s0f1np1: Lost carrier
Oct  2 21:32:13.014458 systemd[1]: Finished systemd-tmpfiles-setup.service.
Oct  2 21:32:13.036000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:32:13.038189 systemd[1]: Starting audit-rules.service...
Oct  2 21:32:13.039906 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms
Oct  2 21:32:13.039939 kernel: bond0: (slave enp1s0f1np1): invalid new link 1 on slave
Oct  2 21:32:13.048040 systemd[1]: Starting clean-ca-certificates.service...
Oct  2 21:32:13.055000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1
Oct  2 21:32:13.055000 audit[1395]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc88e49580 a2=420 a3=0 items=0 ppid=1379 pid=1395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:32:13.055000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573
Oct  2 21:32:13.057368 augenrules[1395]: No rules
Oct  2 21:32:13.058054 systemd[1]: Starting systemd-journal-catalog-update.service...
Oct  2 21:32:13.068414 systemd[1]: Starting systemd-resolved.service...
Oct  2 21:32:13.077329 systemd[1]: Starting systemd-timesyncd.service...
Oct  2 21:32:13.085978 systemd[1]: Starting systemd-update-utmp.service...
Oct  2 21:32:13.092724 systemd[1]: Finished audit-rules.service.
Oct  2 21:32:13.099598 systemd[1]: Finished clean-ca-certificates.service.
Oct  2 21:32:13.107586 systemd[1]: Finished systemd-journal-catalog-update.service.
Oct  2 21:32:13.118631 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt).
Oct  2 21:32:13.119276 systemd[1]: Finished systemd-update-utmp.service.
Oct  2 21:32:13.144030 systemd[1]: Started systemd-timesyncd.service.
Oct  2 21:32:13.149569 systemd-resolved[1401]: Positive Trust Anchors:
Oct  2 21:32:13.149576 systemd-resolved[1401]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d
Oct  2 21:32:13.149596 systemd-resolved[1401]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test
Oct  2 21:32:13.153551 systemd[1]: Reached target time-set.target.
Oct  2 21:32:13.153870 systemd-resolved[1401]: Using system hostname 'ci-3510.3.0-a-a1bcd9ea1c'.
Oct  2 21:32:13.157536 ldconfig[1366]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start.
Oct  2 21:32:13.161647 systemd[1]: Finished ldconfig.service.
Oct  2 21:32:13.169172 systemd[1]: Starting systemd-update-done.service...
Oct  2 21:32:13.181651 systemd[1]: Finished systemd-update-done.service.
Oct  2 21:32:13.190470 kernel: mlx5_core 0000:01:00.1 enp1s0f1np1: Link up
Oct  2 21:32:13.211445 kernel: bond0: (slave enp1s0f1np1): speed changed to 0 on port 1
Oct  2 21:32:13.212668 systemd-networkd[1301]: enp1s0f1np1: Link UP
Oct  2 21:32:13.212827 systemd-networkd[1301]: enp1s0f1np1: Gained carrier
Oct  2 21:32:13.213558 systemd[1]: Started systemd-resolved.service.
Oct  2 21:32:13.221558 systemd[1]: Reached target network.target.
Oct  2 21:32:13.229522 systemd[1]: Reached target nss-lookup.target.
Oct  2 21:32:13.237532 systemd[1]: Reached target sysinit.target.
Oct  2 21:32:13.245552 systemd[1]: Started motdgen.path.
Oct  2 21:32:13.257318 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path.
Oct  2 21:32:13.269482 kernel: bond0: (slave enp1s0f1np1): link status up again after 200 ms
Oct  2 21:32:13.286586 systemd[1]: Started logrotate.timer.
Oct  2 21:32:13.290484 kernel: bond0: (slave enp1s0f1np1): link status definitely up, 10000 Mbps full duplex
Oct  2 21:32:13.297587 systemd[1]: Started mdadm.timer.
Oct  2 21:32:13.304511 systemd[1]: Started systemd-tmpfiles-clean.timer.
Oct  2 21:32:13.312517 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate).
Oct  2 21:32:13.312535 systemd[1]: Reached target paths.target.
Oct  2 21:32:13.319517 systemd[1]: Reached target timers.target.
Oct  2 21:32:13.326637 systemd[1]: Listening on dbus.socket.
Oct  2 21:32:13.334013 systemd[1]: Starting docker.socket...
Oct  2 21:32:13.341933 systemd[1]: Listening on sshd.socket.
Oct  2 21:32:13.348602 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f).
Oct  2 21:32:13.348812 systemd[1]: Listening on docker.socket.
Oct  2 21:32:13.355579 systemd[1]: Reached target sockets.target.
Oct  2 21:32:13.363543 systemd[1]: Reached target basic.target.
Oct  2 21:32:13.370538 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met.
Oct  2 21:32:13.370550 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met.
Oct  2 21:32:13.370979 systemd[1]: Starting containerd.service...
Oct  2 21:32:13.377941 systemd[1]: Starting coreos-metadata-sshkeys@core.service...
Oct  2 21:32:13.387022 systemd[1]: Starting coreos-metadata.service...
Oct  2 21:32:13.394054 systemd[1]: Starting dbus.service...
Oct  2 21:32:13.400085 systemd[1]: Starting enable-oem-cloudinit.service...
Oct  2 21:32:13.405811 jq[1416]: false
Oct  2 21:32:13.408046 systemd[1]: Starting extend-filesystems.service...
Oct  2 21:32:13.408369 coreos-metadata[1409]: Oct 02 21:32:13.408 INFO Fetching https://metadata.packet.net/metadata: Attempt #1
Oct  2 21:32:13.414786 dbus-daemon[1415]: [system] SELinux support is enabled
Oct  2 21:32:13.415546 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment).
Oct  2 21:32:13.416109 extend-filesystems[1417]: Found sda
Oct  2 21:32:13.434454 extend-filesystems[1417]: Found sda1
Oct  2 21:32:13.434454 extend-filesystems[1417]: Found sda2
Oct  2 21:32:13.434454 extend-filesystems[1417]: Found sda3
Oct  2 21:32:13.434454 extend-filesystems[1417]: Found usr
Oct  2 21:32:13.434454 extend-filesystems[1417]: Found sda4
Oct  2 21:32:13.434454 extend-filesystems[1417]: Found sda6
Oct  2 21:32:13.434454 extend-filesystems[1417]: Found sda7
Oct  2 21:32:13.434454 extend-filesystems[1417]: Found sda9
Oct  2 21:32:13.434454 extend-filesystems[1417]: Checking size of /dev/sda9
Oct  2 21:32:13.434454 extend-filesystems[1417]: Resized partition /dev/sda9
Oct  2 21:32:13.573594 kernel: EXT4-fs (sda9): resizing filesystem from 553472 to 116605649 blocks
Oct  2 21:32:13.416144 systemd[1]: Starting motdgen.service...
Oct  2 21:32:13.573655 coreos-metadata[1412]: Oct 02 21:32:13.419 INFO Fetching https://metadata.packet.net/metadata: Attempt #1
Oct  2 21:32:13.573775 extend-filesystems[1433]: resize2fs 1.46.5 (30-Dec-2021)
Oct  2 21:32:13.423369 systemd[1]: Starting prepare-cni-plugins.service...
Oct  2 21:32:13.453429 systemd[1]: Starting prepare-critools.service...
Oct  2 21:32:13.467126 systemd[1]: Starting ssh-key-proc-cmdline.service...
Oct  2 21:32:13.481060 systemd[1]: Starting sshd-keygen.service...
Oct  2 21:32:13.500967 systemd[1]: Starting systemd-logind.service...
Oct  2 21:32:13.514480 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f).
Oct  2 21:32:13.515080 systemd[1]: Starting tcsd.service...
Oct  2 21:32:13.521687 systemd-logind[1445]: Watching system buttons on /dev/input/event3 (Power Button)
Oct  2 21:32:13.589204 jq[1448]: true
Oct  2 21:32:13.589302 update_engine[1447]: I1002 21:32:13.588490  1447 main.cc:92] Flatcar Update Engine starting
Oct  2 21:32:13.521696 systemd-logind[1445]: Watching system buttons on /dev/input/event2 (Sleep Button)
Oct  2 21:32:13.521705 systemd-logind[1445]: Watching system buttons on /dev/input/event0 (HID 0557:2419)
Oct  2 21:32:13.521805 systemd-logind[1445]: New seat seat0.
Oct  2 21:32:13.534733 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details.
Oct  2 21:32:13.535107 systemd[1]: Starting update-engine.service...
Oct  2 21:32:13.550080 systemd[1]: Starting update-ssh-keys-after-ignition.service...
Oct  2 21:32:13.565795 systemd[1]: Started dbus.service.
Oct  2 21:32:13.582078 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'.
Oct  2 21:32:13.582172 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped.
Oct  2 21:32:13.582318 systemd[1]: motdgen.service: Deactivated successfully.
Oct  2 21:32:13.582393 systemd[1]: Finished motdgen.service.
Oct  2 21:32:13.592349 update_engine[1447]: I1002 21:32:13.592312  1447 update_check_scheduler.cc:74] Next update check in 5m10s
Oct  2 21:32:13.596376 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully.
Oct  2 21:32:13.596467 systemd[1]: Finished ssh-key-proc-cmdline.service.
Oct  2 21:32:13.601802 tar[1450]: ./
Oct  2 21:32:13.601802 tar[1450]: ./loopback
Oct  2 21:32:13.607077 jq[1454]: true
Oct  2 21:32:13.607933 tar[1451]: crictl
Oct  2 21:32:13.608218 dbus-daemon[1415]: [system] Successfully activated service 'org.freedesktop.systemd1'
Oct  2 21:32:13.611830 systemd[1]: tcsd.service: Skipped due to 'exec-condition'.
Oct  2 21:32:13.611932 systemd[1]: Condition check resulted in tcsd.service being skipped.
Oct  2 21:32:13.616170 systemd[1]: Started update-engine.service.
Oct  2 21:32:13.616426 env[1455]: time="2023-10-02T21:32:13.616400365Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16
Oct  2 21:32:13.622711 tar[1450]: ./bandwidth
Oct  2 21:32:13.627181 env[1455]: time="2023-10-02T21:32:13.627163893Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1
Oct  2 21:32:13.627882 env[1455]: time="2023-10-02T21:32:13.627831456Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1
Oct  2 21:32:13.628517 env[1455]: time="2023-10-02T21:32:13.628460584Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.132-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1
Oct  2 21:32:13.628517 env[1455]: time="2023-10-02T21:32:13.628477625Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1
Oct  2 21:32:13.628520 systemd[1]: Started systemd-logind.service.
Oct  2 21:32:13.630147 env[1455]: time="2023-10-02T21:32:13.630133728Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1
Oct  2 21:32:13.630147 env[1455]: time="2023-10-02T21:32:13.630145348Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1
Oct  2 21:32:13.630224 env[1455]: time="2023-10-02T21:32:13.630154947Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured"
Oct  2 21:32:13.630224 env[1455]: time="2023-10-02T21:32:13.630160730Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1
Oct  2 21:32:13.630224 env[1455]: time="2023-10-02T21:32:13.630209395Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1
Oct  2 21:32:13.630363 env[1455]: time="2023-10-02T21:32:13.630354616Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1
Oct  2 21:32:13.630443 env[1455]: time="2023-10-02T21:32:13.630426579Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1
Oct  2 21:32:13.632254 env[1455]: time="2023-10-02T21:32:13.630444715Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1
Oct  2 21:32:13.632254 env[1455]: time="2023-10-02T21:32:13.631785246Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured"
Oct  2 21:32:13.632254 env[1455]: time="2023-10-02T21:32:13.631795073Z" level=info msg="metadata content store policy set" policy=shared
Oct  2 21:32:13.636591 bash[1484]: Updated "/home/core/.ssh/authorized_keys"
Oct  2 21:32:13.638975 systemd[1]: Started locksmithd.service.
Oct  2 21:32:13.641392 env[1455]: time="2023-10-02T21:32:13.641378924Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1
Oct  2 21:32:13.641436 env[1455]: time="2023-10-02T21:32:13.641395359Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1
Oct  2 21:32:13.641436 env[1455]: time="2023-10-02T21:32:13.641403392Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1
Oct  2 21:32:13.641436 env[1455]: time="2023-10-02T21:32:13.641422013Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1
Oct  2 21:32:13.641436 env[1455]: time="2023-10-02T21:32:13.641430949Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1
Oct  2 21:32:13.641546 env[1455]: time="2023-10-02T21:32:13.641440798Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1
Oct  2 21:32:13.641546 env[1455]: time="2023-10-02T21:32:13.641448918Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1
Oct  2 21:32:13.641546 env[1455]: time="2023-10-02T21:32:13.641456794Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1
Oct  2 21:32:13.641546 env[1455]: time="2023-10-02T21:32:13.641464160Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1
Oct  2 21:32:13.641546 env[1455]: time="2023-10-02T21:32:13.641472275Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1
Oct  2 21:32:13.641546 env[1455]: time="2023-10-02T21:32:13.641479006Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1
Oct  2 21:32:13.641546 env[1455]: time="2023-10-02T21:32:13.641485387Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1
Oct  2 21:32:13.641546 env[1455]: time="2023-10-02T21:32:13.641533435Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2
Oct  2 21:32:13.641796 env[1455]: time="2023-10-02T21:32:13.641580399Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1
Oct  2 21:32:13.641796 env[1455]: time="2023-10-02T21:32:13.641706392Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1
Oct  2 21:32:13.641796 env[1455]: time="2023-10-02T21:32:13.641727287Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1
Oct  2 21:32:13.641796 env[1455]: time="2023-10-02T21:32:13.641736465Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1
Oct  2 21:32:13.641796 env[1455]: time="2023-10-02T21:32:13.641763373Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1
Oct  2 21:32:13.641796 env[1455]: time="2023-10-02T21:32:13.641770671Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1
Oct  2 21:32:13.641796 env[1455]: time="2023-10-02T21:32:13.641777697Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1
Oct  2 21:32:13.641796 env[1455]: time="2023-10-02T21:32:13.641783740Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1
Oct  2 21:32:13.641796 env[1455]: time="2023-10-02T21:32:13.641791707Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1
Oct  2 21:32:13.642012 env[1455]: time="2023-10-02T21:32:13.641799649Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1
Oct  2 21:32:13.642012 env[1455]: time="2023-10-02T21:32:13.641807234Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1
Oct  2 21:32:13.642012 env[1455]: time="2023-10-02T21:32:13.641815588Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1
Oct  2 21:32:13.642012 env[1455]: time="2023-10-02T21:32:13.641826608Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1
Oct  2 21:32:13.642012 env[1455]: time="2023-10-02T21:32:13.641895017Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1
Oct  2 21:32:13.642012 env[1455]: time="2023-10-02T21:32:13.641904497Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1
Oct  2 21:32:13.642012 env[1455]: time="2023-10-02T21:32:13.641913049Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1
Oct  2 21:32:13.642012 env[1455]: time="2023-10-02T21:32:13.641919508Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1
Oct  2 21:32:13.642012 env[1455]: time="2023-10-02T21:32:13.641927829Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1
Oct  2 21:32:13.642012 env[1455]: time="2023-10-02T21:32:13.641933728Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1
Oct  2 21:32:13.642012 env[1455]: time="2023-10-02T21:32:13.641947257Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin"
Oct  2 21:32:13.642012 env[1455]: time="2023-10-02T21:32:13.641969105Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1
Oct  2 21:32:13.642309 env[1455]: time="2023-10-02T21:32:13.642094677Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}"
Oct  2 21:32:13.642309 env[1455]: time="2023-10-02T21:32:13.642126624Z" level=info msg="Connect containerd service"
Oct  2 21:32:13.642309 env[1455]: time="2023-10-02T21:32:13.642146526Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\""
Oct  2 21:32:13.644387 env[1455]: time="2023-10-02T21:32:13.642437835Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config"
Oct  2 21:32:13.644387 env[1455]: time="2023-10-02T21:32:13.642529445Z" level=info msg="Start subscribing containerd event"
Oct  2 21:32:13.644387 env[1455]: time="2023-10-02T21:32:13.642559837Z" level=info msg="Start recovering state"
Oct  2 21:32:13.644387 env[1455]: time="2023-10-02T21:32:13.642565644Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc
Oct  2 21:32:13.644387 env[1455]: time="2023-10-02T21:32:13.642586825Z" level=info msg=serving... address=/run/containerd/containerd.sock
Oct  2 21:32:13.644387 env[1455]: time="2023-10-02T21:32:13.642593798Z" level=info msg="Start event monitor"
Oct  2 21:32:13.644387 env[1455]: time="2023-10-02T21:32:13.642601684Z" level=info msg="Start snapshots syncer"
Oct  2 21:32:13.644387 env[1455]: time="2023-10-02T21:32:13.642607121Z" level=info msg="Start cni network conf syncer for default"
Oct  2 21:32:13.644387 env[1455]: time="2023-10-02T21:32:13.642612375Z" level=info msg="containerd successfully booted in 0.026581s"
Oct  2 21:32:13.644387 env[1455]: time="2023-10-02T21:32:13.642616971Z" level=info msg="Start streaming server"
Oct  2 21:32:13.645597 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml).
Oct  2 21:32:13.645695 systemd[1]: Reached target system-config.target.
Oct  2 21:32:13.653405 tar[1450]: ./ptp
Oct  2 21:32:13.653563 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url).
Oct  2 21:32:13.653673 systemd[1]: Reached target user-config.target.
Oct  2 21:32:13.663165 systemd[1]: Started containerd.service.
Oct  2 21:32:13.669715 systemd[1]: Finished update-ssh-keys-after-ignition.service.
Oct  2 21:32:13.676698 tar[1450]: ./vlan
Oct  2 21:32:13.698655 tar[1450]: ./host-device
Oct  2 21:32:13.703289 locksmithd[1491]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot"
Oct  2 21:32:13.720017 tar[1450]: ./tuning
Oct  2 21:32:13.738840 tar[1450]: ./vrf
Oct  2 21:32:13.758506 tar[1450]: ./sbr
Oct  2 21:32:13.777798 tar[1450]: ./tap
Oct  2 21:32:13.799843 tar[1450]: ./dhcp
Oct  2 21:32:13.855866 tar[1450]: ./static
Oct  2 21:32:13.871838 tar[1450]: ./firewall
Oct  2 21:32:13.873679 systemd[1]: Finished prepare-critools.service.
Oct  2 21:32:13.896321 tar[1450]: ./macvlan
Oct  2 21:32:13.918357 tar[1450]: ./dummy
Oct  2 21:32:13.927445 kernel: EXT4-fs (sda9): resized filesystem to 116605649
Oct  2 21:32:13.957323 extend-filesystems[1433]: Filesystem at /dev/sda9 is mounted on /; on-line resizing required
Oct  2 21:32:13.957323 extend-filesystems[1433]: old_desc_blocks = 1, new_desc_blocks = 56
Oct  2 21:32:13.957323 extend-filesystems[1433]: The filesystem on /dev/sda9 is now 116605649 (4k) blocks long.
Oct  2 21:32:13.996536 extend-filesystems[1417]: Resized filesystem in /dev/sda9
Oct  2 21:32:13.996536 extend-filesystems[1417]: Found sdb
Oct  2 21:32:14.011532 tar[1450]: ./bridge
Oct  2 21:32:14.011532 tar[1450]: ./ipvlan
Oct  2 21:32:13.957780 systemd[1]: extend-filesystems.service: Deactivated successfully.
Oct  2 21:32:13.957877 systemd[1]: Finished extend-filesystems.service.
Oct  2 21:32:14.016281 tar[1450]: ./portmap
Oct  2 21:32:14.037121 tar[1450]: ./host-local
Oct  2 21:32:14.061263 systemd[1]: Finished prepare-cni-plugins.service.
Oct  2 21:32:14.157663 sshd_keygen[1444]: ssh-keygen: generating new host keys: RSA ECDSA ED25519
Oct  2 21:32:14.169065 systemd[1]: Finished sshd-keygen.service.
Oct  2 21:32:14.177537 systemd[1]: Starting issuegen.service...
Oct  2 21:32:14.184873 systemd[1]: issuegen.service: Deactivated successfully.
Oct  2 21:32:14.184941 systemd[1]: Finished issuegen.service.
Oct  2 21:32:14.193459 systemd[1]: Starting systemd-user-sessions.service...
Oct  2 21:32:14.202865 systemd[1]: Finished systemd-user-sessions.service.
Oct  2 21:32:14.212177 systemd[1]: Started getty@tty1.service.
Oct  2 21:32:14.219176 systemd[1]: Started serial-getty@ttyS1.service.
Oct  2 21:32:14.227602 systemd[1]: Reached target getty.target.
Oct  2 21:32:14.489563 systemd-networkd[1301]: bond0: Gained IPv6LL
Oct  2 21:32:15.536628 kernel: mlx5_core 0000:01:00.0: lag map port 1:1 port 2:2 shared_fdb:0
Oct  2 21:32:19.241629 login[1516]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0)
Oct  2 21:32:19.247422 login[1515]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0)
Oct  2 21:32:19.249086 systemd-logind[1445]: New session 1 of user core.
Oct  2 21:32:19.249583 systemd[1]: Created slice user-500.slice.
Oct  2 21:32:19.250143 systemd[1]: Starting user-runtime-dir@500.service...
Oct  2 21:32:19.251304 systemd-logind[1445]: New session 2 of user core.
Oct  2 21:32:19.255621 systemd[1]: Finished user-runtime-dir@500.service.
Oct  2 21:32:19.256287 systemd[1]: Starting user@500.service...
Oct  2 21:32:19.258296 (systemd)[1520]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0)
Oct  2 21:32:19.289880 coreos-metadata[1412]: Oct 02 21:32:19.289 INFO Failed to fetch: error sending request for url (https://metadata.packet.net/metadata): error trying to connect: dns error: failed to lookup address information: Name or service not known
Oct  2 21:32:19.290061 coreos-metadata[1409]: Oct 02 21:32:19.289 INFO Failed to fetch: error sending request for url (https://metadata.packet.net/metadata): error trying to connect: dns error: failed to lookup address information: Name or service not known
Oct  2 21:32:19.325486 systemd[1520]: Queued start job for default target default.target.
Oct  2 21:32:19.325714 systemd[1520]: Reached target paths.target.
Oct  2 21:32:19.325725 systemd[1520]: Reached target sockets.target.
Oct  2 21:32:19.325733 systemd[1520]: Reached target timers.target.
Oct  2 21:32:19.325740 systemd[1520]: Reached target basic.target.
Oct  2 21:32:19.325758 systemd[1520]: Reached target default.target.
Oct  2 21:32:19.325771 systemd[1520]: Startup finished in 64ms.
Oct  2 21:32:19.325824 systemd[1]: Started user@500.service.
Oct  2 21:32:19.326323 systemd[1]: Started session-1.scope.
Oct  2 21:32:19.326699 systemd[1]: Started session-2.scope.
Oct  2 21:32:20.290146 coreos-metadata[1412]: Oct 02 21:32:20.290 INFO Fetching https://metadata.packet.net/metadata: Attempt #2
Oct  2 21:32:20.290972 coreos-metadata[1409]: Oct 02 21:32:20.290 INFO Fetching https://metadata.packet.net/metadata: Attempt #2
Oct  2 21:32:20.919703 kernel: mlx5_core 0000:01:00.0: modify lag map port 1:2 port 2:2
Oct  2 21:32:20.919867 kernel: mlx5_core 0000:01:00.0: modify lag map port 1:1 port 2:2
Oct  2 21:32:21.362259 coreos-metadata[1409]: Oct 02 21:32:21.362 INFO Fetch successful
Oct  2 21:32:21.363194 coreos-metadata[1412]: Oct 02 21:32:21.363 INFO Fetch successful
Oct  2 21:32:21.384370 unknown[1409]: wrote ssh authorized keys file for user: core
Oct  2 21:32:21.384832 systemd[1]: Finished coreos-metadata.service.
Oct  2 21:32:21.385634 systemd[1]: Started packet-phone-home.service.
Oct  2 21:32:21.391856 curl[1542]:   % Total    % Received % Xferd  Average Speed   Time    Time     Time  Current
Oct  2 21:32:21.391973 curl[1542]:                                  Dload  Upload   Total   Spent    Left  Speed
Oct  2 21:32:21.395569 update-ssh-keys[1543]: Updated "/home/core/.ssh/authorized_keys"
Oct  2 21:32:21.395736 systemd[1]: Finished coreos-metadata-sshkeys@core.service.
Oct  2 21:32:21.395928 systemd[1]: Reached target multi-user.target.
Oct  2 21:32:21.396583 systemd[1]: Starting systemd-update-utmp-runlevel.service...
Oct  2 21:32:21.400490 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully.
Oct  2 21:32:21.400574 systemd[1]: Finished systemd-update-utmp-runlevel.service.
Oct  2 21:32:21.400768 systemd[1]: Startup finished in 1.849s (kernel) + 18.958s (initrd) + 14.611s (userspace) = 35.419s.
Oct  2 21:32:21.408524 systemd[1]: Created slice system-sshd.slice.
Oct  2 21:32:21.409068 systemd[1]: Started sshd@0-139.178.70.49:22-139.178.89.65:41548.service.
Oct  2 21:32:21.460101 sshd[1546]: Accepted publickey for core from 139.178.89.65 port 41548 ssh2: RSA SHA256:M4fPbwtaE29dxMxiSyaa1yIvxglYsCEa+0scmSZWaB4
Oct  2 21:32:21.461355 sshd[1546]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Oct  2 21:32:21.465456 systemd-logind[1445]: New session 3 of user core.
Oct  2 21:32:21.466355 systemd[1]: Started session-3.scope.
Oct  2 21:32:21.520921 systemd[1]: Started sshd@1-139.178.70.49:22-139.178.89.65:41564.service.
Oct  2 21:32:21.549671 curl[1542]: \u000d  0     0    0     0    0     0      0      0 --:--:-- --:--:-- --:--:--     0\u000d  0     0    0     0    0     0      0      0 --:--:-- --:--:-- --:--:--     0
Oct  2 21:32:21.550146 systemd[1]: packet-phone-home.service: Deactivated successfully.
Oct  2 21:32:21.555718 sshd[1551]: Accepted publickey for core from 139.178.89.65 port 41564 ssh2: RSA SHA256:M4fPbwtaE29dxMxiSyaa1yIvxglYsCEa+0scmSZWaB4
Oct  2 21:32:21.556405 sshd[1551]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Oct  2 21:32:21.558761 systemd-logind[1445]: New session 4 of user core.
Oct  2 21:32:21.559207 systemd[1]: Started session-4.scope.
Oct  2 21:32:21.577254 systemd-timesyncd[1402]: Contacted time server 216.229.4.66:123 (0.flatcar.pool.ntp.org).
Oct  2 21:32:21.577284 systemd-timesyncd[1402]: Initial clock synchronization to Mon 2023-10-02 21:32:21.183564 UTC.
Oct  2 21:32:21.610615 sshd[1551]: pam_unix(sshd:session): session closed for user core
Oct  2 21:32:21.612056 systemd[1]: sshd@1-139.178.70.49:22-139.178.89.65:41564.service: Deactivated successfully.
Oct  2 21:32:21.612372 systemd[1]: session-4.scope: Deactivated successfully.
Oct  2 21:32:21.612801 systemd-logind[1445]: Session 4 logged out. Waiting for processes to exit.
Oct  2 21:32:21.613258 systemd[1]: Started sshd@2-139.178.70.49:22-139.178.89.65:41574.service.
Oct  2 21:32:21.613732 systemd-logind[1445]: Removed session 4.
Oct  2 21:32:21.649574 sshd[1557]: Accepted publickey for core from 139.178.89.65 port 41574 ssh2: RSA SHA256:M4fPbwtaE29dxMxiSyaa1yIvxglYsCEa+0scmSZWaB4
Oct  2 21:32:21.650624 sshd[1557]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Oct  2 21:32:21.654148 systemd-logind[1445]: New session 5 of user core.
Oct  2 21:32:21.654885 systemd[1]: Started session-5.scope.
Oct  2 21:32:21.709729 sshd[1557]: pam_unix(sshd:session): session closed for user core
Oct  2 21:32:21.716433 systemd[1]: sshd@2-139.178.70.49:22-139.178.89.65:41574.service: Deactivated successfully.
Oct  2 21:32:21.717962 systemd[1]: session-5.scope: Deactivated successfully.
Oct  2 21:32:21.719574 systemd-logind[1445]: Session 5 logged out. Waiting for processes to exit.
Oct  2 21:32:21.722108 systemd[1]: Started sshd@3-139.178.70.49:22-139.178.89.65:41586.service.
Oct  2 21:32:21.724490 systemd-logind[1445]: Removed session 5.
Oct  2 21:32:21.828972 sshd[1564]: Accepted publickey for core from 139.178.89.65 port 41586 ssh2: RSA SHA256:M4fPbwtaE29dxMxiSyaa1yIvxglYsCEa+0scmSZWaB4
Oct  2 21:32:21.830878 sshd[1564]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Oct  2 21:32:21.836896 systemd-logind[1445]: New session 6 of user core.
Oct  2 21:32:21.838130 systemd[1]: Started session-6.scope.
Oct  2 21:32:21.898391 sshd[1564]: pam_unix(sshd:session): session closed for user core
Oct  2 21:32:21.899838 systemd[1]: sshd@3-139.178.70.49:22-139.178.89.65:41586.service: Deactivated successfully.
Oct  2 21:32:21.900130 systemd[1]: session-6.scope: Deactivated successfully.
Oct  2 21:32:21.900396 systemd-logind[1445]: Session 6 logged out. Waiting for processes to exit.
Oct  2 21:32:21.900955 systemd[1]: Started sshd@4-139.178.70.49:22-139.178.89.65:41594.service.
Oct  2 21:32:21.901323 systemd-logind[1445]: Removed session 6.
Oct  2 21:32:21.936875 sshd[1570]: Accepted publickey for core from 139.178.89.65 port 41594 ssh2: RSA SHA256:M4fPbwtaE29dxMxiSyaa1yIvxglYsCEa+0scmSZWaB4
Oct  2 21:32:21.937868 sshd[1570]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Oct  2 21:32:21.941331 systemd-logind[1445]: New session 7 of user core.
Oct  2 21:32:21.942029 systemd[1]: Started session-7.scope.
Oct  2 21:32:22.026151 sudo[1574]:     core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1
Oct  2 21:32:22.026753 sudo[1574]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500)
Oct  2 21:32:22.049979 dbus-daemon[1415]: \xd0m\u0014O+V:  received setenforce notice (enforcing=-1896176976)
Oct  2 21:32:22.054482 sudo[1574]: pam_unix(sudo:session): session closed for user root
Oct  2 21:32:22.056642 sshd[1570]: pam_unix(sshd:session): session closed for user core
Oct  2 21:32:22.058313 systemd[1]: sshd@4-139.178.70.49:22-139.178.89.65:41594.service: Deactivated successfully.
Oct  2 21:32:22.058616 systemd[1]: session-7.scope: Deactivated successfully.
Oct  2 21:32:22.058989 systemd-logind[1445]: Session 7 logged out. Waiting for processes to exit.
Oct  2 21:32:22.059467 systemd[1]: Started sshd@5-139.178.70.49:22-139.178.89.65:41606.service.
Oct  2 21:32:22.059880 systemd-logind[1445]: Removed session 7.
Oct  2 21:32:22.094774 sshd[1578]: Accepted publickey for core from 139.178.89.65 port 41606 ssh2: RSA SHA256:M4fPbwtaE29dxMxiSyaa1yIvxglYsCEa+0scmSZWaB4
Oct  2 21:32:22.095617 sshd[1578]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Oct  2 21:32:22.098151 systemd-logind[1445]: New session 8 of user core.
Oct  2 21:32:22.098707 systemd[1]: Started session-8.scope.
Oct  2 21:32:22.151851 sudo[1582]:     core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules
Oct  2 21:32:22.151950 sudo[1582]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500)
Oct  2 21:32:22.153647 sudo[1582]: pam_unix(sudo:session): session closed for user root
Oct  2 21:32:22.155761 sudo[1581]:     core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules
Oct  2 21:32:22.155859 sudo[1581]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500)
Oct  2 21:32:22.160369 systemd[1]: Stopping audit-rules.service...
Oct  2 21:32:22.159000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1
Oct  2 21:32:22.161187 auditctl[1585]: No rules
Oct  2 21:32:22.161350 systemd[1]: audit-rules.service: Deactivated successfully.
Oct  2 21:32:22.161432 systemd[1]: Stopped audit-rules.service.
Oct  2 21:32:22.162162 systemd[1]: Starting audit-rules.service...
Oct  2 21:32:22.166306 kernel: kauditd_printk_skb: 93 callbacks suppressed
Oct  2 21:32:22.166342 kernel: audit: type=1305 audit(1696282342.159:168): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1
Oct  2 21:32:22.171951 augenrules[1602]: No rules
Oct  2 21:32:22.172268 systemd[1]: Finished audit-rules.service.
Oct  2 21:32:22.172735 sudo[1581]: pam_unix(sudo:session): session closed for user root
Oct  2 21:32:22.173674 sshd[1578]: pam_unix(sshd:session): session closed for user core
Oct  2 21:32:22.175125 systemd[1]: sshd@5-139.178.70.49:22-139.178.89.65:41606.service: Deactivated successfully.
Oct  2 21:32:22.175465 systemd[1]: session-8.scope: Deactivated successfully.
Oct  2 21:32:22.175870 systemd-logind[1445]: Session 8 logged out. Waiting for processes to exit.
Oct  2 21:32:22.176413 systemd[1]: Started sshd@6-139.178.70.49:22-139.178.89.65:41610.service.
Oct  2 21:32:22.176855 systemd-logind[1445]: Removed session 8.
Oct  2 21:32:22.159000 audit[1585]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd226cbaa0 a2=420 a3=0 items=0 ppid=1 pid=1585 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:32:22.210640 kernel: audit: type=1300 audit(1696282342.159:168): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd226cbaa0 a2=420 a3=0 items=0 ppid=1 pid=1585 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:32:22.210708 kernel: audit: type=1327 audit(1696282342.159:168): proctitle=2F7362696E2F617564697463746C002D44
Oct  2 21:32:22.159000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44
Oct  2 21:32:22.219750 kernel: audit: type=1131 audit(1696282342.160:169): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:32:22.160000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:32:22.241100 kernel: audit: type=1130 audit(1696282342.171:170): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:32:22.171000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:32:22.262447 kernel: audit: type=1106 audit(1696282342.171:171): pid=1581 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Oct  2 21:32:22.171000 audit[1581]: USER_END pid=1581 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Oct  2 21:32:22.270372 sshd[1608]: Accepted publickey for core from 139.178.89.65 port 41610 ssh2: RSA SHA256:M4fPbwtaE29dxMxiSyaa1yIvxglYsCEa+0scmSZWaB4
Oct  2 21:32:22.271749 sshd[1608]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Oct  2 21:32:22.273910 systemd-logind[1445]: New session 9 of user core.
Oct  2 21:32:22.274345 systemd[1]: Started session-9.scope.
Oct  2 21:32:22.287126 kernel: audit: type=1104 audit(1696282342.171:172): pid=1581 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Oct  2 21:32:22.171000 audit[1581]: CRED_DISP pid=1581 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Oct  2 21:32:22.309508 kernel: audit: type=1106 audit(1696282342.172:173): pid=1578 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success'
Oct  2 21:32:22.172000 audit[1578]: USER_END pid=1578 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success'
Oct  2 21:32:22.318613 sudo[1611]:     core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh
Oct  2 21:32:22.318715 sudo[1611]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500)
Oct  2 21:32:22.339986 kernel: audit: type=1104 audit(1696282342.172:174): pid=1578 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success'
Oct  2 21:32:22.172000 audit[1578]: CRED_DISP pid=1578 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success'
Oct  2 21:32:22.173000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-139.178.70.49:22-139.178.89.65:41606 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:32:22.388579 kernel: audit: type=1131 audit(1696282342.173:175): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-139.178.70.49:22-139.178.89.65:41606 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:32:22.175000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-139.178.70.49:22-139.178.89.65:41610 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:32:22.268000 audit[1608]: USER_ACCT pid=1608 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success'
Oct  2 21:32:22.270000 audit[1608]: CRED_ACQ pid=1608 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success'
Oct  2 21:32:22.270000 audit[1608]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc8980abc0 a2=3 a3=0 items=0 ppid=1 pid=1608 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:32:22.270000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D
Oct  2 21:32:22.274000 audit[1608]: USER_START pid=1608 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success'
Oct  2 21:32:22.275000 audit[1610]: CRED_ACQ pid=1610 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success'
Oct  2 21:32:22.318000 audit[1611]: USER_ACCT pid=1611 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Oct  2 21:32:22.318000 audit[1611]: CRED_REFR pid=1611 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Oct  2 21:32:22.319000 audit[1611]: USER_START pid=1611 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Oct  2 21:32:22.843618 systemd[1]: Starting systemd-networkd-wait-online.service...
Oct  2 21:32:22.847514 systemd[1]: Finished systemd-networkd-wait-online.service.
Oct  2 21:32:22.847000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:32:22.847677 systemd[1]: Reached target network-online.target.
Oct  2 21:32:22.848250 systemd[1]: Starting docker.service...
Oct  2 21:32:22.865401 env[1633]: time="2023-10-02T21:32:22.865346133Z" level=info msg="Starting up"
Oct  2 21:32:22.866026 env[1633]: time="2023-10-02T21:32:22.865987697Z" level=info msg="parsed scheme: \"unix\"" module=grpc
Oct  2 21:32:22.866026 env[1633]: time="2023-10-02T21:32:22.865997818Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc
Oct  2 21:32:22.866026 env[1633]: time="2023-10-02T21:32:22.866009226Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock  <nil> 0 <nil>}] <nil> <nil>}" module=grpc
Oct  2 21:32:22.866026 env[1633]: time="2023-10-02T21:32:22.866015283Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc
Oct  2 21:32:22.866857 env[1633]: time="2023-10-02T21:32:22.866823246Z" level=info msg="parsed scheme: \"unix\"" module=grpc
Oct  2 21:32:22.866857 env[1633]: time="2023-10-02T21:32:22.866832730Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc
Oct  2 21:32:22.866857 env[1633]: time="2023-10-02T21:32:22.866841466Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock  <nil> 0 <nil>}] <nil> <nil>}" module=grpc
Oct  2 21:32:22.866857 env[1633]: time="2023-10-02T21:32:22.866847047Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc
Oct  2 21:32:23.035553 env[1633]: time="2023-10-02T21:32:23.035432931Z" level=info msg="Loading containers: start."
Oct  2 21:32:23.077000 audit[1677]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1677 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 21:32:23.077000 audit[1677]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffc3b14ff50 a2=0 a3=7ffc3b14ff3c items=0 ppid=1633 pid=1677 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:32:23.077000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552
Oct  2 21:32:23.078000 audit[1679]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1679 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 21:32:23.078000 audit[1679]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7fff78fad670 a2=0 a3=7fff78fad65c items=0 ppid=1633 pid=1679 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:32:23.078000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552
Oct  2 21:32:23.079000 audit[1681]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1681 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 21:32:23.079000 audit[1681]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffe07bcf480 a2=0 a3=7ffe07bcf46c items=0 ppid=1633 pid=1681 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:32:23.079000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31
Oct  2 21:32:23.080000 audit[1683]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1683 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 21:32:23.080000 audit[1683]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffcf5255d20 a2=0 a3=7ffcf5255d0c items=0 ppid=1633 pid=1683 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:32:23.080000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32
Oct  2 21:32:23.090000 audit[1685]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1685 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 21:32:23.090000 audit[1685]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc4c11c290 a2=0 a3=7ffc4c11c27c items=0 ppid=1633 pid=1685 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:32:23.090000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E
Oct  2 21:32:23.140000 audit[1690]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1690 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 21:32:23.140000 audit[1690]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff486de560 a2=0 a3=7fff486de54c items=0 ppid=1633 pid=1690 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:32:23.140000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E
Oct  2 21:32:23.151000 audit[1692]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1692 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 21:32:23.151000 audit[1692]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffd2de2be00 a2=0 a3=7ffd2de2bdec items=0 ppid=1633 pid=1692 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:32:23.151000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552
Oct  2 21:32:23.155000 audit[1694]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1694 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 21:32:23.155000 audit[1694]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7ffc79588690 a2=0 a3=7ffc7958867c items=0 ppid=1633 pid=1694 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:32:23.155000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E
Oct  2 21:32:23.159000 audit[1696]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1696 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 21:32:23.159000 audit[1696]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffee6a55a30 a2=0 a3=7ffee6a55a1c items=0 ppid=1633 pid=1696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:32:23.159000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552
Oct  2 21:32:23.174000 audit[1700]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1700 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 21:32:23.174000 audit[1700]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffddddcc600 a2=0 a3=7ffddddcc5ec items=0 ppid=1633 pid=1700 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:32:23.174000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552
Oct  2 21:32:23.176000 audit[1701]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1701 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 21:32:23.176000 audit[1701]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffddae10120 a2=0 a3=7ffddae1010c items=0 ppid=1633 pid=1701 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:32:23.176000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552
Oct  2 21:32:23.202496 kernel: Initializing XFRM netlink socket
Oct  2 21:32:23.260107 env[1633]: time="2023-10-02T21:32:23.260088182Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address"
Oct  2 21:32:23.292000 audit[1709]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1709 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 21:32:23.292000 audit[1709]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7fffb1275f20 a2=0 a3=7fffb1275f0c items=0 ppid=1633 pid=1709 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:32:23.292000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445
Oct  2 21:32:23.329000 audit[1712]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1712 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 21:32:23.329000 audit[1712]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffd51072de0 a2=0 a3=7ffd51072dcc items=0 ppid=1633 pid=1712 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:32:23.329000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E
Oct  2 21:32:23.336000 audit[1715]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1715 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 21:32:23.336000 audit[1715]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffc117b0290 a2=0 a3=7ffc117b027c items=0 ppid=1633 pid=1715 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:32:23.336000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054
Oct  2 21:32:23.341000 audit[1717]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1717 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 21:32:23.341000 audit[1717]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7fff753c9260 a2=0 a3=7fff753c924c items=0 ppid=1633 pid=1717 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:32:23.341000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054
Oct  2 21:32:23.346000 audit[1719]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1719 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 21:32:23.346000 audit[1719]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7fffff166830 a2=0 a3=7fffff16681c items=0 ppid=1633 pid=1719 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:32:23.346000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552
Oct  2 21:32:23.353000 audit[1721]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1721 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 21:32:23.353000 audit[1721]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7fff1ce3b550 a2=0 a3=7fff1ce3b53c items=0 ppid=1633 pid=1721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:32:23.353000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38
Oct  2 21:32:23.358000 audit[1723]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1723 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 21:32:23.358000 audit[1723]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7fff79d2cd70 a2=0 a3=7fff79d2cd5c items=0 ppid=1633 pid=1723 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:32:23.358000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552
Oct  2 21:32:23.381000 audit[1726]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1726 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 21:32:23.381000 audit[1726]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7fffa68f26a0 a2=0 a3=7fffa68f268c items=0 ppid=1633 pid=1726 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:32:23.381000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054
Oct  2 21:32:23.386000 audit[1728]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1728 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 21:32:23.386000 audit[1728]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7ffcfc4f8300 a2=0 a3=7ffcfc4f82ec items=0 ppid=1633 pid=1728 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:32:23.386000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31
Oct  2 21:32:23.391000 audit[1730]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1730 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 21:32:23.391000 audit[1730]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffdca057fa0 a2=0 a3=7ffdca057f8c items=0 ppid=1633 pid=1730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:32:23.391000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32
Oct  2 21:32:23.397000 audit[1732]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1732 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 21:32:23.397000 audit[1732]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffdb6b9af80 a2=0 a3=7ffdb6b9af6c items=0 ppid=1633 pid=1732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:32:23.397000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50
Oct  2 21:32:23.399128 systemd-networkd[1301]: docker0: Link UP
Oct  2 21:32:23.412000 audit[1736]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1736 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 21:32:23.412000 audit[1736]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd9f251e10 a2=0 a3=7ffd9f251dfc items=0 ppid=1633 pid=1736 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:32:23.412000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552
Oct  2 21:32:23.416000 audit[1737]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1737 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 21:32:23.416000 audit[1737]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffc119a28f0 a2=0 a3=7ffc119a28dc items=0 ppid=1633 pid=1737 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:32:23.416000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552
Oct  2 21:32:23.417671 env[1633]: time="2023-10-02T21:32:23.417576818Z" level=info msg="Loading containers: done."
Oct  2 21:32:23.439392 env[1633]: time="2023-10-02T21:32:23.439282024Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2
Oct  2 21:32:23.439745 env[1633]: time="2023-10-02T21:32:23.439695505Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23
Oct  2 21:32:23.440009 env[1633]: time="2023-10-02T21:32:23.439932106Z" level=info msg="Daemon has completed initialization"
Oct  2 21:32:23.443518 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck1357848355-merged.mount: Deactivated successfully.
Oct  2 21:32:23.464766 systemd[1]: Started docker.service.
Oct  2 21:32:23.464000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:32:23.479990 env[1633]: time="2023-10-02T21:32:23.479854905Z" level=info msg="API listen on /run/docker.sock"
Oct  2 21:32:23.525404 systemd[1]: Reloading.
Oct  2 21:32:23.594997 /usr/lib/systemd/system-generators/torcx-generator[1790]: time="2023-10-02T21:32:23Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.0 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.0 /var/lib/torcx/store]"
Oct  2 21:32:23.595033 /usr/lib/systemd/system-generators/torcx-generator[1790]: time="2023-10-02T21:32:23Z" level=info msg="torcx already run"
Oct  2 21:32:23.686950 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon.
Oct  2 21:32:23.686961 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon.
Oct  2 21:32:23.701378 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly.
Oct  2 21:32:23.743000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:23.743000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:23.743000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:23.743000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:23.743000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:23.743000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:23.743000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:23.743000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:23.743000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:23.744000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:23.744000 audit: BPF prog-id=37 op=LOAD
Oct  2 21:32:23.744000 audit: BPF prog-id=31 op=UNLOAD
Oct  2 21:32:23.744000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:23.744000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:23.744000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:23.744000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:23.744000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:23.744000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:23.744000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:23.744000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:23.744000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:23.744000 audit: BPF prog-id=38 op=LOAD
Oct  2 21:32:23.744000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:23.744000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:23.744000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:23.744000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:23.744000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:23.744000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:23.744000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:23.744000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:23.744000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:23.744000 audit: BPF prog-id=39 op=LOAD
Oct  2 21:32:23.744000 audit: BPF prog-id=24 op=UNLOAD
Oct  2 21:32:23.744000 audit: BPF prog-id=25 op=UNLOAD
Oct  2 21:32:23.744000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:23.744000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:23.744000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:23.744000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:23.744000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:23.744000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:23.744000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:23.744000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:23.744000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:23.745000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:23.745000 audit: BPF prog-id=40 op=LOAD
Oct  2 21:32:23.745000 audit: BPF prog-id=30 op=UNLOAD
Oct  2 21:32:23.745000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:23.745000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:23.745000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:23.745000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:23.745000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:23.745000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:23.745000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:23.745000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:23.745000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:23.745000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:23.745000 audit: BPF prog-id=41 op=LOAD
Oct  2 21:32:23.745000 audit: BPF prog-id=27 op=UNLOAD
Oct  2 21:32:23.745000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:23.745000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:23.745000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:23.745000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:23.745000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:23.745000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:23.745000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:23.745000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:23.745000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:23.745000 audit: BPF prog-id=42 op=LOAD
Oct  2 21:32:23.745000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:23.745000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:23.745000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:23.745000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:23.745000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:23.745000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:23.745000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:23.745000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:23.745000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:23.745000 audit: BPF prog-id=43 op=LOAD
Oct  2 21:32:23.745000 audit: BPF prog-id=28 op=UNLOAD
Oct  2 21:32:23.745000 audit: BPF prog-id=29 op=UNLOAD
Oct  2 21:32:23.746000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:23.746000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:23.746000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:23.746000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:23.746000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:23.746000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:23.746000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:23.746000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:23.746000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:23.746000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:23.746000 audit: BPF prog-id=44 op=LOAD
Oct  2 21:32:23.746000 audit: BPF prog-id=26 op=UNLOAD
Oct  2 21:32:23.747000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:23.747000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:23.747000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:23.747000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:23.747000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:23.747000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:23.747000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:23.747000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:23.747000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:23.747000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:23.747000 audit: BPF prog-id=45 op=LOAD
Oct  2 21:32:23.747000 audit: BPF prog-id=32 op=UNLOAD
Oct  2 21:32:23.747000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:23.747000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:23.747000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:23.747000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:23.747000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:23.747000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:23.747000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:23.747000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:23.747000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:23.747000 audit: BPF prog-id=46 op=LOAD
Oct  2 21:32:23.747000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:23.747000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:23.747000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:23.747000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:23.747000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:23.747000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:23.747000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:23.747000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:23.747000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:23.747000 audit: BPF prog-id=47 op=LOAD
Oct  2 21:32:23.747000 audit: BPF prog-id=33 op=UNLOAD
Oct  2 21:32:23.747000 audit: BPF prog-id=34 op=UNLOAD
Oct  2 21:32:23.749000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:23.749000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:23.749000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:23.749000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:23.749000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:23.749000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:23.749000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:23.749000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:23.749000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:23.749000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:23.749000 audit: BPF prog-id=48 op=LOAD
Oct  2 21:32:23.749000 audit: BPF prog-id=21 op=UNLOAD
Oct  2 21:32:23.749000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:23.749000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:23.749000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:23.749000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:23.749000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:23.749000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:23.749000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:23.749000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:23.749000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:23.749000 audit: BPF prog-id=49 op=LOAD
Oct  2 21:32:23.749000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:23.749000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:23.749000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:23.749000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:23.749000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:23.749000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:23.749000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:23.749000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:23.749000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:23.749000 audit: BPF prog-id=50 op=LOAD
Oct  2 21:32:23.749000 audit: BPF prog-id=22 op=UNLOAD
Oct  2 21:32:23.749000 audit: BPF prog-id=23 op=UNLOAD
Oct  2 21:32:23.750000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:23.750000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:23.750000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:23.750000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:23.750000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:23.750000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:23.750000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:23.750000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:23.750000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:23.750000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:23.750000 audit: BPF prog-id=51 op=LOAD
Oct  2 21:32:23.750000 audit: BPF prog-id=35 op=UNLOAD
Oct  2 21:32:23.755006 systemd[1]: Started kubelet.service.
Oct  2 21:32:23.754000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:32:23.775226 kubelet[1847]: E1002 21:32:23.775175    1847 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory"
Oct  2 21:32:23.776295 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE
Oct  2 21:32:23.776356 systemd[1]: kubelet.service: Failed with result 'exit-code'.
Oct  2 21:32:23.776000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed'
Oct  2 21:32:24.195124 env[1455]: time="2023-10-02T21:32:24.195078371Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.28.2\""
Oct  2 21:32:24.872871 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2137874535.mount: Deactivated successfully.
Oct  2 21:32:26.443598 env[1455]: time="2023-10-02T21:32:26.443552364Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.28.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 21:32:26.444847 env[1455]: time="2023-10-02T21:32:26.444805609Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cdcab12b2dd16cce4efc5dd43c082469364f19ad978e922d110b74a42eff7cce,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 21:32:26.446404 env[1455]: time="2023-10-02T21:32:26.446363406Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.28.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 21:32:26.447350 env[1455]: time="2023-10-02T21:32:26.447315699Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:6beea2e5531a0606613594fd3ed92d71bbdcef99dd3237522049a0b32cad736c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 21:32:26.447872 env[1455]: time="2023-10-02T21:32:26.447821326Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.28.2\" returns image reference \"sha256:cdcab12b2dd16cce4efc5dd43c082469364f19ad978e922d110b74a42eff7cce\""
Oct  2 21:32:26.453580 env[1455]: time="2023-10-02T21:32:26.453517122Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.28.2\""
Oct  2 21:32:28.358527 env[1455]: time="2023-10-02T21:32:28.358464422Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.28.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 21:32:28.359153 env[1455]: time="2023-10-02T21:32:28.359111224Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:55f13c92defb1eb854040a76e366da866bdcb1cc31fd97b2cde94433c8bf3f57,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 21:32:28.360216 env[1455]: time="2023-10-02T21:32:28.360161561Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.28.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 21:32:28.361055 env[1455]: time="2023-10-02T21:32:28.361044651Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:6a42ce14d716205a99763f3c732c0a8f0ea041bdbbea7d2dfffcc53dafd7cac4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 21:32:28.361819 env[1455]: time="2023-10-02T21:32:28.361805915Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.28.2\" returns image reference \"sha256:55f13c92defb1eb854040a76e366da866bdcb1cc31fd97b2cde94433c8bf3f57\""
Oct  2 21:32:28.368512 env[1455]: time="2023-10-02T21:32:28.368495827Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.28.2\""
Oct  2 21:32:29.539869 env[1455]: time="2023-10-02T21:32:29.539840791Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.28.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 21:32:29.540401 env[1455]: time="2023-10-02T21:32:29.540388968Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7a5d9d67a13f6ae031989bc2969ec55b06437725f397e6eb75b1dccac465a7b8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 21:32:29.541553 env[1455]: time="2023-10-02T21:32:29.541538813Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.28.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 21:32:29.542347 env[1455]: time="2023-10-02T21:32:29.542334399Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:6511193f8114a2f011790619698efe12a8119ed9a17e2e36f4c1c759ccf173ab,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 21:32:29.542811 env[1455]: time="2023-10-02T21:32:29.542798013Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.28.2\" returns image reference \"sha256:7a5d9d67a13f6ae031989bc2969ec55b06437725f397e6eb75b1dccac465a7b8\""
Oct  2 21:32:29.548134 env[1455]: time="2023-10-02T21:32:29.548083659Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.28.2\""
Oct  2 21:32:30.317419 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4110562448.mount: Deactivated successfully.
Oct  2 21:32:30.655707 env[1455]: time="2023-10-02T21:32:30.655615501Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.28.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 21:32:30.656213 env[1455]: time="2023-10-02T21:32:30.656172876Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c120fed2beb84b861c2382ce81ab046c0ae612e91264ef7c9e61df5900fa0bb0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 21:32:30.656880 env[1455]: time="2023-10-02T21:32:30.656825846Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.28.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 21:32:30.657637 env[1455]: time="2023-10-02T21:32:30.657597639Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:41c8f92d1cd571e0e36af431f35c78379f84f5daf5b85d43014a9940d697afcf,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 21:32:30.658355 env[1455]: time="2023-10-02T21:32:30.658332459Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.28.2\" returns image reference \"sha256:c120fed2beb84b861c2382ce81ab046c0ae612e91264ef7c9e61df5900fa0bb0\""
Oct  2 21:32:30.663549 env[1455]: time="2023-10-02T21:32:30.663518215Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\""
Oct  2 21:32:31.222540 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2131969547.mount: Deactivated successfully.
Oct  2 21:32:31.224064 env[1455]: time="2023-10-02T21:32:31.224045050Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 21:32:31.224670 env[1455]: time="2023-10-02T21:32:31.224658013Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 21:32:31.225278 env[1455]: time="2023-10-02T21:32:31.225267692Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 21:32:31.226209 env[1455]: time="2023-10-02T21:32:31.226196534Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 21:32:31.226510 env[1455]: time="2023-10-02T21:32:31.226421693Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c\""
Oct  2 21:32:31.231902 env[1455]: time="2023-10-02T21:32:31.231883538Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.9-0\""
Oct  2 21:32:34.026810 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1.
Oct  2 21:32:34.025000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:32:34.026940 systemd[1]: Stopped kubelet.service.
Oct  2 21:32:34.027831 systemd[1]: Started kubelet.service.
Oct  2 21:32:34.049119 kernel: kauditd_printk_skb: 259 callbacks suppressed
Oct  2 21:32:34.049193 kernel: audit: type=1130 audit(1696282354.025:385): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:32:34.051972 kubelet[1936]: E1002 21:32:34.051874    1936 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory"
Oct  2 21:32:34.053995 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE
Oct  2 21:32:34.054061 systemd[1]: kubelet.service: Failed with result 'exit-code'.
Oct  2 21:32:34.025000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:32:34.160260 kernel: audit: type=1131 audit(1696282354.025:386): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:32:34.160300 kernel: audit: type=1130 audit(1696282354.026:387): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:32:34.026000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:32:34.216722 kernel: audit: type=1131 audit(1696282354.052:388): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed'
Oct  2 21:32:34.052000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed'
Oct  2 21:32:34.756683 env[1455]: time="2023-10-02T21:32:34.756635883Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.9-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 21:32:34.757337 env[1455]: time="2023-10-02T21:32:34.757291828Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:73deb9a3f702532592a4167455f8bf2e5f5d900bcc959ba2fd2d35c321de1af9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 21:32:34.758354 env[1455]: time="2023-10-02T21:32:34.758314656Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.9-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 21:32:34.759590 env[1455]: time="2023-10-02T21:32:34.759556105Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:e013d0d5e4e25d00c61a7ff839927a1f36479678f11e49502b53a5e0b14f10c3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 21:32:34.759955 env[1455]: time="2023-10-02T21:32:34.759920158Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.9-0\" returns image reference \"sha256:73deb9a3f702532592a4167455f8bf2e5f5d900bcc959ba2fd2d35c321de1af9\""
Oct  2 21:32:34.766726 env[1455]: time="2023-10-02T21:32:34.766709194Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.10.1\""
Oct  2 21:32:35.388720 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1579380696.mount: Deactivated successfully.
Oct  2 21:32:35.798098 env[1455]: time="2023-10-02T21:32:35.798002022Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.10.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 21:32:35.798644 env[1455]: time="2023-10-02T21:32:35.798603072Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ead0a4a53df89fd173874b46093b6e62d8c72967bbf606d672c9e8c9b601a4fc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 21:32:35.799390 env[1455]: time="2023-10-02T21:32:35.799348996Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.10.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 21:32:35.800290 env[1455]: time="2023-10-02T21:32:35.800258298Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:a0ead06651cf580044aeb0a0feba63591858fb2e43ade8c9dea45a6a89ae7e5e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 21:32:35.800722 env[1455]: time="2023-10-02T21:32:35.800679887Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.10.1\" returns image reference \"sha256:ead0a4a53df89fd173874b46093b6e62d8c72967bbf606d672c9e8c9b601a4fc\""
Oct  2 21:32:37.389026 systemd[1]: Stopped kubelet.service.
Oct  2 21:32:37.388000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:32:37.398420 systemd[1]: Reloading.
Oct  2 21:32:37.431516 /usr/lib/systemd/system-generators/torcx-generator[2105]: time="2023-10-02T21:32:37Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.0 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.0 /var/lib/torcx/store]"
Oct  2 21:32:37.431532 /usr/lib/systemd/system-generators/torcx-generator[2105]: time="2023-10-02T21:32:37Z" level=info msg="torcx already run"
Oct  2 21:32:37.388000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:32:37.451507 kernel: audit: type=1130 audit(1696282357.388:389): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:32:37.451568 kernel: audit: type=1131 audit(1696282357.388:390): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:32:37.531869 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon.
Oct  2 21:32:37.531877 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon.
Oct  2 21:32:37.542585 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly.
Oct  2 21:32:37.586000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:37.586000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:37.711367 kernel: audit: type=1400 audit(1696282357.586:391): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:37.711416 kernel: audit: type=1400 audit(1696282357.586:392): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:37.711433 kernel: audit: type=1400 audit(1696282357.586:393): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:37.586000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:37.773265 kernel: audit: type=1400 audit(1696282357.586:394): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:37.586000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:37.586000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:37.586000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:37.586000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:37.586000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:37.586000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:37.771000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:37.771000 audit: BPF prog-id=52 op=LOAD
Oct  2 21:32:37.771000 audit: BPF prog-id=37 op=UNLOAD
Oct  2 21:32:37.771000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:37.771000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:37.771000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:37.771000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:37.771000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:37.771000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:37.771000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:37.771000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:37.835000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:37.835000 audit: BPF prog-id=53 op=LOAD
Oct  2 21:32:37.835000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:37.835000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:37.835000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:37.835000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:37.835000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:37.835000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:37.835000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:37.835000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:37.835000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:37.835000 audit: BPF prog-id=54 op=LOAD
Oct  2 21:32:37.835000 audit: BPF prog-id=38 op=UNLOAD
Oct  2 21:32:37.835000 audit: BPF prog-id=39 op=UNLOAD
Oct  2 21:32:37.836000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:37.836000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:37.836000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:37.836000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:37.836000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:37.836000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:37.836000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:37.836000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:37.836000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:37.836000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:37.836000 audit: BPF prog-id=55 op=LOAD
Oct  2 21:32:37.836000 audit: BPF prog-id=40 op=UNLOAD
Oct  2 21:32:37.836000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:37.836000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:37.836000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:37.836000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:37.836000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:37.836000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:37.836000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:37.836000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:37.836000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:37.836000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:37.836000 audit: BPF prog-id=56 op=LOAD
Oct  2 21:32:37.836000 audit: BPF prog-id=41 op=UNLOAD
Oct  2 21:32:37.836000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:37.836000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:37.836000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:37.836000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:37.836000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:37.836000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:37.836000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:37.836000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:37.836000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:37.836000 audit: BPF prog-id=57 op=LOAD
Oct  2 21:32:37.836000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:37.836000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:37.836000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:37.836000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:37.836000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:37.836000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:37.836000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:37.837000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:37.837000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:37.837000 audit: BPF prog-id=58 op=LOAD
Oct  2 21:32:37.837000 audit: BPF prog-id=42 op=UNLOAD
Oct  2 21:32:37.837000 audit: BPF prog-id=43 op=UNLOAD
Oct  2 21:32:37.837000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:37.837000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:37.837000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:37.837000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:37.837000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:37.837000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:37.837000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:37.837000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:37.837000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:37.838000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:37.838000 audit: BPF prog-id=59 op=LOAD
Oct  2 21:32:37.838000 audit: BPF prog-id=44 op=UNLOAD
Oct  2 21:32:37.838000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:37.838000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:37.838000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:37.838000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:37.838000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:37.838000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:37.838000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:37.838000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:37.838000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:37.839000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:37.839000 audit: BPF prog-id=60 op=LOAD
Oct  2 21:32:37.839000 audit: BPF prog-id=45 op=UNLOAD
Oct  2 21:32:37.839000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:37.839000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:37.839000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:37.839000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:37.839000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:37.839000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:37.839000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:37.839000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:37.839000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:37.839000 audit: BPF prog-id=61 op=LOAD
Oct  2 21:32:37.839000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:37.839000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:37.839000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:37.839000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:37.839000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:37.839000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:37.839000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:37.839000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:37.839000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:37.839000 audit: BPF prog-id=62 op=LOAD
Oct  2 21:32:37.839000 audit: BPF prog-id=46 op=UNLOAD
Oct  2 21:32:37.839000 audit: BPF prog-id=47 op=UNLOAD
Oct  2 21:32:37.840000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:37.840000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:37.840000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:37.840000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:37.840000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:37.840000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:37.840000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:37.840000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:37.840000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:37.840000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:37.840000 audit: BPF prog-id=63 op=LOAD
Oct  2 21:32:37.840000 audit: BPF prog-id=48 op=UNLOAD
Oct  2 21:32:37.840000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:37.840000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:37.840000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:37.840000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:37.840000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:37.840000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:37.840000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:37.840000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:37.840000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:37.840000 audit: BPF prog-id=64 op=LOAD
Oct  2 21:32:37.840000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:37.840000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:37.840000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:37.840000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:37.840000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:37.840000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:37.840000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:37.840000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:37.840000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:37.840000 audit: BPF prog-id=65 op=LOAD
Oct  2 21:32:37.840000 audit: BPF prog-id=49 op=UNLOAD
Oct  2 21:32:37.840000 audit: BPF prog-id=50 op=UNLOAD
Oct  2 21:32:37.841000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:37.841000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:37.841000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:37.841000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:37.841000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:37.841000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:37.841000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:37.841000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:37.841000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:37.841000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:37.841000 audit: BPF prog-id=66 op=LOAD
Oct  2 21:32:37.841000 audit: BPF prog-id=51 op=UNLOAD
Oct  2 21:32:37.848102 systemd[1]: Started kubelet.service.
Oct  2 21:32:37.847000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:32:37.870979 kubelet[2162]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information.
Oct  2 21:32:37.870979 kubelet[2162]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI.
Oct  2 21:32:37.870979 kubelet[2162]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information.
Oct  2 21:32:37.871225 kubelet[2162]: I1002 21:32:37.871126    2162 server.go:203] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime"
Oct  2 21:32:38.135537 kubelet[2162]: I1002 21:32:38.135432    2162 server.go:467] "Kubelet version" kubeletVersion="v1.28.1"
Oct  2 21:32:38.135537 kubelet[2162]: I1002 21:32:38.135469    2162 server.go:469] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK=""
Oct  2 21:32:38.135622 kubelet[2162]: I1002 21:32:38.135615    2162 server.go:895] "Client rotation is on, will bootstrap in background"
Oct  2 21:32:38.137798 kubelet[2162]: I1002 21:32:38.137759    2162 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt"
Oct  2 21:32:38.138396 kubelet[2162]: E1002 21:32:38.138388    2162 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://139.178.70.49:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 139.178.70.49:6443: connect: connection refused
Oct  2 21:32:38.158687 kubelet[2162]: I1002 21:32:38.158649    2162 server.go:725] "--cgroups-per-qos enabled, but --cgroup-root was not specified.  defaulting to /"
Oct  2 21:32:38.158791 kubelet[2162]: I1002 21:32:38.158756    2162 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[]
Oct  2 21:32:38.158883 kubelet[2162]: I1002 21:32:38.158847    2162 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null}
Oct  2 21:32:38.158883 kubelet[2162]: I1002 21:32:38.158860    2162 topology_manager.go:138] "Creating topology manager with none policy"
Oct  2 21:32:38.158883 kubelet[2162]: I1002 21:32:38.158866    2162 container_manager_linux.go:301] "Creating device plugin manager"
Oct  2 21:32:38.159009 kubelet[2162]: I1002 21:32:38.158921    2162 state_mem.go:36] "Initialized new in-memory state store"
Oct  2 21:32:38.159009 kubelet[2162]: I1002 21:32:38.158965    2162 kubelet.go:393] "Attempting to sync node with API server"
Oct  2 21:32:38.159009 kubelet[2162]: I1002 21:32:38.158974    2162 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests"
Oct  2 21:32:38.159009 kubelet[2162]: I1002 21:32:38.158987    2162 kubelet.go:309] "Adding apiserver pod source"
Oct  2 21:32:38.159009 kubelet[2162]: I1002 21:32:38.158994    2162 apiserver.go:42] "Waiting for node sync before watching apiserver pods"
Oct  2 21:32:38.159225 kubelet[2162]: I1002 21:32:38.159213    2162 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1"
Oct  2 21:32:38.159284 kubelet[2162]: W1002 21:32:38.159261    2162 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://139.178.70.49:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.0-a-a1bcd9ea1c&limit=500&resourceVersion=0": dial tcp 139.178.70.49:6443: connect: connection refused
Oct  2 21:32:38.159284 kubelet[2162]: W1002 21:32:38.159262    2162 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://139.178.70.49:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 139.178.70.49:6443: connect: connection refused
Oct  2 21:32:38.159338 kubelet[2162]: E1002 21:32:38.159295    2162 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://139.178.70.49:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.0-a-a1bcd9ea1c&limit=500&resourceVersion=0": dial tcp 139.178.70.49:6443: connect: connection refused
Oct  2 21:32:38.159338 kubelet[2162]: E1002 21:32:38.159300    2162 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://139.178.70.49:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 139.178.70.49:6443: connect: connection refused
Oct  2 21:32:38.159386 kubelet[2162]: W1002 21:32:38.159346    2162 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating.
Oct  2 21:32:38.159617 kubelet[2162]: I1002 21:32:38.159611    2162 server.go:1232] "Started kubelet"
Oct  2 21:32:38.159672 kubelet[2162]: I1002 21:32:38.159661    2162 server.go:162] "Starting to listen" address="0.0.0.0" port=10250
Oct  2 21:32:38.159707 kubelet[2162]: I1002 21:32:38.159672    2162 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10
Oct  2 21:32:38.160000 kubelet[2162]: E1002 21:32:38.159905    2162 event.go:289] Unable to write event: '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510.3.0-a-a1bcd9ea1c.178a67d144dd6a94", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510.3.0-a-a1bcd9ea1c", UID:"ci-3510.3.0-a-a1bcd9ea1c", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.0-a-a1bcd9ea1c"}, FirstTimestamp:time.Date(2023, time.October, 2, 21, 32, 38, 159600276, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 21, 32, 38, 159600276, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"ci-3510.3.0-a-a1bcd9ea1c"}': 'Post "https://139.178.70.49:6443/api/v1/namespaces/default/events": dial tcp 139.178.70.49:6443: connect: connection refused'(may retry after sleeping)
Oct  2 21:32:38.160089 kubelet[2162]: I1002 21:32:38.160009    2162 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock"
Oct  2 21:32:38.160089 kubelet[2162]: E1002 21:32:38.160010    2162 cri_stats_provider.go:448] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs"
Oct  2 21:32:38.160089 kubelet[2162]: E1002 21:32:38.160040    2162 kubelet.go:1431] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem"
Oct  2 21:32:38.161154 kubelet[2162]: I1002 21:32:38.161146    2162 server.go:462] "Adding debug handlers to kubelet server"
Oct  2 21:32:38.160000 audit[2162]: AVC avc:  denied  { mac_admin } for  pid=2162 comm="kubelet" capability=33  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:38.160000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0"
Oct  2 21:32:38.160000 audit[2162]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000a18540 a1=c00007eee8 a2=c000a18510 a3=25 items=0 ppid=1 pid=2162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:32:38.160000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669
Oct  2 21:32:38.160000 audit[2162]: AVC avc:  denied  { mac_admin } for  pid=2162 comm="kubelet" capability=33  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:38.160000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0"
Oct  2 21:32:38.160000 audit[2162]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000de2200 a1=c00007ef00 a2=c000a185d0 a3=25 items=0 ppid=1 pid=2162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:32:38.160000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669
Oct  2 21:32:38.161595 kubelet[2162]: I1002 21:32:38.161323    2162 kubelet.go:1386] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument"
Oct  2 21:32:38.161595 kubelet[2162]: I1002 21:32:38.161345    2162 kubelet.go:1390] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument"
Oct  2 21:32:38.161595 kubelet[2162]: I1002 21:32:38.161380    2162 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer"
Oct  2 21:32:38.161595 kubelet[2162]: I1002 21:32:38.161409    2162 volume_manager.go:291] "Starting Kubelet Volume Manager"
Oct  2 21:32:38.161595 kubelet[2162]: E1002 21:32:38.161432    2162 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ci-3510.3.0-a-a1bcd9ea1c\" not found"
Oct  2 21:32:38.161595 kubelet[2162]: I1002 21:32:38.161459    2162 desired_state_of_world_populator.go:151] "Desired state populator starts to run"
Oct  2 21:32:38.161595 kubelet[2162]: I1002 21:32:38.161496    2162 reconciler_new.go:29] "Reconciler: start to sync state"
Oct  2 21:32:38.161754 kubelet[2162]: E1002 21:32:38.161630    2162 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://139.178.70.49:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.0-a-a1bcd9ea1c?timeout=10s\": dial tcp 139.178.70.49:6443: connect: connection refused" interval="200ms"
Oct  2 21:32:38.161754 kubelet[2162]: W1002 21:32:38.161640    2162 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://139.178.70.49:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 139.178.70.49:6443: connect: connection refused
Oct  2 21:32:38.161754 kubelet[2162]: E1002 21:32:38.161679    2162 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://139.178.70.49:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 139.178.70.49:6443: connect: connection refused
Oct  2 21:32:38.162000 audit[2184]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=2184 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 21:32:38.162000 audit[2184]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffeb8687080 a2=0 a3=7ffeb868706c items=0 ppid=2162 pid=2184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:32:38.162000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65
Oct  2 21:32:38.163000 audit[2185]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=2185 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 21:32:38.163000 audit[2185]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc01f8a2b0 a2=0 a3=7ffc01f8a29c items=0 ppid=2162 pid=2185 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:32:38.163000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572
Oct  2 21:32:38.164000 audit[2187]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=2187 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 21:32:38.164000 audit[2187]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffed90a93b0 a2=0 a3=7ffed90a939c items=0 ppid=2162 pid=2187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:32:38.164000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C
Oct  2 21:32:38.165000 audit[2189]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=2189 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 21:32:38.165000 audit[2189]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fff7e343660 a2=0 a3=7fff7e34364c items=0 ppid=2162 pid=2189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:32:38.165000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C
Oct  2 21:32:38.168000 audit[2192]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=2192 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 21:32:38.168000 audit[2192]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffd12632260 a2=0 a3=7ffd1263224c items=0 ppid=2162 pid=2192 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:32:38.168000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38
Oct  2 21:32:38.169205 kubelet[2162]: I1002 21:32:38.169182    2162 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4"
Oct  2 21:32:38.169000 audit[2193]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=2193 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Oct  2 21:32:38.169000 audit[2193]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffe0df7c3e0 a2=0 a3=7ffe0df7c3cc items=0 ppid=2162 pid=2193 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:32:38.169000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65
Oct  2 21:32:38.169690 kubelet[2162]: I1002 21:32:38.169682    2162 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6"
Oct  2 21:32:38.169716 kubelet[2162]: I1002 21:32:38.169699    2162 status_manager.go:217] "Starting to sync pod status with apiserver"
Oct  2 21:32:38.169716 kubelet[2162]: I1002 21:32:38.169714    2162 kubelet.go:2303] "Starting kubelet main sync loop"
Oct  2 21:32:38.169000 audit[2194]: NETFILTER_CFG table=mangle:32 family=2 entries=1 op=nft_register_chain pid=2194 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 21:32:38.169000 audit[2194]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcca3dba30 a2=0 a3=7ffcca3dba1c items=0 ppid=2162 pid=2194 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:32:38.169000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65
Oct  2 21:32:38.169815 kubelet[2162]: E1002 21:32:38.169747    2162 kubelet.go:2327] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]"
Oct  2 21:32:38.169940 kubelet[2162]: W1002 21:32:38.169926    2162 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://139.178.70.49:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 139.178.70.49:6443: connect: connection refused
Oct  2 21:32:38.169970 kubelet[2162]: E1002 21:32:38.169944    2162 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://139.178.70.49:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 139.178.70.49:6443: connect: connection refused
Oct  2 21:32:38.169000 audit[2196]: NETFILTER_CFG table=mangle:33 family=10 entries=1 op=nft_register_chain pid=2196 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Oct  2 21:32:38.169000 audit[2196]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd9e179dd0 a2=0 a3=7ffd9e179dbc items=0 ppid=2162 pid=2196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:32:38.169000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65
Oct  2 21:32:38.169000 audit[2197]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=2197 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 21:32:38.169000 audit[2197]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcf34f8e40 a2=0 a3=7ffcf34f8e2c items=0 ppid=2162 pid=2197 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:32:38.169000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174
Oct  2 21:32:38.170000 audit[2198]: NETFILTER_CFG table=nat:35 family=10 entries=2 op=nft_register_chain pid=2198 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Oct  2 21:32:38.170000 audit[2198]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffc9f635a20 a2=0 a3=7ffc9f635a0c items=0 ppid=2162 pid=2198 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:32:38.170000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174
Oct  2 21:32:38.170000 audit[2200]: NETFILTER_CFG table=filter:36 family=2 entries=1 op=nft_register_chain pid=2200 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 21:32:38.170000 audit[2200]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffb0647ae0 a2=0 a3=7fffb0647acc items=0 ppid=2162 pid=2200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:32:38.170000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572
Oct  2 21:32:38.170000 audit[2203]: NETFILTER_CFG table=filter:37 family=10 entries=2 op=nft_register_chain pid=2203 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Oct  2 21:32:38.170000 audit[2203]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd375cd270 a2=0 a3=7ffd375cd25c items=0 ppid=2162 pid=2203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:32:38.170000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572
Oct  2 21:32:38.185983 kubelet[2162]: I1002 21:32:38.185974    2162 cpu_manager.go:214] "Starting CPU manager" policy="none"
Oct  2 21:32:38.185983 kubelet[2162]: I1002 21:32:38.185984    2162 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s"
Oct  2 21:32:38.186060 kubelet[2162]: I1002 21:32:38.185993    2162 state_mem.go:36] "Initialized new in-memory state store"
Oct  2 21:32:38.186909 kubelet[2162]: I1002 21:32:38.186901    2162 policy_none.go:49] "None policy: Start"
Oct  2 21:32:38.187185 kubelet[2162]: I1002 21:32:38.187177    2162 memory_manager.go:169] "Starting memorymanager" policy="None"
Oct  2 21:32:38.187223 kubelet[2162]: I1002 21:32:38.187192    2162 state_mem.go:35] "Initializing new in-memory state store"
Oct  2 21:32:38.189728 systemd[1]: Created slice kubepods.slice.
Oct  2 21:32:38.192174 systemd[1]: Created slice kubepods-burstable.slice.
Oct  2 21:32:38.193876 systemd[1]: Created slice kubepods-besteffort.slice.
Oct  2 21:32:38.214342 kubelet[2162]: I1002 21:32:38.214316    2162 manager.go:471] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found"
Oct  2 21:32:38.212000 audit[2162]: AVC avc:  denied  { mac_admin } for  pid=2162 comm="kubelet" capability=33  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:38.212000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0"
Oct  2 21:32:38.212000 audit[2162]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0009a26f0 a1=c00128b680 a2=c0009a26c0 a3=25 items=0 ppid=1 pid=2162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:32:38.212000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669
Oct  2 21:32:38.214775 kubelet[2162]: I1002 21:32:38.214376    2162 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument"
Oct  2 21:32:38.214775 kubelet[2162]: I1002 21:32:38.214612    2162 plugin_manager.go:118] "Starting Kubelet Plugin Manager"
Oct  2 21:32:38.215035 kubelet[2162]: E1002 21:32:38.214990    2162 eviction_manager.go:258] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ci-3510.3.0-a-a1bcd9ea1c\" not found"
Oct  2 21:32:38.266431 kubelet[2162]: I1002 21:32:38.266345    2162 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.0-a-a1bcd9ea1c"
Oct  2 21:32:38.267108 kubelet[2162]: E1002 21:32:38.267027    2162 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://139.178.70.49:6443/api/v1/nodes\": dial tcp 139.178.70.49:6443: connect: connection refused" node="ci-3510.3.0-a-a1bcd9ea1c"
Oct  2 21:32:38.270465 kubelet[2162]: I1002 21:32:38.270377    2162 topology_manager.go:215] "Topology Admit Handler" podUID="16016fa05e649da041f0af6b7c1e1bcc" podNamespace="kube-system" podName="kube-apiserver-ci-3510.3.0-a-a1bcd9ea1c"
Oct  2 21:32:38.273750 kubelet[2162]: I1002 21:32:38.273670    2162 topology_manager.go:215] "Topology Admit Handler" podUID="5392bd9162ac58601a682c0fc55fa1cc" podNamespace="kube-system" podName="kube-controller-manager-ci-3510.3.0-a-a1bcd9ea1c"
Oct  2 21:32:38.277184 kubelet[2162]: I1002 21:32:38.277111    2162 topology_manager.go:215] "Topology Admit Handler" podUID="b2da6a5b01a1da22b4df10906e0f6976" podNamespace="kube-system" podName="kube-scheduler-ci-3510.3.0-a-a1bcd9ea1c"
Oct  2 21:32:38.290554 systemd[1]: Created slice kubepods-burstable-pod16016fa05e649da041f0af6b7c1e1bcc.slice.
Oct  2 21:32:38.333474 systemd[1]: Created slice kubepods-burstable-pod5392bd9162ac58601a682c0fc55fa1cc.slice.
Oct  2 21:32:38.362323 kubelet[2162]: E1002 21:32:38.362268    2162 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://139.178.70.49:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.0-a-a1bcd9ea1c?timeout=10s\": dial tcp 139.178.70.49:6443: connect: connection refused" interval="400ms"
Oct  2 21:32:38.363258 kubelet[2162]: I1002 21:32:38.363176    2162 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/5392bd9162ac58601a682c0fc55fa1cc-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.0-a-a1bcd9ea1c\" (UID: \"5392bd9162ac58601a682c0fc55fa1cc\") " pod="kube-system/kube-controller-manager-ci-3510.3.0-a-a1bcd9ea1c"
Oct  2 21:32:38.363457 kubelet[2162]: I1002 21:32:38.363309    2162 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/5392bd9162ac58601a682c0fc55fa1cc-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.0-a-a1bcd9ea1c\" (UID: \"5392bd9162ac58601a682c0fc55fa1cc\") " pod="kube-system/kube-controller-manager-ci-3510.3.0-a-a1bcd9ea1c"
Oct  2 21:32:38.363598 kubelet[2162]: I1002 21:32:38.363465    2162 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/5392bd9162ac58601a682c0fc55fa1cc-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.0-a-a1bcd9ea1c\" (UID: \"5392bd9162ac58601a682c0fc55fa1cc\") " pod="kube-system/kube-controller-manager-ci-3510.3.0-a-a1bcd9ea1c"
Oct  2 21:32:38.363705 kubelet[2162]: I1002 21:32:38.363615    2162 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/16016fa05e649da041f0af6b7c1e1bcc-ca-certs\") pod \"kube-apiserver-ci-3510.3.0-a-a1bcd9ea1c\" (UID: \"16016fa05e649da041f0af6b7c1e1bcc\") " pod="kube-system/kube-apiserver-ci-3510.3.0-a-a1bcd9ea1c"
Oct  2 21:32:38.363705 kubelet[2162]: I1002 21:32:38.363697    2162 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/16016fa05e649da041f0af6b7c1e1bcc-k8s-certs\") pod \"kube-apiserver-ci-3510.3.0-a-a1bcd9ea1c\" (UID: \"16016fa05e649da041f0af6b7c1e1bcc\") " pod="kube-system/kube-apiserver-ci-3510.3.0-a-a1bcd9ea1c"
Oct  2 21:32:38.363894 kubelet[2162]: I1002 21:32:38.363756    2162 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/5392bd9162ac58601a682c0fc55fa1cc-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.0-a-a1bcd9ea1c\" (UID: \"5392bd9162ac58601a682c0fc55fa1cc\") " pod="kube-system/kube-controller-manager-ci-3510.3.0-a-a1bcd9ea1c"
Oct  2 21:32:38.363894 kubelet[2162]: I1002 21:32:38.363811    2162 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/b2da6a5b01a1da22b4df10906e0f6976-kubeconfig\") pod \"kube-scheduler-ci-3510.3.0-a-a1bcd9ea1c\" (UID: \"b2da6a5b01a1da22b4df10906e0f6976\") " pod="kube-system/kube-scheduler-ci-3510.3.0-a-a1bcd9ea1c"
Oct  2 21:32:38.363894 kubelet[2162]: I1002 21:32:38.363879    2162 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/16016fa05e649da041f0af6b7c1e1bcc-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.0-a-a1bcd9ea1c\" (UID: \"16016fa05e649da041f0af6b7c1e1bcc\") " pod="kube-system/kube-apiserver-ci-3510.3.0-a-a1bcd9ea1c"
Oct  2 21:32:38.364156 kubelet[2162]: I1002 21:32:38.363933    2162 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/5392bd9162ac58601a682c0fc55fa1cc-ca-certs\") pod \"kube-controller-manager-ci-3510.3.0-a-a1bcd9ea1c\" (UID: \"5392bd9162ac58601a682c0fc55fa1cc\") " pod="kube-system/kube-controller-manager-ci-3510.3.0-a-a1bcd9ea1c"
Oct  2 21:32:38.364801 systemd[1]: Created slice kubepods-burstable-podb2da6a5b01a1da22b4df10906e0f6976.slice.
Oct  2 21:32:38.471637 kubelet[2162]: I1002 21:32:38.471453    2162 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.0-a-a1bcd9ea1c"
Oct  2 21:32:38.472266 kubelet[2162]: E1002 21:32:38.472193    2162 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://139.178.70.49:6443/api/v1/nodes\": dial tcp 139.178.70.49:6443: connect: connection refused" node="ci-3510.3.0-a-a1bcd9ea1c"
Oct  2 21:32:38.631677 env[1455]: time="2023-10-02T21:32:38.631534540Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.0-a-a1bcd9ea1c,Uid:16016fa05e649da041f0af6b7c1e1bcc,Namespace:kube-system,Attempt:0,}"
Oct  2 21:32:38.661658 env[1455]: time="2023-10-02T21:32:38.661521169Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.0-a-a1bcd9ea1c,Uid:5392bd9162ac58601a682c0fc55fa1cc,Namespace:kube-system,Attempt:0,}"
Oct  2 21:32:38.670048 env[1455]: time="2023-10-02T21:32:38.669934419Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.0-a-a1bcd9ea1c,Uid:b2da6a5b01a1da22b4df10906e0f6976,Namespace:kube-system,Attempt:0,}"
Oct  2 21:32:38.763061 kubelet[2162]: E1002 21:32:38.762997    2162 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://139.178.70.49:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.0-a-a1bcd9ea1c?timeout=10s\": dial tcp 139.178.70.49:6443: connect: connection refused" interval="800ms"
Oct  2 21:32:38.875938 kubelet[2162]: I1002 21:32:38.875842    2162 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.0-a-a1bcd9ea1c"
Oct  2 21:32:38.876633 kubelet[2162]: E1002 21:32:38.876577    2162 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://139.178.70.49:6443/api/v1/nodes\": dial tcp 139.178.70.49:6443: connect: connection refused" node="ci-3510.3.0-a-a1bcd9ea1c"
Oct  2 21:32:38.968805 kubelet[2162]: W1002 21:32:38.968644    2162 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://139.178.70.49:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.0-a-a1bcd9ea1c&limit=500&resourceVersion=0": dial tcp 139.178.70.49:6443: connect: connection refused
Oct  2 21:32:38.968805 kubelet[2162]: E1002 21:32:38.968781    2162 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://139.178.70.49:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.0-a-a1bcd9ea1c&limit=500&resourceVersion=0": dial tcp 139.178.70.49:6443: connect: connection refused
Oct  2 21:32:39.126318 kubelet[2162]: W1002 21:32:39.126053    2162 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://139.178.70.49:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 139.178.70.49:6443: connect: connection refused
Oct  2 21:32:39.126318 kubelet[2162]: E1002 21:32:39.126179    2162 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://139.178.70.49:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 139.178.70.49:6443: connect: connection refused
Oct  2 21:32:39.170118 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount224086065.mount: Deactivated successfully.
Oct  2 21:32:39.171087 env[1455]: time="2023-10-02T21:32:39.171023291Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 21:32:39.172694 env[1455]: time="2023-10-02T21:32:39.172652235Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 21:32:39.173407 env[1455]: time="2023-10-02T21:32:39.173373846Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 21:32:39.173855 env[1455]: time="2023-10-02T21:32:39.173807408Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 21:32:39.174599 env[1455]: time="2023-10-02T21:32:39.174564891Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 21:32:39.175767 env[1455]: time="2023-10-02T21:32:39.175723005Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 21:32:39.176153 env[1455]: time="2023-10-02T21:32:39.176119398Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 21:32:39.177806 env[1455]: time="2023-10-02T21:32:39.177764945Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 21:32:39.178652 env[1455]: time="2023-10-02T21:32:39.178615384Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 21:32:39.179475 env[1455]: time="2023-10-02T21:32:39.179428217Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 21:32:39.180033 env[1455]: time="2023-10-02T21:32:39.180003043Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 21:32:39.180445 env[1455]: time="2023-10-02T21:32:39.180430582Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 21:32:39.184802 env[1455]: time="2023-10-02T21:32:39.184736424Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1
Oct  2 21:32:39.184802 env[1455]: time="2023-10-02T21:32:39.184774071Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1
Oct  2 21:32:39.184802 env[1455]: time="2023-10-02T21:32:39.184787893Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1
Oct  2 21:32:39.184919 env[1455]: time="2023-10-02T21:32:39.184880722Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e97e8e94b5c88810f058a6c87247a7cb2a3c490f62531c333b5674cfc964e758 pid=2211 runtime=io.containerd.runc.v2
Oct  2 21:32:39.185779 env[1455]: time="2023-10-02T21:32:39.185752743Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1
Oct  2 21:32:39.185823 env[1455]: time="2023-10-02T21:32:39.185771339Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1
Oct  2 21:32:39.185823 env[1455]: time="2023-10-02T21:32:39.185781988Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1
Oct  2 21:32:39.185867 env[1455]: time="2023-10-02T21:32:39.185847880Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c389bd6690a1d832e8604702a1a901188a1b23e0ce3fbb912abcc5662a213469 pid=2225 runtime=io.containerd.runc.v2
Oct  2 21:32:39.186824 env[1455]: time="2023-10-02T21:32:39.186796776Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1
Oct  2 21:32:39.186824 env[1455]: time="2023-10-02T21:32:39.186815822Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1
Oct  2 21:32:39.186824 env[1455]: time="2023-10-02T21:32:39.186822367Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1
Oct  2 21:32:39.186898 env[1455]: time="2023-10-02T21:32:39.186878762Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/03e92cdba28c5862573ef8c2cb90105d9066a1934077d74728d7a14b3a1625d1 pid=2239 runtime=io.containerd.runc.v2
Oct  2 21:32:39.192482 systemd[1]: Started cri-containerd-03e92cdba28c5862573ef8c2cb90105d9066a1934077d74728d7a14b3a1625d1.scope.
Oct  2 21:32:39.197000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.224575 kernel: kauditd_printk_skb: 217 callbacks suppressed
Oct  2 21:32:39.224603 kernel: audit: type=1400 audit(1696282359.197:579): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.245190 kubelet[2162]: W1002 21:32:39.245117    2162 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://139.178.70.49:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 139.178.70.49:6443: connect: connection refused
Oct  2 21:32:39.245190 kubelet[2162]: E1002 21:32:39.245175    2162 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://139.178.70.49:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 139.178.70.49:6443: connect: connection refused
Oct  2 21:32:39.197000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.288904 systemd[1]: Started cri-containerd-c389bd6690a1d832e8604702a1a901188a1b23e0ce3fbb912abcc5662a213469.scope.
Oct  2 21:32:39.289463 systemd[1]: Started cri-containerd-e97e8e94b5c88810f058a6c87247a7cb2a3c490f62531c333b5674cfc964e758.scope.
Oct  2 21:32:39.349638 kernel: audit: type=1400 audit(1696282359.197:580): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.349676 kernel: audit: type=1400 audit(1696282359.197:581): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.197000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.412505 kernel: audit: type=1400 audit(1696282359.197:582): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.197000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.197000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.476710 kubelet[2162]: W1002 21:32:39.476654    2162 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://139.178.70.49:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 139.178.70.49:6443: connect: connection refused
Oct  2 21:32:39.476710 kubelet[2162]: E1002 21:32:39.476687    2162 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://139.178.70.49:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 139.178.70.49:6443: connect: connection refused
Oct  2 21:32:39.539078 kernel: audit: type=1400 audit(1696282359.197:583): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.539102 kernel: audit: audit_backlog=65 > audit_backlog_limit=64
Oct  2 21:32:39.539114 kernel: audit: audit_backlog=65 > audit_backlog_limit=64
Oct  2 21:32:39.539131 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64
Oct  2 21:32:39.539143 kernel: audit: backlog limit exceeded
Oct  2 21:32:39.539156 kernel: audit: audit_backlog=65 > audit_backlog_limit=64
Oct  2 21:32:39.197000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.197000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.197000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.197000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.285000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.285000 audit: BPF prog-id=67 op=LOAD
Oct  2 21:32:39.285000 audit[2266]: AVC avc:  denied  { bpf } for  pid=2266 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.285000 audit[2266]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=2239 pid=2266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:32:39.285000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033653932636462613238633538363235373365663863326362393031
Oct  2 21:32:39.286000 audit[2266]: AVC avc:  denied  { perfmon } for  pid=2266 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.286000 audit[2266]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=c items=0 ppid=2239 pid=2266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:32:39.286000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033653932636462613238633538363235373365663863326362393031
Oct  2 21:32:39.286000 audit[2266]: AVC avc:  denied  { bpf } for  pid=2266 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.286000 audit[2266]: AVC avc:  denied  { bpf } for  pid=2266 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.286000 audit[2266]: AVC avc:  denied  { bpf } for  pid=2266 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.286000 audit[2266]: AVC avc:  denied  { perfmon } for  pid=2266 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.286000 audit[2266]: AVC avc:  denied  { perfmon } for  pid=2266 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.286000 audit[2266]: AVC avc:  denied  { perfmon } for  pid=2266 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.286000 audit[2266]: AVC avc:  denied  { perfmon } for  pid=2266 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.286000 audit[2266]: AVC avc:  denied  { perfmon } for  pid=2266 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.286000 audit[2266]: AVC avc:  denied  { bpf } for  pid=2266 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.292000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.292000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.292000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.292000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.292000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.292000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.292000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.292000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.292000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.286000 audit[2266]: AVC avc:  denied  { bpf } for  pid=2266 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.286000 audit: BPF prog-id=68 op=LOAD
Oct  2 21:32:39.286000 audit[2266]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001479d8 a2=78 a3=c000223020 items=0 ppid=2239 pid=2266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:32:39.286000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033653932636462613238633538363235373365663863326362393031
Oct  2 21:32:39.412000 audit[2266]: AVC avc:  denied  { bpf } for  pid=2266 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.412000 audit[2266]: AVC avc:  denied  { bpf } for  pid=2266 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.412000 audit[2266]: AVC avc:  denied  { perfmon } for  pid=2266 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.412000 audit[2266]: AVC avc:  denied  { perfmon } for  pid=2266 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.412000 audit[2266]: AVC avc:  denied  { perfmon } for  pid=2266 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.412000 audit[2266]: AVC avc:  denied  { perfmon } for  pid=2266 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.412000 audit[2266]: AVC avc:  denied  { perfmon } for  pid=2266 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.412000 audit[2266]: AVC avc:  denied  { bpf } for  pid=2266 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.474000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.474000 audit: BPF prog-id=69 op=LOAD
Oct  2 21:32:39.474000 audit[2238]: AVC avc:  denied  { bpf } for  pid=2238 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.474000 audit[2238]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000149c48 a2=10 a3=1c items=0 ppid=2211 pid=2238 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:32:39.474000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539376538653934623563383838313066303538613663383732343761
Oct  2 21:32:39.474000 audit[2238]: AVC avc:  denied  { perfmon } for  pid=2238 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.474000 audit[2238]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001496b0 a2=3c a3=c items=0 ppid=2211 pid=2238 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:32:39.474000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539376538653934623563383838313066303538613663383732343761
Oct  2 21:32:39.474000 audit[2238]: AVC avc:  denied  { bpf } for  pid=2238 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.474000 audit[2238]: AVC avc:  denied  { bpf } for  pid=2238 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.474000 audit[2238]: AVC avc:  denied  { bpf } for  pid=2238 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.474000 audit[2238]: AVC avc:  denied  { perfmon } for  pid=2238 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.474000 audit[2238]: AVC avc:  denied  { perfmon } for  pid=2238 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.474000 audit[2238]: AVC avc:  denied  { perfmon } for  pid=2238 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.474000 audit[2238]: AVC avc:  denied  { perfmon } for  pid=2238 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.474000 audit[2238]: AVC avc:  denied  { perfmon } for  pid=2238 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.474000 audit[2238]: AVC avc:  denied  { bpf } for  pid=2238 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.474000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.563599 kubelet[2162]: E1002 21:32:39.563559    2162 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://139.178.70.49:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.0-a-a1bcd9ea1c?timeout=10s\": dial tcp 139.178.70.49:6443: connect: connection refused" interval="1.6s"
Oct  2 21:32:39.474000 audit[2238]: AVC avc:  denied  { bpf } for  pid=2238 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.474000 audit: BPF prog-id=71 op=LOAD
Oct  2 21:32:39.474000 audit[2238]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001499d8 a2=78 a3=c000024610 items=0 ppid=2211 pid=2238 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:32:39.474000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539376538653934623563383838313066303538613663383732343761
Oct  2 21:32:39.565000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.565000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.565000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.565000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.565000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.565000 audit[2238]: AVC avc:  denied  { bpf } for  pid=2238 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.565000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.565000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.565000 audit[2238]: AVC avc:  denied  { bpf } for  pid=2238 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.565000 audit[2238]: AVC avc:  denied  { perfmon } for  pid=2238 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.565000 audit[2238]: AVC avc:  denied  { perfmon } for  pid=2238 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.565000 audit[2238]: AVC avc:  denied  { perfmon } for  pid=2238 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.565000 audit[2238]: AVC avc:  denied  { perfmon } for  pid=2238 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.565000 audit[2238]: AVC avc:  denied  { perfmon } for  pid=2238 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.565000 audit[2238]: AVC avc:  denied  { bpf } for  pid=2238 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.565000 audit[2238]: AVC avc:  denied  { bpf } for  pid=2238 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.642000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.565000 audit: BPF prog-id=73 op=LOAD
Oct  2 21:32:39.642000 audit: BPF prog-id=72 op=LOAD
Oct  2 21:32:39.565000 audit[2238]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000149770 a2=78 a3=c000024658 items=0 ppid=2211 pid=2238 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:32:39.565000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539376538653934623563383838313066303538613663383732343761
Oct  2 21:32:39.642000 audit: BPF prog-id=73 op=UNLOAD
Oct  2 21:32:39.642000 audit: BPF prog-id=71 op=UNLOAD
Oct  2 21:32:39.642000 audit[2238]: AVC avc:  denied  { bpf } for  pid=2238 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.642000 audit[2238]: AVC avc:  denied  { bpf } for  pid=2238 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.642000 audit[2238]: AVC avc:  denied  { bpf } for  pid=2238 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.642000 audit[2238]: AVC avc:  denied  { perfmon } for  pid=2238 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.642000 audit[2238]: AVC avc:  denied  { perfmon } for  pid=2238 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.642000 audit[2238]: AVC avc:  denied  { perfmon } for  pid=2238 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.642000 audit[2238]: AVC avc:  denied  { perfmon } for  pid=2238 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.642000 audit[2238]: AVC avc:  denied  { perfmon } for  pid=2238 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.642000 audit[2238]: AVC avc:  denied  { bpf } for  pid=2238 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.643000 audit[2248]: AVC avc:  denied  { bpf } for  pid=2248 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.643000 audit[2248]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2225 pid=2248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:32:39.643000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333383962643636393061316438333265383630343730326131613930
Oct  2 21:32:39.643000 audit[2248]: AVC avc:  denied  { perfmon } for  pid=2248 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.643000 audit[2248]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=2225 pid=2248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:32:39.643000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333383962643636393061316438333265383630343730326131613930
Oct  2 21:32:39.643000 audit[2248]: AVC avc:  denied  { bpf } for  pid=2248 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.643000 audit[2248]: AVC avc:  denied  { bpf } for  pid=2248 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.643000 audit[2248]: AVC avc:  denied  { bpf } for  pid=2248 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.643000 audit[2248]: AVC avc:  denied  { perfmon } for  pid=2248 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.643000 audit[2248]: AVC avc:  denied  { perfmon } for  pid=2248 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.643000 audit[2248]: AVC avc:  denied  { perfmon } for  pid=2248 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.643000 audit[2248]: AVC avc:  denied  { perfmon } for  pid=2248 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.643000 audit[2248]: AVC avc:  denied  { perfmon } for  pid=2248 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.643000 audit[2248]: AVC avc:  denied  { bpf } for  pid=2248 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.412000 audit[2266]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000147770 a2=78 a3=c000223068 items=0 ppid=2239 pid=2266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:32:39.412000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033653932636462613238633538363235373365663863326362393031
Oct  2 21:32:39.667000 audit: BPF prog-id=70 op=UNLOAD
Oct  2 21:32:39.667000 audit: BPF prog-id=68 op=UNLOAD
Oct  2 21:32:39.667000 audit[2266]: AVC avc:  denied  { bpf } for  pid=2266 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.667000 audit[2266]: AVC avc:  denied  { bpf } for  pid=2266 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.667000 audit[2266]: AVC avc:  denied  { bpf } for  pid=2266 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.667000 audit[2266]: AVC avc:  denied  { perfmon } for  pid=2266 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.667000 audit[2266]: AVC avc:  denied  { perfmon } for  pid=2266 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.667000 audit[2266]: AVC avc:  denied  { perfmon } for  pid=2266 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.667000 audit[2266]: AVC avc:  denied  { perfmon } for  pid=2266 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.667000 audit[2266]: AVC avc:  denied  { perfmon } for  pid=2266 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.667000 audit[2266]: AVC avc:  denied  { bpf } for  pid=2266 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.642000 audit[2238]: AVC avc:  denied  { bpf } for  pid=2238 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.642000 audit: BPF prog-id=74 op=LOAD
Oct  2 21:32:39.642000 audit[2238]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000149c30 a2=78 a3=c000024a68 items=0 ppid=2211 pid=2238 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:32:39.642000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539376538653934623563383838313066303538613663383732343761
Oct  2 21:32:39.643000 audit[2248]: AVC avc:  denied  { bpf } for  pid=2248 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.643000 audit: BPF prog-id=75 op=LOAD
Oct  2 21:32:39.643000 audit[2248]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000024e80 items=0 ppid=2225 pid=2248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:32:39.643000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333383962643636393061316438333265383630343730326131613930
Oct  2 21:32:39.667000 audit[2248]: AVC avc:  denied  { bpf } for  pid=2248 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.667000 audit[2248]: AVC avc:  denied  { bpf } for  pid=2248 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.667000 audit[2248]: AVC avc:  denied  { perfmon } for  pid=2248 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.667000 audit[2248]: AVC avc:  denied  { perfmon } for  pid=2248 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.667000 audit[2248]: AVC avc:  denied  { perfmon } for  pid=2248 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.667000 audit[2248]: AVC avc:  denied  { perfmon } for  pid=2248 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.667000 audit[2248]: AVC avc:  denied  { perfmon } for  pid=2248 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.667000 audit[2248]: AVC avc:  denied  { bpf } for  pid=2248 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.667000 audit[2266]: AVC avc:  denied  { bpf } for  pid=2266 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.667000 audit: BPF prog-id=76 op=LOAD
Oct  2 21:32:39.667000 audit[2248]: AVC avc:  denied  { bpf } for  pid=2248 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.667000 audit: BPF prog-id=77 op=LOAD
Oct  2 21:32:39.667000 audit[2266]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000147c30 a2=78 a3=c000223478 items=0 ppid=2239 pid=2266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:32:39.667000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033653932636462613238633538363235373365663863326362393031
Oct  2 21:32:39.667000 audit[2248]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000024ec8 items=0 ppid=2225 pid=2248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:32:39.667000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333383962643636393061316438333265383630343730326131613930
Oct  2 21:32:39.667000 audit: BPF prog-id=77 op=UNLOAD
Oct  2 21:32:39.667000 audit: BPF prog-id=75 op=UNLOAD
Oct  2 21:32:39.667000 audit[2248]: AVC avc:  denied  { bpf } for  pid=2248 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.667000 audit[2248]: AVC avc:  denied  { bpf } for  pid=2248 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.667000 audit[2248]: AVC avc:  denied  { bpf } for  pid=2248 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.667000 audit[2248]: AVC avc:  denied  { perfmon } for  pid=2248 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.667000 audit[2248]: AVC avc:  denied  { perfmon } for  pid=2248 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.667000 audit[2248]: AVC avc:  denied  { perfmon } for  pid=2248 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.667000 audit[2248]: AVC avc:  denied  { perfmon } for  pid=2248 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.667000 audit[2248]: AVC avc:  denied  { perfmon } for  pid=2248 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.667000 audit[2248]: AVC avc:  denied  { bpf } for  pid=2248 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.667000 audit[2248]: AVC avc:  denied  { bpf } for  pid=2248 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.667000 audit: BPF prog-id=78 op=LOAD
Oct  2 21:32:39.667000 audit[2248]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0000252d8 items=0 ppid=2225 pid=2248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:32:39.667000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333383962643636393061316438333265383630343730326131613930
Oct  2 21:32:39.678411 kubelet[2162]: I1002 21:32:39.678401    2162 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.0-a-a1bcd9ea1c"
Oct  2 21:32:39.678549 kubelet[2162]: E1002 21:32:39.678544    2162 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://139.178.70.49:6443/api/v1/nodes\": dial tcp 139.178.70.49:6443: connect: connection refused" node="ci-3510.3.0-a-a1bcd9ea1c"
Oct  2 21:32:39.685385 env[1455]: time="2023-10-02T21:32:39.685361650Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.0-a-a1bcd9ea1c,Uid:16016fa05e649da041f0af6b7c1e1bcc,Namespace:kube-system,Attempt:0,} returns sandbox id \"e97e8e94b5c88810f058a6c87247a7cb2a3c490f62531c333b5674cfc964e758\""
Oct  2 21:32:39.686980 env[1455]: time="2023-10-02T21:32:39.686935234Z" level=info msg="CreateContainer within sandbox \"e97e8e94b5c88810f058a6c87247a7cb2a3c490f62531c333b5674cfc964e758\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}"
Oct  2 21:32:39.691688 env[1455]: time="2023-10-02T21:32:39.691643430Z" level=info msg="CreateContainer within sandbox \"e97e8e94b5c88810f058a6c87247a7cb2a3c490f62531c333b5674cfc964e758\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"08bda5afc05bbb60b32a6cbaa3d66c666342b038a65f9cd17844bf01c2eccd22\""
Oct  2 21:32:39.691989 env[1455]: time="2023-10-02T21:32:39.691938879Z" level=info msg="StartContainer for \"08bda5afc05bbb60b32a6cbaa3d66c666342b038a65f9cd17844bf01c2eccd22\""
Oct  2 21:32:39.696762 env[1455]: time="2023-10-02T21:32:39.696740249Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.0-a-a1bcd9ea1c,Uid:5392bd9162ac58601a682c0fc55fa1cc,Namespace:kube-system,Attempt:0,} returns sandbox id \"03e92cdba28c5862573ef8c2cb90105d9066a1934077d74728d7a14b3a1625d1\""
Oct  2 21:32:39.698032 env[1455]: time="2023-10-02T21:32:39.698016697Z" level=info msg="CreateContainer within sandbox \"03e92cdba28c5862573ef8c2cb90105d9066a1934077d74728d7a14b3a1625d1\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}"
Oct  2 21:32:39.698366 env[1455]: time="2023-10-02T21:32:39.698351668Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.0-a-a1bcd9ea1c,Uid:b2da6a5b01a1da22b4df10906e0f6976,Namespace:kube-system,Attempt:0,} returns sandbox id \"c389bd6690a1d832e8604702a1a901188a1b23e0ce3fbb912abcc5662a213469\""
Oct  2 21:32:39.699201 env[1455]: time="2023-10-02T21:32:39.699189018Z" level=info msg="CreateContainer within sandbox \"c389bd6690a1d832e8604702a1a901188a1b23e0ce3fbb912abcc5662a213469\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}"
Oct  2 21:32:39.703594 env[1455]: time="2023-10-02T21:32:39.703551682Z" level=info msg="CreateContainer within sandbox \"03e92cdba28c5862573ef8c2cb90105d9066a1934077d74728d7a14b3a1625d1\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"802aa352334c1c765e132b8635eb17b26c30f63063b4bb3c4da12257fc94a9de\""
Oct  2 21:32:39.703763 env[1455]: time="2023-10-02T21:32:39.703720967Z" level=info msg="StartContainer for \"802aa352334c1c765e132b8635eb17b26c30f63063b4bb3c4da12257fc94a9de\""
Oct  2 21:32:39.704548 env[1455]: time="2023-10-02T21:32:39.704465806Z" level=info msg="CreateContainer within sandbox \"c389bd6690a1d832e8604702a1a901188a1b23e0ce3fbb912abcc5662a213469\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"63a12de625d2e5e6c982b0a209027b3d2b6530d46759dfa39bc25a7d3411fe41\""
Oct  2 21:32:39.704657 env[1455]: time="2023-10-02T21:32:39.704605354Z" level=info msg="StartContainer for \"63a12de625d2e5e6c982b0a209027b3d2b6530d46759dfa39bc25a7d3411fe41\""
Oct  2 21:32:39.712602 systemd[1]: Started cri-containerd-08bda5afc05bbb60b32a6cbaa3d66c666342b038a65f9cd17844bf01c2eccd22.scope.
Oct  2 21:32:39.713251 systemd[1]: Started cri-containerd-63a12de625d2e5e6c982b0a209027b3d2b6530d46759dfa39bc25a7d3411fe41.scope.
Oct  2 21:32:39.713987 systemd[1]: Started cri-containerd-802aa352334c1c765e132b8635eb17b26c30f63063b4bb3c4da12257fc94a9de.scope.
Oct  2 21:32:39.717000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.717000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.717000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.717000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.717000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.717000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.717000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.717000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.717000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.717000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.717000 audit: BPF prog-id=79 op=LOAD
Oct  2 21:32:39.717000 audit[2351]: AVC avc:  denied  { bpf } for  pid=2351 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.717000 audit[2351]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2225 pid=2351 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:32:39.717000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633613132646536323564326535653663393832623061323039303237
Oct  2 21:32:39.717000 audit[2351]: AVC avc:  denied  { perfmon } for  pid=2351 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.717000 audit[2351]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=2225 pid=2351 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:32:39.717000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633613132646536323564326535653663393832623061323039303237
Oct  2 21:32:39.717000 audit[2351]: AVC avc:  denied  { bpf } for  pid=2351 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.717000 audit[2351]: AVC avc:  denied  { bpf } for  pid=2351 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.717000 audit[2351]: AVC avc:  denied  { bpf } for  pid=2351 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.717000 audit[2351]: AVC avc:  denied  { perfmon } for  pid=2351 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.717000 audit[2351]: AVC avc:  denied  { perfmon } for  pid=2351 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.717000 audit[2351]: AVC avc:  denied  { perfmon } for  pid=2351 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.717000 audit[2351]: AVC avc:  denied  { perfmon } for  pid=2351 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.717000 audit[2351]: AVC avc:  denied  { perfmon } for  pid=2351 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.717000 audit[2351]: AVC avc:  denied  { bpf } for  pid=2351 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.717000 audit[2351]: AVC avc:  denied  { bpf } for  pid=2351 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.717000 audit: BPF prog-id=80 op=LOAD
Oct  2 21:32:39.717000 audit[2351]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0003be150 items=0 ppid=2225 pid=2351 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:32:39.717000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633613132646536323564326535653663393832623061323039303237
Oct  2 21:32:39.717000 audit[2351]: AVC avc:  denied  { bpf } for  pid=2351 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.717000 audit[2351]: AVC avc:  denied  { bpf } for  pid=2351 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.717000 audit[2351]: AVC avc:  denied  { perfmon } for  pid=2351 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.717000 audit[2351]: AVC avc:  denied  { perfmon } for  pid=2351 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.717000 audit[2351]: AVC avc:  denied  { perfmon } for  pid=2351 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.717000 audit[2351]: AVC avc:  denied  { perfmon } for  pid=2351 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.717000 audit[2351]: AVC avc:  denied  { perfmon } for  pid=2351 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.717000 audit[2351]: AVC avc:  denied  { bpf } for  pid=2351 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.717000 audit[2351]: AVC avc:  denied  { bpf } for  pid=2351 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.717000 audit: BPF prog-id=81 op=LOAD
Oct  2 21:32:39.717000 audit[2351]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0003be198 items=0 ppid=2225 pid=2351 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:32:39.717000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633613132646536323564326535653663393832623061323039303237
Oct  2 21:32:39.717000 audit: BPF prog-id=81 op=UNLOAD
Oct  2 21:32:39.717000 audit: BPF prog-id=80 op=UNLOAD
Oct  2 21:32:39.718000 audit[2351]: AVC avc:  denied  { bpf } for  pid=2351 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.718000 audit[2351]: AVC avc:  denied  { bpf } for  pid=2351 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.718000 audit[2351]: AVC avc:  denied  { bpf } for  pid=2351 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.718000 audit[2351]: AVC avc:  denied  { perfmon } for  pid=2351 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.718000 audit[2351]: AVC avc:  denied  { perfmon } for  pid=2351 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.718000 audit[2351]: AVC avc:  denied  { perfmon } for  pid=2351 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.718000 audit[2351]: AVC avc:  denied  { perfmon } for  pid=2351 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.718000 audit[2351]: AVC avc:  denied  { perfmon } for  pid=2351 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.718000 audit[2351]: AVC avc:  denied  { bpf } for  pid=2351 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.718000 audit[2351]: AVC avc:  denied  { bpf } for  pid=2351 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.718000 audit: BPF prog-id=82 op=LOAD
Oct  2 21:32:39.718000 audit[2351]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0003be5a8 items=0 ppid=2225 pid=2351 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:32:39.718000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633613132646536323564326535653663393832623061323039303237
Oct  2 21:32:39.718000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.718000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.718000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.718000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.718000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.718000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.718000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.718000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.718000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.718000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.718000 audit: BPF prog-id=83 op=LOAD
Oct  2 21:32:39.718000 audit[2330]: AVC avc:  denied  { bpf } for  pid=2330 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.718000 audit[2330]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2211 pid=2330 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:32:39.718000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038626461356166633035626262363062333261366362616133643636
Oct  2 21:32:39.718000 audit[2330]: AVC avc:  denied  { perfmon } for  pid=2330 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.718000 audit[2330]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2211 pid=2330 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:32:39.718000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038626461356166633035626262363062333261366362616133643636
Oct  2 21:32:39.718000 audit[2330]: AVC avc:  denied  { bpf } for  pid=2330 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.718000 audit[2330]: AVC avc:  denied  { bpf } for  pid=2330 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.718000 audit[2330]: AVC avc:  denied  { bpf } for  pid=2330 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.718000 audit[2330]: AVC avc:  denied  { perfmon } for  pid=2330 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.718000 audit[2330]: AVC avc:  denied  { perfmon } for  pid=2330 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.718000 audit[2330]: AVC avc:  denied  { perfmon } for  pid=2330 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.718000 audit[2330]: AVC avc:  denied  { perfmon } for  pid=2330 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.718000 audit[2330]: AVC avc:  denied  { perfmon } for  pid=2330 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.718000 audit[2330]: AVC avc:  denied  { bpf } for  pid=2330 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.718000 audit[2330]: AVC avc:  denied  { bpf } for  pid=2330 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.718000 audit: BPF prog-id=84 op=LOAD
Oct  2 21:32:39.718000 audit[2330]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003e4120 items=0 ppid=2211 pid=2330 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:32:39.718000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038626461356166633035626262363062333261366362616133643636
Oct  2 21:32:39.718000 audit[2330]: AVC avc:  denied  { bpf } for  pid=2330 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.718000 audit[2330]: AVC avc:  denied  { bpf } for  pid=2330 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.718000 audit[2330]: AVC avc:  denied  { perfmon } for  pid=2330 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.718000 audit[2330]: AVC avc:  denied  { perfmon } for  pid=2330 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.718000 audit[2330]: AVC avc:  denied  { perfmon } for  pid=2330 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.718000 audit[2330]: AVC avc:  denied  { perfmon } for  pid=2330 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.718000 audit[2330]: AVC avc:  denied  { perfmon } for  pid=2330 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.718000 audit[2330]: AVC avc:  denied  { bpf } for  pid=2330 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.718000 audit[2330]: AVC avc:  denied  { bpf } for  pid=2330 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.718000 audit: BPF prog-id=85 op=LOAD
Oct  2 21:32:39.718000 audit[2330]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003e4168 items=0 ppid=2211 pid=2330 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:32:39.718000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038626461356166633035626262363062333261366362616133643636
Oct  2 21:32:39.718000 audit: BPF prog-id=85 op=UNLOAD
Oct  2 21:32:39.718000 audit: BPF prog-id=84 op=UNLOAD
Oct  2 21:32:39.718000 audit[2330]: AVC avc:  denied  { bpf } for  pid=2330 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.718000 audit[2330]: AVC avc:  denied  { bpf } for  pid=2330 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.718000 audit[2330]: AVC avc:  denied  { bpf } for  pid=2330 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.718000 audit[2330]: AVC avc:  denied  { perfmon } for  pid=2330 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.718000 audit[2330]: AVC avc:  denied  { perfmon } for  pid=2330 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.718000 audit[2330]: AVC avc:  denied  { perfmon } for  pid=2330 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.718000 audit[2330]: AVC avc:  denied  { perfmon } for  pid=2330 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.718000 audit[2330]: AVC avc:  denied  { perfmon } for  pid=2330 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.718000 audit[2330]: AVC avc:  denied  { bpf } for  pid=2330 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.718000 audit[2330]: AVC avc:  denied  { bpf } for  pid=2330 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.718000 audit: BPF prog-id=86 op=LOAD
Oct  2 21:32:39.718000 audit[2330]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003e4578 items=0 ppid=2211 pid=2330 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:32:39.718000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038626461356166633035626262363062333261366362616133643636
Oct  2 21:32:39.719000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.719000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.719000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.719000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.719000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.719000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.719000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.719000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.719000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.719000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.719000 audit: BPF prog-id=87 op=LOAD
Oct  2 21:32:39.719000 audit[2350]: AVC avc:  denied  { bpf } for  pid=2350 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.719000 audit[2350]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2239 pid=2350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:32:39.719000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830326161333532333334633163373635653133326238363335656231
Oct  2 21:32:39.719000 audit[2350]: AVC avc:  denied  { perfmon } for  pid=2350 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.719000 audit[2350]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=2239 pid=2350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:32:39.719000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830326161333532333334633163373635653133326238363335656231
Oct  2 21:32:39.719000 audit[2350]: AVC avc:  denied  { bpf } for  pid=2350 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.719000 audit[2350]: AVC avc:  denied  { bpf } for  pid=2350 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.719000 audit[2350]: AVC avc:  denied  { bpf } for  pid=2350 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.719000 audit[2350]: AVC avc:  denied  { perfmon } for  pid=2350 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.719000 audit[2350]: AVC avc:  denied  { perfmon } for  pid=2350 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.719000 audit[2350]: AVC avc:  denied  { perfmon } for  pid=2350 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.719000 audit[2350]: AVC avc:  denied  { perfmon } for  pid=2350 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.719000 audit[2350]: AVC avc:  denied  { perfmon } for  pid=2350 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.719000 audit[2350]: AVC avc:  denied  { bpf } for  pid=2350 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.719000 audit[2350]: AVC avc:  denied  { bpf } for  pid=2350 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.719000 audit: BPF prog-id=88 op=LOAD
Oct  2 21:32:39.719000 audit[2350]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0003d0370 items=0 ppid=2239 pid=2350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:32:39.719000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830326161333532333334633163373635653133326238363335656231
Oct  2 21:32:39.719000 audit[2350]: AVC avc:  denied  { bpf } for  pid=2350 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.719000 audit[2350]: AVC avc:  denied  { bpf } for  pid=2350 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.719000 audit[2350]: AVC avc:  denied  { perfmon } for  pid=2350 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.719000 audit[2350]: AVC avc:  denied  { perfmon } for  pid=2350 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.719000 audit[2350]: AVC avc:  denied  { perfmon } for  pid=2350 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.719000 audit[2350]: AVC avc:  denied  { perfmon } for  pid=2350 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.719000 audit[2350]: AVC avc:  denied  { perfmon } for  pid=2350 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.719000 audit[2350]: AVC avc:  denied  { bpf } for  pid=2350 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.719000 audit[2350]: AVC avc:  denied  { bpf } for  pid=2350 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.719000 audit: BPF prog-id=89 op=LOAD
Oct  2 21:32:39.719000 audit[2350]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0003d03b8 items=0 ppid=2239 pid=2350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:32:39.719000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830326161333532333334633163373635653133326238363335656231
Oct  2 21:32:39.719000 audit: BPF prog-id=89 op=UNLOAD
Oct  2 21:32:39.720000 audit: BPF prog-id=88 op=UNLOAD
Oct  2 21:32:39.720000 audit[2350]: AVC avc:  denied  { bpf } for  pid=2350 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.720000 audit[2350]: AVC avc:  denied  { bpf } for  pid=2350 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.720000 audit[2350]: AVC avc:  denied  { bpf } for  pid=2350 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.720000 audit[2350]: AVC avc:  denied  { perfmon } for  pid=2350 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.720000 audit[2350]: AVC avc:  denied  { perfmon } for  pid=2350 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.720000 audit[2350]: AVC avc:  denied  { perfmon } for  pid=2350 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.720000 audit[2350]: AVC avc:  denied  { perfmon } for  pid=2350 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.720000 audit[2350]: AVC avc:  denied  { perfmon } for  pid=2350 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.720000 audit[2350]: AVC avc:  denied  { bpf } for  pid=2350 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.720000 audit[2350]: AVC avc:  denied  { bpf } for  pid=2350 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:39.720000 audit: BPF prog-id=90 op=LOAD
Oct  2 21:32:39.720000 audit[2350]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0003d07c8 items=0 ppid=2239 pid=2350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:32:39.720000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830326161333532333334633163373635653133326238363335656231
Oct  2 21:32:39.738291 env[1455]: time="2023-10-02T21:32:39.738266529Z" level=info msg="StartContainer for \"802aa352334c1c765e132b8635eb17b26c30f63063b4bb3c4da12257fc94a9de\" returns successfully"
Oct  2 21:32:39.750018 env[1455]: time="2023-10-02T21:32:39.749995475Z" level=info msg="StartContainer for \"63a12de625d2e5e6c982b0a209027b3d2b6530d46759dfa39bc25a7d3411fe41\" returns successfully"
Oct  2 21:32:39.750155 env[1455]: time="2023-10-02T21:32:39.750140252Z" level=info msg="StartContainer for \"08bda5afc05bbb60b32a6cbaa3d66c666342b038a65f9cd17844bf01c2eccd22\" returns successfully"
Oct  2 21:32:40.135000 audit[2376]: AVC avc:  denied  { watch } for  pid=2376 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c698,c859 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 21:32:40.135000 audit[2376]: AVC avc:  denied  { watch } for  pid=2376 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c698,c859 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 21:32:40.135000 audit[2376]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0002c6bd0 a2=fc6 a3=0 items=0 ppid=2239 pid=2376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c698,c859 key=(null)
Oct  2 21:32:40.135000 audit[2376]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c00015e760 a2=fc6 a3=0 items=0 ppid=2239 pid=2376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c698,c859 key=(null)
Oct  2 21:32:40.135000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 21:32:40.135000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 21:32:40.372000 audit[2377]: AVC avc:  denied  { watch } for  pid=2377 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c411,c438 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 21:32:40.372000 audit[2377]: AVC avc:  denied  { watch } for  pid=2377 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c411,c438 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 21:32:40.372000 audit[2377]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=3f a1=c0065120c0 a2=fc6 a3=0 items=0 ppid=2211 pid=2377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c411,c438 key=(null)
Oct  2 21:32:40.372000 audit[2377]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=3e a1=c000d089f0 a2=fc6 a3=0 items=0 ppid=2211 pid=2377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c411,c438 key=(null)
Oct  2 21:32:40.372000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E3439002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75
Oct  2 21:32:40.372000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E3439002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75
Oct  2 21:32:40.373000 audit[2377]: AVC avc:  denied  { watch } for  pid=2377 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=520974 scontext=system_u:system_r:svirt_lxc_net_t:s0:c411,c438 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 21:32:40.373000 audit[2377]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=3e a1=c000d08c00 a2=fc6 a3=0 items=0 ppid=2211 pid=2377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c411,c438 key=(null)
Oct  2 21:32:40.373000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E3439002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75
Oct  2 21:32:40.383000 audit[2377]: AVC avc:  denied  { watch } for  pid=2377 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=520980 scontext=system_u:system_r:svirt_lxc_net_t:s0:c411,c438 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 21:32:40.383000 audit[2377]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=44 a1=c003082150 a2=fc6 a3=0 items=0 ppid=2211 pid=2377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c411,c438 key=(null)
Oct  2 21:32:40.383000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E3439002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75
Oct  2 21:32:40.383000 audit[2377]: AVC avc:  denied  { watch } for  pid=2377 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c411,c438 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 21:32:40.383000 audit[2377]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=79 a1=c0025fb7c0 a2=fc6 a3=0 items=0 ppid=2211 pid=2377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c411,c438 key=(null)
Oct  2 21:32:40.383000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E3439002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75
Oct  2 21:32:40.383000 audit[2377]: AVC avc:  denied  { watch } for  pid=2377 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c411,c438 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 21:32:40.383000 audit[2377]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7b a1=c003082600 a2=fc6 a3=0 items=0 ppid=2211 pid=2377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c411,c438 key=(null)
Oct  2 21:32:40.383000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E3439002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75
Oct  2 21:32:40.731134 kubelet[2162]: E1002 21:32:40.731048    2162 csi_plugin.go:295] Failed to initialize CSINode: error updating CSINode annotation: timed out waiting for the condition; caused by: nodes "ci-3510.3.0-a-a1bcd9ea1c" not found
Oct  2 21:32:41.103722 kubelet[2162]: E1002 21:32:41.103626    2162 csi_plugin.go:295] Failed to initialize CSINode: error updating CSINode annotation: timed out waiting for the condition; caused by: nodes "ci-3510.3.0-a-a1bcd9ea1c" not found
Oct  2 21:32:41.161512 kubelet[2162]: I1002 21:32:41.161414    2162 apiserver.go:52] "Watching apiserver"
Oct  2 21:32:41.171773 kubelet[2162]: E1002 21:32:41.171699    2162 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"ci-3510.3.0-a-a1bcd9ea1c\" not found" node="ci-3510.3.0-a-a1bcd9ea1c"
Oct  2 21:32:41.262246 kubelet[2162]: I1002 21:32:41.262143    2162 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world"
Oct  2 21:32:41.282792 kubelet[2162]: I1002 21:32:41.282708    2162 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.0-a-a1bcd9ea1c"
Oct  2 21:32:41.289845 kubelet[2162]: I1002 21:32:41.289760    2162 kubelet_node_status.go:73] "Successfully registered node" node="ci-3510.3.0-a-a1bcd9ea1c"
Oct  2 21:32:43.528484 systemd[1]: Reloading.
Oct  2 21:32:43.585287 /usr/lib/systemd/system-generators/torcx-generator[2492]: time="2023-10-02T21:32:43Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.0 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.0 /var/lib/torcx/store]"
Oct  2 21:32:43.585304 /usr/lib/systemd/system-generators/torcx-generator[2492]: time="2023-10-02T21:32:43Z" level=info msg="torcx already run"
Oct  2 21:32:43.635575 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon.
Oct  2 21:32:43.635582 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon.
Oct  2 21:32:43.646478 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly.
Oct  2 21:32:43.698000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.698000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.698000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.698000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.698000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.698000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.698000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.698000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.698000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.698000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.698000 audit: BPF prog-id=91 op=LOAD
Oct  2 21:32:43.698000 audit: BPF prog-id=52 op=UNLOAD
Oct  2 21:32:43.699000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.699000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.699000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.699000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.699000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.699000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.699000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.699000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.699000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.699000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.699000 audit: BPF prog-id=92 op=LOAD
Oct  2 21:32:43.699000 audit: BPF prog-id=72 op=UNLOAD
Oct  2 21:32:43.699000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.699000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.699000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.699000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.699000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.699000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.699000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.699000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.699000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.699000 audit: BPF prog-id=93 op=LOAD
Oct  2 21:32:43.699000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.699000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.699000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.699000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.699000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.699000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.699000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.699000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.699000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.699000 audit: BPF prog-id=94 op=LOAD
Oct  2 21:32:43.699000 audit: BPF prog-id=53 op=UNLOAD
Oct  2 21:32:43.699000 audit: BPF prog-id=54 op=UNLOAD
Oct  2 21:32:43.699000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.699000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.699000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.699000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.699000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.699000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.699000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.699000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.699000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.699000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.699000 audit: BPF prog-id=95 op=LOAD
Oct  2 21:32:43.699000 audit: BPF prog-id=67 op=UNLOAD
Oct  2 21:32:43.700000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.700000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.700000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.700000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.700000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.700000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.700000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.700000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.700000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.700000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.700000 audit: BPF prog-id=96 op=LOAD
Oct  2 21:32:43.700000 audit: BPF prog-id=55 op=UNLOAD
Oct  2 21:32:43.700000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.700000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.700000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.700000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.700000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.700000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.700000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.700000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.700000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.700000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.700000 audit: BPF prog-id=97 op=LOAD
Oct  2 21:32:43.700000 audit: BPF prog-id=56 op=UNLOAD
Oct  2 21:32:43.700000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.700000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.700000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.700000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.700000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.700000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.700000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.700000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.700000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.700000 audit: BPF prog-id=98 op=LOAD
Oct  2 21:32:43.700000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.700000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.700000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.700000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.700000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.700000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.700000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.700000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.701000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.701000 audit: BPF prog-id=99 op=LOAD
Oct  2 21:32:43.701000 audit: BPF prog-id=57 op=UNLOAD
Oct  2 21:32:43.701000 audit: BPF prog-id=58 op=UNLOAD
Oct  2 21:32:43.701000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.701000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.701000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.701000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.701000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.701000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.701000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.701000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.701000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.701000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.701000 audit: BPF prog-id=100 op=LOAD
Oct  2 21:32:43.701000 audit: BPF prog-id=83 op=UNLOAD
Oct  2 21:32:43.702000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.702000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.702000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.702000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.702000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.702000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.702000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.702000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.702000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.702000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.702000 audit: BPF prog-id=101 op=LOAD
Oct  2 21:32:43.702000 audit: BPF prog-id=59 op=UNLOAD
Oct  2 21:32:43.703000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.703000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.703000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.703000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.703000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.703000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.703000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.703000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.703000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.703000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.703000 audit: BPF prog-id=102 op=LOAD
Oct  2 21:32:43.703000 audit: BPF prog-id=69 op=UNLOAD
Oct  2 21:32:43.703000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.703000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.703000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.703000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.703000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.703000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.703000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.703000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.703000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.703000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.703000 audit: BPF prog-id=103 op=LOAD
Oct  2 21:32:43.703000 audit: BPF prog-id=60 op=UNLOAD
Oct  2 21:32:43.703000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.703000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.703000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.703000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.703000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.703000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.703000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.703000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.704000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.704000 audit: BPF prog-id=104 op=LOAD
Oct  2 21:32:43.704000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.704000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.704000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.704000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.704000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.704000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.704000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.704000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.704000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.704000 audit: BPF prog-id=105 op=LOAD
Oct  2 21:32:43.704000 audit: BPF prog-id=61 op=UNLOAD
Oct  2 21:32:43.704000 audit: BPF prog-id=62 op=UNLOAD
Oct  2 21:32:43.704000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.704000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.704000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.704000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.704000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.704000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.704000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.704000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.704000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.704000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.704000 audit: BPF prog-id=106 op=LOAD
Oct  2 21:32:43.704000 audit: BPF prog-id=63 op=UNLOAD
Oct  2 21:32:43.704000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.704000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.704000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.704000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.704000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.704000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.704000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.704000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.704000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.704000 audit: BPF prog-id=107 op=LOAD
Oct  2 21:32:43.704000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.704000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.704000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.704000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.704000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.704000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.704000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.704000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.704000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.704000 audit: BPF prog-id=108 op=LOAD
Oct  2 21:32:43.704000 audit: BPF prog-id=64 op=UNLOAD
Oct  2 21:32:43.704000 audit: BPF prog-id=65 op=UNLOAD
Oct  2 21:32:43.705000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.705000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.705000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.705000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.705000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.705000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.705000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.705000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.705000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.705000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.705000 audit: BPF prog-id=109 op=LOAD
Oct  2 21:32:43.705000 audit: BPF prog-id=79 op=UNLOAD
Oct  2 21:32:43.705000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.705000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.705000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.705000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.705000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.705000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.705000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.705000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.705000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.705000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.705000 audit: BPF prog-id=110 op=LOAD
Oct  2 21:32:43.705000 audit: BPF prog-id=87 op=UNLOAD
Oct  2 21:32:43.706000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.706000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.706000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.706000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.706000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.706000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.706000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.706000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.706000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.706000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.706000 audit: BPF prog-id=111 op=LOAD
Oct  2 21:32:43.706000 audit: BPF prog-id=66 op=UNLOAD
Oct  2 21:32:43.712702 systemd[1]: Stopping kubelet.service...
Oct  2 21:32:43.712803 kubelet[2162]: I1002 21:32:43.712724    2162 dynamic_cafile_content.go:171] "Shutting down controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt"
Oct  2 21:32:43.734675 systemd[1]: kubelet.service: Deactivated successfully.
Oct  2 21:32:43.734777 systemd[1]: Stopped kubelet.service.
Oct  2 21:32:43.734000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:32:43.735663 systemd[1]: Started kubelet.service.
Oct  2 21:32:43.735000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:32:43.758372 kubelet[2553]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information.
Oct  2 21:32:43.758372 kubelet[2553]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI.
Oct  2 21:32:43.758372 kubelet[2553]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information.
Oct  2 21:32:43.758372 kubelet[2553]: I1002 21:32:43.758355    2553 server.go:203] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime"
Oct  2 21:32:43.761095 kubelet[2553]: I1002 21:32:43.761083    2553 server.go:467] "Kubelet version" kubeletVersion="v1.28.1"
Oct  2 21:32:43.761095 kubelet[2553]: I1002 21:32:43.761095    2553 server.go:469] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK=""
Oct  2 21:32:43.761526 kubelet[2553]: I1002 21:32:43.761488    2553 server.go:895] "Client rotation is on, will bootstrap in background"
Oct  2 21:32:43.762453 kubelet[2553]: I1002 21:32:43.762415    2553 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem".
Oct  2 21:32:43.763011 kubelet[2553]: I1002 21:32:43.762973    2553 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt"
Oct  2 21:32:43.780448 kubelet[2553]: I1002 21:32:43.780384    2553 server.go:725] "--cgroups-per-qos enabled, but --cgroup-root was not specified.  defaulting to /"
Oct  2 21:32:43.780535 kubelet[2553]: I1002 21:32:43.780526    2553 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[]
Oct  2 21:32:43.780652 kubelet[2553]: I1002 21:32:43.780643    2553 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null}
Oct  2 21:32:43.780738 kubelet[2553]: I1002 21:32:43.780659    2553 topology_manager.go:138] "Creating topology manager with none policy"
Oct  2 21:32:43.780738 kubelet[2553]: I1002 21:32:43.780669    2553 container_manager_linux.go:301] "Creating device plugin manager"
Oct  2 21:32:43.780738 kubelet[2553]: I1002 21:32:43.780700    2553 state_mem.go:36] "Initialized new in-memory state store"
Oct  2 21:32:43.780824 kubelet[2553]: I1002 21:32:43.780758    2553 kubelet.go:393] "Attempting to sync node with API server"
Oct  2 21:32:43.780824 kubelet[2553]: I1002 21:32:43.780773    2553 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests"
Oct  2 21:32:43.780824 kubelet[2553]: I1002 21:32:43.780792    2553 kubelet.go:309] "Adding apiserver pod source"
Oct  2 21:32:43.780824 kubelet[2553]: I1002 21:32:43.780807    2553 apiserver.go:42] "Waiting for node sync before watching apiserver pods"
Oct  2 21:32:43.781230 kubelet[2553]: I1002 21:32:43.781220    2553 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1"
Oct  2 21:32:43.781546 kubelet[2553]: I1002 21:32:43.781537    2553 server.go:1232] "Started kubelet"
Oct  2 21:32:43.781592 kubelet[2553]: I1002 21:32:43.781572    2553 server.go:162] "Starting to listen" address="0.0.0.0" port=10250
Oct  2 21:32:43.781592 kubelet[2553]: I1002 21:32:43.781574    2553 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10
Oct  2 21:32:43.781717 kubelet[2553]: I1002 21:32:43.781708    2553 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock"
Oct  2 21:32:43.781827 kubelet[2553]: E1002 21:32:43.781809    2553 cri_stats_provider.go:448] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs"
Oct  2 21:32:43.781871 kubelet[2553]: E1002 21:32:43.781834    2553 kubelet.go:1431] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem"
Oct  2 21:32:43.782000 audit[2553]: AVC avc:  denied  { mac_admin } for  pid=2553 comm="kubelet" capability=33  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.782000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0"
Oct  2 21:32:43.782000 audit[2553]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000f4c660 a1=c000b4a828 a2=c000f4c630 a3=25 items=0 ppid=1 pid=2553 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:32:43.782000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669
Oct  2 21:32:43.782000 audit[2553]: AVC avc:  denied  { mac_admin } for  pid=2553 comm="kubelet" capability=33  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.782000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0"
Oct  2 21:32:43.782000 audit[2553]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0006c6de0 a1=c000b4a840 a2=c000f4c6f0 a3=25 items=0 ppid=1 pid=2553 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:32:43.782000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669
Oct  2 21:32:43.783062 kubelet[2553]: I1002 21:32:43.782839    2553 kubelet.go:1386] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument"
Oct  2 21:32:43.783062 kubelet[2553]: I1002 21:32:43.782866    2553 kubelet.go:1390] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument"
Oct  2 21:32:43.783062 kubelet[2553]: I1002 21:32:43.782890    2553 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer"
Oct  2 21:32:43.783159 kubelet[2553]: I1002 21:32:43.783065    2553 volume_manager.go:291] "Starting Kubelet Volume Manager"
Oct  2 21:32:43.783159 kubelet[2553]: I1002 21:32:43.783068    2553 server.go:462] "Adding debug handlers to kubelet server"
Oct  2 21:32:43.783159 kubelet[2553]: I1002 21:32:43.783091    2553 desired_state_of_world_populator.go:151] "Desired state populator starts to run"
Oct  2 21:32:43.783246 kubelet[2553]: I1002 21:32:43.783202    2553 reconciler_new.go:29] "Reconciler: start to sync state"
Oct  2 21:32:43.789196 kubelet[2553]: I1002 21:32:43.789171    2553 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4"
Oct  2 21:32:43.789901 kubelet[2553]: I1002 21:32:43.789888    2553 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6"
Oct  2 21:32:43.789956 kubelet[2553]: I1002 21:32:43.789932    2553 status_manager.go:217] "Starting to sync pod status with apiserver"
Oct  2 21:32:43.789956 kubelet[2553]: I1002 21:32:43.789946    2553 kubelet.go:2303] "Starting kubelet main sync loop"
Oct  2 21:32:43.790032 kubelet[2553]: E1002 21:32:43.789989    2553 kubelet.go:2327] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]"
Oct  2 21:32:43.802180 kubelet[2553]: I1002 21:32:43.802166    2553 cpu_manager.go:214] "Starting CPU manager" policy="none"
Oct  2 21:32:43.802180 kubelet[2553]: I1002 21:32:43.802177    2553 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s"
Oct  2 21:32:43.802180 kubelet[2553]: I1002 21:32:43.802186    2553 state_mem.go:36] "Initialized new in-memory state store"
Oct  2 21:32:43.802305 kubelet[2553]: I1002 21:32:43.802271    2553 state_mem.go:88] "Updated default CPUSet" cpuSet=""
Oct  2 21:32:43.802305 kubelet[2553]: I1002 21:32:43.802283    2553 state_mem.go:96] "Updated CPUSet assignments" assignments={}
Oct  2 21:32:43.802305 kubelet[2553]: I1002 21:32:43.802286    2553 policy_none.go:49] "None policy: Start"
Oct  2 21:32:43.802546 kubelet[2553]: I1002 21:32:43.802541    2553 memory_manager.go:169] "Starting memorymanager" policy="None"
Oct  2 21:32:43.802575 kubelet[2553]: I1002 21:32:43.802550    2553 state_mem.go:35] "Initializing new in-memory state store"
Oct  2 21:32:43.802614 kubelet[2553]: I1002 21:32:43.802609    2553 state_mem.go:75] "Updated machine memory state"
Oct  2 21:32:43.804250 kubelet[2553]: I1002 21:32:43.804243    2553 manager.go:471] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found"
Oct  2 21:32:43.802000 audit[2553]: AVC avc:  denied  { mac_admin } for  pid=2553 comm="kubelet" capability=33  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:43.802000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0"
Oct  2 21:32:43.802000 audit[2553]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000c76060 a1=c000ba01f8 a2=c000c76030 a3=25 items=0 ppid=1 pid=2553 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:32:43.802000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669
Oct  2 21:32:43.804401 kubelet[2553]: I1002 21:32:43.804271    2553 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument"
Oct  2 21:32:43.804401 kubelet[2553]: I1002 21:32:43.804365    2553 plugin_manager.go:118] "Starting Kubelet Plugin Manager"
Oct  2 21:32:43.885400 kubelet[2553]: I1002 21:32:43.885383    2553 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.0-a-a1bcd9ea1c"
Oct  2 21:32:43.890290 kubelet[2553]: I1002 21:32:43.890272    2553 topology_manager.go:215] "Topology Admit Handler" podUID="5392bd9162ac58601a682c0fc55fa1cc" podNamespace="kube-system" podName="kube-controller-manager-ci-3510.3.0-a-a1bcd9ea1c"
Oct  2 21:32:43.890381 kubelet[2553]: I1002 21:32:43.890344    2553 topology_manager.go:215] "Topology Admit Handler" podUID="b2da6a5b01a1da22b4df10906e0f6976" podNamespace="kube-system" podName="kube-scheduler-ci-3510.3.0-a-a1bcd9ea1c"
Oct  2 21:32:43.890381 kubelet[2553]: I1002 21:32:43.890369    2553 topology_manager.go:215] "Topology Admit Handler" podUID="16016fa05e649da041f0af6b7c1e1bcc" podNamespace="kube-system" podName="kube-apiserver-ci-3510.3.0-a-a1bcd9ea1c"
Oct  2 21:32:43.891024 kubelet[2553]: I1002 21:32:43.891011    2553 kubelet_node_status.go:108] "Node was previously registered" node="ci-3510.3.0-a-a1bcd9ea1c"
Oct  2 21:32:43.891083 kubelet[2553]: I1002 21:32:43.891060    2553 kubelet_node_status.go:73] "Successfully registered node" node="ci-3510.3.0-a-a1bcd9ea1c"
Oct  2 21:32:43.894805 kubelet[2553]: W1002 21:32:43.894790    2553 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots]
Oct  2 21:32:43.895742 kubelet[2553]: W1002 21:32:43.895730    2553 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots]
Oct  2 21:32:43.895820 kubelet[2553]: W1002 21:32:43.895777    2553 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots]
Oct  2 21:32:44.084610 kubelet[2553]: I1002 21:32:44.084518    2553 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/16016fa05e649da041f0af6b7c1e1bcc-k8s-certs\") pod \"kube-apiserver-ci-3510.3.0-a-a1bcd9ea1c\" (UID: \"16016fa05e649da041f0af6b7c1e1bcc\") " pod="kube-system/kube-apiserver-ci-3510.3.0-a-a1bcd9ea1c"
Oct  2 21:32:44.084610 kubelet[2553]: I1002 21:32:44.084549    2553 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/16016fa05e649da041f0af6b7c1e1bcc-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.0-a-a1bcd9ea1c\" (UID: \"16016fa05e649da041f0af6b7c1e1bcc\") " pod="kube-system/kube-apiserver-ci-3510.3.0-a-a1bcd9ea1c"
Oct  2 21:32:44.084610 kubelet[2553]: I1002 21:32:44.084567    2553 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/5392bd9162ac58601a682c0fc55fa1cc-ca-certs\") pod \"kube-controller-manager-ci-3510.3.0-a-a1bcd9ea1c\" (UID: \"5392bd9162ac58601a682c0fc55fa1cc\") " pod="kube-system/kube-controller-manager-ci-3510.3.0-a-a1bcd9ea1c"
Oct  2 21:32:44.084610 kubelet[2553]: I1002 21:32:44.084578    2553 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/5392bd9162ac58601a682c0fc55fa1cc-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.0-a-a1bcd9ea1c\" (UID: \"5392bd9162ac58601a682c0fc55fa1cc\") " pod="kube-system/kube-controller-manager-ci-3510.3.0-a-a1bcd9ea1c"
Oct  2 21:32:44.084610 kubelet[2553]: I1002 21:32:44.084593    2553 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/5392bd9162ac58601a682c0fc55fa1cc-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.0-a-a1bcd9ea1c\" (UID: \"5392bd9162ac58601a682c0fc55fa1cc\") " pod="kube-system/kube-controller-manager-ci-3510.3.0-a-a1bcd9ea1c"
Oct  2 21:32:44.084815 kubelet[2553]: I1002 21:32:44.084605    2553 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/b2da6a5b01a1da22b4df10906e0f6976-kubeconfig\") pod \"kube-scheduler-ci-3510.3.0-a-a1bcd9ea1c\" (UID: \"b2da6a5b01a1da22b4df10906e0f6976\") " pod="kube-system/kube-scheduler-ci-3510.3.0-a-a1bcd9ea1c"
Oct  2 21:32:44.084815 kubelet[2553]: I1002 21:32:44.084657    2553 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/16016fa05e649da041f0af6b7c1e1bcc-ca-certs\") pod \"kube-apiserver-ci-3510.3.0-a-a1bcd9ea1c\" (UID: \"16016fa05e649da041f0af6b7c1e1bcc\") " pod="kube-system/kube-apiserver-ci-3510.3.0-a-a1bcd9ea1c"
Oct  2 21:32:44.084815 kubelet[2553]: I1002 21:32:44.084682    2553 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/5392bd9162ac58601a682c0fc55fa1cc-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.0-a-a1bcd9ea1c\" (UID: \"5392bd9162ac58601a682c0fc55fa1cc\") " pod="kube-system/kube-controller-manager-ci-3510.3.0-a-a1bcd9ea1c"
Oct  2 21:32:44.084815 kubelet[2553]: I1002 21:32:44.084701    2553 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/5392bd9162ac58601a682c0fc55fa1cc-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.0-a-a1bcd9ea1c\" (UID: \"5392bd9162ac58601a682c0fc55fa1cc\") " pod="kube-system/kube-controller-manager-ci-3510.3.0-a-a1bcd9ea1c"
Oct  2 21:32:44.781391 kubelet[2553]: I1002 21:32:44.781339    2553 apiserver.go:52] "Watching apiserver"
Oct  2 21:32:44.784100 kubelet[2553]: I1002 21:32:44.784085    2553 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world"
Oct  2 21:32:44.796608 kubelet[2553]: W1002 21:32:44.796562    2553 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots]
Oct  2 21:32:44.796608 kubelet[2553]: E1002 21:32:44.796611    2553 kubelet.go:1890] "Failed creating a mirror pod for" err="pods \"kube-apiserver-ci-3510.3.0-a-a1bcd9ea1c\" already exists" pod="kube-system/kube-apiserver-ci-3510.3.0-a-a1bcd9ea1c"
Oct  2 21:32:44.805582 kubelet[2553]: I1002 21:32:44.805562    2553 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-scheduler-ci-3510.3.0-a-a1bcd9ea1c" podStartSLOduration=1.8055314679999999 podCreationTimestamp="2023-10-02 21:32:43 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 21:32:44.80538616 +0000 UTC m=+1.068003012" watchObservedRunningTime="2023-10-02 21:32:44.805531468 +0000 UTC m=+1.068148317"
Oct  2 21:32:44.810359 kubelet[2553]: I1002 21:32:44.810344    2553 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-controller-manager-ci-3510.3.0-a-a1bcd9ea1c" podStartSLOduration=1.810326188 podCreationTimestamp="2023-10-02 21:32:43 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 21:32:44.810212412 +0000 UTC m=+1.072829263" watchObservedRunningTime="2023-10-02 21:32:44.810326188 +0000 UTC m=+1.072943036"
Oct  2 21:32:44.818929 kubelet[2553]: I1002 21:32:44.818916    2553 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-apiserver-ci-3510.3.0-a-a1bcd9ea1c" podStartSLOduration=1.81889001 podCreationTimestamp="2023-10-02 21:32:43 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 21:32:44.814380134 +0000 UTC m=+1.076996986" watchObservedRunningTime="2023-10-02 21:32:44.81889001 +0000 UTC m=+1.081506868"
Oct  2 21:32:47.594776 sudo[1611]: pam_unix(sudo:session): session closed for user root
Oct  2 21:32:47.594000 audit[1611]: USER_END pid=1611 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Oct  2 21:32:47.595523 sshd[1608]: pam_unix(sshd:session): session closed for user core
Oct  2 21:32:47.597025 systemd[1]: sshd@6-139.178.70.49:22-139.178.89.65:41610.service: Deactivated successfully.
Oct  2 21:32:47.597457 systemd[1]: session-9.scope: Deactivated successfully.
Oct  2 21:32:47.597546 systemd[1]: session-9.scope: Consumed 3.041s CPU time.
Oct  2 21:32:47.597769 systemd-logind[1445]: Session 9 logged out. Waiting for processes to exit.
Oct  2 21:32:47.598122 systemd-logind[1445]: Removed session 9.
Oct  2 21:32:47.619860 kernel: kauditd_printk_skb: 620 callbacks suppressed
Oct  2 21:32:47.619899 kernel: audit: type=1106 audit(1696282367.594:943): pid=1611 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Oct  2 21:32:47.594000 audit[1611]: CRED_DISP pid=1611 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Oct  2 21:32:47.785473 kernel: audit: type=1104 audit(1696282367.594:944): pid=1611 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Oct  2 21:32:47.785504 kernel: audit: type=1106 audit(1696282367.595:945): pid=1608 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success'
Oct  2 21:32:47.595000 audit[1608]: USER_END pid=1608 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success'
Oct  2 21:32:47.875813 kernel: audit: type=1104 audit(1696282367.595:946): pid=1608 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success'
Oct  2 21:32:47.595000 audit[1608]: CRED_DISP pid=1608 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success'
Oct  2 21:32:47.961465 kernel: audit: type=1131 audit(1696282367.596:947): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-139.178.70.49:22-139.178.89.65:41610 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:32:47.596000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-139.178.70.49:22-139.178.89.65:41610 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:32:54.949000 audit[2376]: AVC avc:  denied  { watch } for  pid=2376 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c698,c859 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 21:32:54.949000 audit[2376]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0002a5e00 a2=fc6 a3=0 items=0 ppid=2239 pid=2376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c698,c859 key=(null)
Oct  2 21:32:55.153348 kernel: audit: type=1400 audit(1696282374.949:948): avc:  denied  { watch } for  pid=2376 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c698,c859 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 21:32:55.153393 kernel: audit: type=1300 audit(1696282374.949:948): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0002a5e00 a2=fc6 a3=0 items=0 ppid=2239 pid=2376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c698,c859 key=(null)
Oct  2 21:32:55.153413 kernel: audit: type=1327 audit(1696282374.949:948): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 21:32:54.949000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 21:32:54.952000 audit[2376]: AVC avc:  denied  { watch } for  pid=2376 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c698,c859 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 21:32:54.952000 audit[2376]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0002a7ea0 a2=fc6 a3=0 items=0 ppid=2239 pid=2376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c698,c859 key=(null)
Oct  2 21:32:55.445779 kernel: audit: type=1400 audit(1696282374.952:949): avc:  denied  { watch } for  pid=2376 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c698,c859 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 21:32:55.445819 kernel: audit: type=1300 audit(1696282374.952:949): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0002a7ea0 a2=fc6 a3=0 items=0 ppid=2239 pid=2376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c698,c859 key=(null)
Oct  2 21:32:55.445839 kernel: audit: type=1327 audit(1696282374.952:949): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 21:32:54.952000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 21:32:55.535257 kernel: audit: type=1400 audit(1696282374.954:950): avc:  denied  { watch } for  pid=2376 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c698,c859 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 21:32:54.954000 audit[2376]: AVC avc:  denied  { watch } for  pid=2376 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c698,c859 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 21:32:55.621682 kernel: audit: type=1300 audit(1696282374.954:950): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000ae0040 a2=fc6 a3=0 items=0 ppid=2239 pid=2376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c698,c859 key=(null)
Oct  2 21:32:54.954000 audit[2376]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000ae0040 a2=fc6 a3=0 items=0 ppid=2239 pid=2376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c698,c859 key=(null)
Oct  2 21:32:55.737161 kernel: audit: type=1327 audit(1696282374.954:950): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 21:32:54.954000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 21:32:55.828845 kernel: audit: type=1400 audit(1696282374.955:951): avc:  denied  { watch } for  pid=2376 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c698,c859 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 21:32:54.955000 audit[2376]: AVC avc:  denied  { watch } for  pid=2376 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c698,c859 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 21:32:54.955000 audit[2376]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000289a40 a2=fc6 a3=0 items=0 ppid=2239 pid=2376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c698,c859 key=(null)
Oct  2 21:32:54.955000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 21:32:56.995000 audit[2376]: AVC avc:  denied  { watch } for  pid=2376 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sda9" ino=521005 scontext=system_u:system_r:svirt_lxc_net_t:s0:c698,c859 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0
Oct  2 21:32:56.995000 audit[2376]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000ce0bc0 a2=fc6 a3=0 items=0 ppid=2239 pid=2376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c698,c859 key=(null)
Oct  2 21:32:56.995000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 21:32:57.065958 kubelet[2553]: I1002 21:32:57.065913    2553 kuberuntime_manager.go:1463] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24"
Oct  2 21:32:57.066180 kubelet[2553]: I1002 21:32:57.066162    2553 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24"
Oct  2 21:32:57.066205 env[1455]: time="2023-10-02T21:32:57.066086147Z" level=info msg="No cni config template is specified, wait for other system components to drop the config."
Oct  2 21:32:58.026724 kubelet[2553]: I1002 21:32:58.026660    2553 topology_manager.go:215] "Topology Admit Handler" podUID="82561ec4-a6a3-4238-916f-34d883295e43" podNamespace="kube-system" podName="kube-proxy-dlfwl"
Oct  2 21:32:58.041195 systemd[1]: Created slice kubepods-besteffort-pod82561ec4_a6a3_4238_916f_34d883295e43.slice.
Oct  2 21:32:58.069721 kubelet[2553]: I1002 21:32:58.069661    2553 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/82561ec4-a6a3-4238-916f-34d883295e43-lib-modules\") pod \"kube-proxy-dlfwl\" (UID: \"82561ec4-a6a3-4238-916f-34d883295e43\") " pod="kube-system/kube-proxy-dlfwl"
Oct  2 21:32:58.069721 kubelet[2553]: I1002 21:32:58.069713    2553 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/82561ec4-a6a3-4238-916f-34d883295e43-kube-proxy\") pod \"kube-proxy-dlfwl\" (UID: \"82561ec4-a6a3-4238-916f-34d883295e43\") " pod="kube-system/kube-proxy-dlfwl"
Oct  2 21:32:58.070175 kubelet[2553]: I1002 21:32:58.069747    2553 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/82561ec4-a6a3-4238-916f-34d883295e43-xtables-lock\") pod \"kube-proxy-dlfwl\" (UID: \"82561ec4-a6a3-4238-916f-34d883295e43\") " pod="kube-system/kube-proxy-dlfwl"
Oct  2 21:32:58.070175 kubelet[2553]: I1002 21:32:58.069812    2553 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-jkckc\" (UniqueName: \"kubernetes.io/projected/82561ec4-a6a3-4238-916f-34d883295e43-kube-api-access-jkckc\") pod \"kube-proxy-dlfwl\" (UID: \"82561ec4-a6a3-4238-916f-34d883295e43\") " pod="kube-system/kube-proxy-dlfwl"
Oct  2 21:32:58.155106 kubelet[2553]: I1002 21:32:58.155040    2553 topology_manager.go:215] "Topology Admit Handler" podUID="34bbbed8-1dae-42ab-ab01-95e966c69faf" podNamespace="tigera-operator" podName="tigera-operator-8547bd6cc6-fzpwl"
Oct  2 21:32:58.169286 systemd[1]: Created slice kubepods-besteffort-pod34bbbed8_1dae_42ab_ab01_95e966c69faf.slice.
Oct  2 21:32:58.170521 kubelet[2553]: I1002 21:32:58.170434    2553 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/34bbbed8-1dae-42ab-ab01-95e966c69faf-var-lib-calico\") pod \"tigera-operator-8547bd6cc6-fzpwl\" (UID: \"34bbbed8-1dae-42ab-ab01-95e966c69faf\") " pod="tigera-operator/tigera-operator-8547bd6cc6-fzpwl"
Oct  2 21:32:58.170895 kubelet[2553]: I1002 21:32:58.170845    2553 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-nm67m\" (UniqueName: \"kubernetes.io/projected/34bbbed8-1dae-42ab-ab01-95e966c69faf-kube-api-access-nm67m\") pod \"tigera-operator-8547bd6cc6-fzpwl\" (UID: \"34bbbed8-1dae-42ab-ab01-95e966c69faf\") " pod="tigera-operator/tigera-operator-8547bd6cc6-fzpwl"
Oct  2 21:32:58.371582 env[1455]: time="2023-10-02T21:32:58.371326153Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-dlfwl,Uid:82561ec4-a6a3-4238-916f-34d883295e43,Namespace:kube-system,Attempt:0,}"
Oct  2 21:32:58.396474 env[1455]: time="2023-10-02T21:32:58.396317673Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1
Oct  2 21:32:58.396474 env[1455]: time="2023-10-02T21:32:58.396417669Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1
Oct  2 21:32:58.396885 env[1455]: time="2023-10-02T21:32:58.396487370Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1
Oct  2 21:32:58.397110 env[1455]: time="2023-10-02T21:32:58.396901619Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/23f3503c870189355d0c7246d979c15f3d5025c5c38545dd6eab175ff3586164 pid=2718 runtime=io.containerd.runc.v2
Oct  2 21:32:58.440541 systemd[1]: Started cri-containerd-23f3503c870189355d0c7246d979c15f3d5025c5c38545dd6eab175ff3586164.scope.
Oct  2 21:32:58.459000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:58.459000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:58.459000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:58.459000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:58.459000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:58.459000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:58.459000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:58.459000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:58.459000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:58.460000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:58.460000 audit: BPF prog-id=112 op=LOAD
Oct  2 21:32:58.462000 audit[2728]: AVC avc:  denied  { bpf } for  pid=2728 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:58.462000 audit[2728]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2718 pid=2728 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:32:58.462000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233663335303363383730313839333535643063373234366439373963
Oct  2 21:32:58.462000 audit[2728]: AVC avc:  denied  { perfmon } for  pid=2728 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:58.462000 audit[2728]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2718 pid=2728 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:32:58.462000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233663335303363383730313839333535643063373234366439373963
Oct  2 21:32:58.462000 audit[2728]: AVC avc:  denied  { bpf } for  pid=2728 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:58.462000 audit[2728]: AVC avc:  denied  { bpf } for  pid=2728 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:58.462000 audit[2728]: AVC avc:  denied  { bpf } for  pid=2728 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:58.462000 audit[2728]: AVC avc:  denied  { perfmon } for  pid=2728 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:58.462000 audit[2728]: AVC avc:  denied  { perfmon } for  pid=2728 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:58.462000 audit[2728]: AVC avc:  denied  { perfmon } for  pid=2728 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:58.462000 audit[2728]: AVC avc:  denied  { perfmon } for  pid=2728 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:58.462000 audit[2728]: AVC avc:  denied  { perfmon } for  pid=2728 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:58.462000 audit[2728]: AVC avc:  denied  { bpf } for  pid=2728 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:58.462000 audit[2728]: AVC avc:  denied  { bpf } for  pid=2728 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:58.462000 audit: BPF prog-id=113 op=LOAD
Oct  2 21:32:58.462000 audit[2728]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003b8ac0 items=0 ppid=2718 pid=2728 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:32:58.462000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233663335303363383730313839333535643063373234366439373963
Oct  2 21:32:58.462000 audit[2728]: AVC avc:  denied  { bpf } for  pid=2728 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:58.462000 audit[2728]: AVC avc:  denied  { bpf } for  pid=2728 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:58.462000 audit[2728]: AVC avc:  denied  { perfmon } for  pid=2728 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:58.462000 audit[2728]: AVC avc:  denied  { perfmon } for  pid=2728 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:58.462000 audit[2728]: AVC avc:  denied  { perfmon } for  pid=2728 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:58.462000 audit[2728]: AVC avc:  denied  { perfmon } for  pid=2728 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:58.462000 audit[2728]: AVC avc:  denied  { perfmon } for  pid=2728 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:58.462000 audit[2728]: AVC avc:  denied  { bpf } for  pid=2728 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:58.462000 audit[2728]: AVC avc:  denied  { bpf } for  pid=2728 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:58.462000 audit: BPF prog-id=114 op=LOAD
Oct  2 21:32:58.462000 audit[2728]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003b8b08 items=0 ppid=2718 pid=2728 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:32:58.462000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233663335303363383730313839333535643063373234366439373963
Oct  2 21:32:58.462000 audit: BPF prog-id=114 op=UNLOAD
Oct  2 21:32:58.462000 audit: BPF prog-id=113 op=UNLOAD
Oct  2 21:32:58.462000 audit[2728]: AVC avc:  denied  { bpf } for  pid=2728 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:58.462000 audit[2728]: AVC avc:  denied  { bpf } for  pid=2728 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:58.462000 audit[2728]: AVC avc:  denied  { bpf } for  pid=2728 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:58.462000 audit[2728]: AVC avc:  denied  { perfmon } for  pid=2728 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:58.462000 audit[2728]: AVC avc:  denied  { perfmon } for  pid=2728 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:58.462000 audit[2728]: AVC avc:  denied  { perfmon } for  pid=2728 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:58.462000 audit[2728]: AVC avc:  denied  { perfmon } for  pid=2728 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:58.462000 audit[2728]: AVC avc:  denied  { perfmon } for  pid=2728 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:58.462000 audit[2728]: AVC avc:  denied  { bpf } for  pid=2728 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:58.462000 audit[2728]: AVC avc:  denied  { bpf } for  pid=2728 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:58.462000 audit: BPF prog-id=115 op=LOAD
Oct  2 21:32:58.462000 audit[2728]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003b8f18 items=0 ppid=2718 pid=2728 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:32:58.462000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233663335303363383730313839333535643063373234366439373963
Oct  2 21:32:58.476352 env[1455]: time="2023-10-02T21:32:58.476262459Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-8547bd6cc6-fzpwl,Uid:34bbbed8-1dae-42ab-ab01-95e966c69faf,Namespace:tigera-operator,Attempt:0,}"
Oct  2 21:32:58.498748 env[1455]: time="2023-10-02T21:32:58.498656587Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-dlfwl,Uid:82561ec4-a6a3-4238-916f-34d883295e43,Namespace:kube-system,Attempt:0,} returns sandbox id \"23f3503c870189355d0c7246d979c15f3d5025c5c38545dd6eab175ff3586164\""
Oct  2 21:32:58.504540 env[1455]: time="2023-10-02T21:32:58.504400364Z" level=info msg="CreateContainer within sandbox \"23f3503c870189355d0c7246d979c15f3d5025c5c38545dd6eab175ff3586164\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}"
Oct  2 21:32:58.506077 env[1455]: time="2023-10-02T21:32:58.505887652Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1
Oct  2 21:32:58.506077 env[1455]: time="2023-10-02T21:32:58.505987647Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1
Oct  2 21:32:58.506077 env[1455]: time="2023-10-02T21:32:58.506026479Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1
Oct  2 21:32:58.506610 env[1455]: time="2023-10-02T21:32:58.506332591Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/bec2b377cdb78b93bb75e5064b512479d4527b7afe8e1aa8ffd2049b50bb54f5 pid=2758 runtime=io.containerd.runc.v2
Oct  2 21:32:58.523471 env[1455]: time="2023-10-02T21:32:58.523305278Z" level=info msg="CreateContainer within sandbox \"23f3503c870189355d0c7246d979c15f3d5025c5c38545dd6eab175ff3586164\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"4a8f4ebad6ea1d343b963f5ece3326c1e053c29f6e9eaa1b7675bd71eeac9152\""
Oct  2 21:32:58.524625 env[1455]: time="2023-10-02T21:32:58.524536221Z" level=info msg="StartContainer for \"4a8f4ebad6ea1d343b963f5ece3326c1e053c29f6e9eaa1b7675bd71eeac9152\""
Oct  2 21:32:58.547252 systemd[1]: Started cri-containerd-bec2b377cdb78b93bb75e5064b512479d4527b7afe8e1aa8ffd2049b50bb54f5.scope.
Oct  2 21:32:58.562000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:58.562000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:58.562000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:58.562000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:58.562000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:58.562000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:58.562000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:58.562000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:58.562000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:58.562000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:58.562000 audit: BPF prog-id=116 op=LOAD
Oct  2 21:32:58.563000 audit[2767]: AVC avc:  denied  { bpf } for  pid=2767 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:58.563000 audit[2767]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2758 pid=2767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:32:58.563000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265633262333737636462373862393362623735653530363462353132
Oct  2 21:32:58.563000 audit[2767]: AVC avc:  denied  { perfmon } for  pid=2767 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:58.563000 audit[2767]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2758 pid=2767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:32:58.563000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265633262333737636462373862393362623735653530363462353132
Oct  2 21:32:58.563000 audit[2767]: AVC avc:  denied  { bpf } for  pid=2767 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:58.563000 audit[2767]: AVC avc:  denied  { bpf } for  pid=2767 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:58.563000 audit[2767]: AVC avc:  denied  { bpf } for  pid=2767 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:58.563000 audit[2767]: AVC avc:  denied  { perfmon } for  pid=2767 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:58.563000 audit[2767]: AVC avc:  denied  { perfmon } for  pid=2767 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:58.563000 audit[2767]: AVC avc:  denied  { perfmon } for  pid=2767 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:58.563000 audit[2767]: AVC avc:  denied  { perfmon } for  pid=2767 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:58.563000 audit[2767]: AVC avc:  denied  { perfmon } for  pid=2767 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:58.563000 audit[2767]: AVC avc:  denied  { bpf } for  pid=2767 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:58.563000 audit[2767]: AVC avc:  denied  { bpf } for  pid=2767 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:58.563000 audit: BPF prog-id=117 op=LOAD
Oct  2 21:32:58.563000 audit[2767]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000334450 items=0 ppid=2758 pid=2767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:32:58.563000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265633262333737636462373862393362623735653530363462353132
Oct  2 21:32:58.563000 audit[2767]: AVC avc:  denied  { bpf } for  pid=2767 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:58.563000 audit[2767]: AVC avc:  denied  { bpf } for  pid=2767 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:58.563000 audit[2767]: AVC avc:  denied  { perfmon } for  pid=2767 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:58.563000 audit[2767]: AVC avc:  denied  { perfmon } for  pid=2767 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:58.563000 audit[2767]: AVC avc:  denied  { perfmon } for  pid=2767 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:58.563000 audit[2767]: AVC avc:  denied  { perfmon } for  pid=2767 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:58.563000 audit[2767]: AVC avc:  denied  { perfmon } for  pid=2767 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:58.563000 audit[2767]: AVC avc:  denied  { bpf } for  pid=2767 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:58.563000 audit[2767]: AVC avc:  denied  { bpf } for  pid=2767 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:58.563000 audit: BPF prog-id=118 op=LOAD
Oct  2 21:32:58.563000 audit[2767]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000334498 items=0 ppid=2758 pid=2767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:32:58.563000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265633262333737636462373862393362623735653530363462353132
Oct  2 21:32:58.563000 audit: BPF prog-id=118 op=UNLOAD
Oct  2 21:32:58.563000 audit: BPF prog-id=117 op=UNLOAD
Oct  2 21:32:58.563000 audit[2767]: AVC avc:  denied  { bpf } for  pid=2767 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:58.563000 audit[2767]: AVC avc:  denied  { bpf } for  pid=2767 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:58.563000 audit[2767]: AVC avc:  denied  { bpf } for  pid=2767 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:58.563000 audit[2767]: AVC avc:  denied  { perfmon } for  pid=2767 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:58.563000 audit[2767]: AVC avc:  denied  { perfmon } for  pid=2767 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:58.563000 audit[2767]: AVC avc:  denied  { perfmon } for  pid=2767 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:58.563000 audit[2767]: AVC avc:  denied  { perfmon } for  pid=2767 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:58.563000 audit[2767]: AVC avc:  denied  { perfmon } for  pid=2767 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:58.563000 audit[2767]: AVC avc:  denied  { bpf } for  pid=2767 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:58.563000 audit[2767]: AVC avc:  denied  { bpf } for  pid=2767 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:58.563000 audit: BPF prog-id=119 op=LOAD
Oct  2 21:32:58.563000 audit[2767]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003348a8 items=0 ppid=2758 pid=2767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:32:58.563000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265633262333737636462373862393362623735653530363462353132
Oct  2 21:32:58.567912 systemd[1]: Started cri-containerd-4a8f4ebad6ea1d343b963f5ece3326c1e053c29f6e9eaa1b7675bd71eeac9152.scope.
Oct  2 21:32:58.578000 audit[2784]: AVC avc:  denied  { perfmon } for  pid=2784 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:58.578000 audit[2784]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2718 pid=2784 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:32:58.578000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461386634656261643665613164333433623936336635656365333332
Oct  2 21:32:58.578000 audit[2784]: AVC avc:  denied  { bpf } for  pid=2784 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:58.578000 audit[2784]: AVC avc:  denied  { bpf } for  pid=2784 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:58.578000 audit[2784]: AVC avc:  denied  { bpf } for  pid=2784 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:58.578000 audit[2784]: AVC avc:  denied  { perfmon } for  pid=2784 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:58.578000 audit[2784]: AVC avc:  denied  { perfmon } for  pid=2784 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:58.578000 audit[2784]: AVC avc:  denied  { perfmon } for  pid=2784 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:58.578000 audit[2784]: AVC avc:  denied  { perfmon } for  pid=2784 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:58.578000 audit[2784]: AVC avc:  denied  { perfmon } for  pid=2784 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:58.578000 audit[2784]: AVC avc:  denied  { bpf } for  pid=2784 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:58.578000 audit[2784]: AVC avc:  denied  { bpf } for  pid=2784 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:58.578000 audit: BPF prog-id=120 op=LOAD
Oct  2 21:32:58.578000 audit[2784]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c00032dc10 items=0 ppid=2718 pid=2784 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:32:58.578000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461386634656261643665613164333433623936336635656365333332
Oct  2 21:32:58.578000 audit[2784]: AVC avc:  denied  { bpf } for  pid=2784 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:58.578000 audit[2784]: AVC avc:  denied  { bpf } for  pid=2784 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:58.578000 audit[2784]: AVC avc:  denied  { perfmon } for  pid=2784 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:58.578000 audit[2784]: AVC avc:  denied  { perfmon } for  pid=2784 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:58.578000 audit[2784]: AVC avc:  denied  { perfmon } for  pid=2784 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:58.578000 audit[2784]: AVC avc:  denied  { perfmon } for  pid=2784 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:58.578000 audit[2784]: AVC avc:  denied  { perfmon } for  pid=2784 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:58.578000 audit[2784]: AVC avc:  denied  { bpf } for  pid=2784 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:58.578000 audit[2784]: AVC avc:  denied  { bpf } for  pid=2784 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:58.578000 audit: BPF prog-id=121 op=LOAD
Oct  2 21:32:58.578000 audit[2784]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c00032dc58 items=0 ppid=2718 pid=2784 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:32:58.578000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461386634656261643665613164333433623936336635656365333332
Oct  2 21:32:58.578000 audit: BPF prog-id=121 op=UNLOAD
Oct  2 21:32:58.578000 audit: BPF prog-id=120 op=UNLOAD
Oct  2 21:32:58.578000 audit[2784]: AVC avc:  denied  { bpf } for  pid=2784 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:58.578000 audit[2784]: AVC avc:  denied  { bpf } for  pid=2784 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:58.578000 audit[2784]: AVC avc:  denied  { bpf } for  pid=2784 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:58.578000 audit[2784]: AVC avc:  denied  { perfmon } for  pid=2784 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:58.578000 audit[2784]: AVC avc:  denied  { perfmon } for  pid=2784 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:58.578000 audit[2784]: AVC avc:  denied  { perfmon } for  pid=2784 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:58.578000 audit[2784]: AVC avc:  denied  { perfmon } for  pid=2784 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:58.578000 audit[2784]: AVC avc:  denied  { perfmon } for  pid=2784 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:58.578000 audit[2784]: AVC avc:  denied  { bpf } for  pid=2784 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:58.578000 audit[2784]: AVC avc:  denied  { bpf } for  pid=2784 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:32:58.578000 audit: BPF prog-id=122 op=LOAD
Oct  2 21:32:58.578000 audit[2784]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c00032dce8 items=0 ppid=2718 pid=2784 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:32:58.578000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461386634656261643665613164333433623936336635656365333332
Oct  2 21:32:58.588859 env[1455]: time="2023-10-02T21:32:58.588830968Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-8547bd6cc6-fzpwl,Uid:34bbbed8-1dae-42ab-ab01-95e966c69faf,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"bec2b377cdb78b93bb75e5064b512479d4527b7afe8e1aa8ffd2049b50bb54f5\""
Oct  2 21:32:58.589641 env[1455]: time="2023-10-02T21:32:58.589607425Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.29.0\""
Oct  2 21:32:58.598859 env[1455]: time="2023-10-02T21:32:58.598807507Z" level=info msg="StartContainer for \"4a8f4ebad6ea1d343b963f5ece3326c1e053c29f6e9eaa1b7675bd71eeac9152\" returns successfully"
Oct  2 21:32:58.629000 audit[2863]: NETFILTER_CFG table=mangle:38 family=10 entries=1 op=nft_register_chain pid=2863 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Oct  2 21:32:58.629000 audit[2863]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffb117f590 a2=0 a3=7fffb117f57c items=0 ppid=2801 pid=2863 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:32:58.629000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65
Oct  2 21:32:58.629000 audit[2864]: NETFILTER_CFG table=mangle:39 family=2 entries=1 op=nft_register_chain pid=2864 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 21:32:58.629000 audit[2864]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd225effd0 a2=0 a3=7ffd225effbc items=0 ppid=2801 pid=2864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:32:58.629000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65
Oct  2 21:32:58.629000 audit[2865]: NETFILTER_CFG table=nat:40 family=10 entries=1 op=nft_register_chain pid=2865 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Oct  2 21:32:58.629000 audit[2865]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc4107ee40 a2=0 a3=7ffc4107ee2c items=0 ppid=2801 pid=2865 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:32:58.629000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174
Oct  2 21:32:58.630000 audit[2866]: NETFILTER_CFG table=nat:41 family=2 entries=1 op=nft_register_chain pid=2866 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 21:32:58.630000 audit[2866]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff3bad5610 a2=0 a3=7fff3bad55fc items=0 ppid=2801 pid=2866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:32:58.630000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174
Oct  2 21:32:58.630000 audit[2867]: NETFILTER_CFG table=filter:42 family=10 entries=1 op=nft_register_chain pid=2867 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Oct  2 21:32:58.630000 audit[2867]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe8bd4d750 a2=0 a3=7ffe8bd4d73c items=0 ppid=2801 pid=2867 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:32:58.630000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572
Oct  2 21:32:58.630000 audit[2868]: NETFILTER_CFG table=filter:43 family=2 entries=1 op=nft_register_chain pid=2868 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 21:32:58.630000 audit[2868]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe6b4949f0 a2=0 a3=7ffe6b4949dc items=0 ppid=2801 pid=2868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:32:58.630000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572
Oct  2 21:32:58.733000 audit[2869]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2869 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 21:32:58.733000 audit[2869]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffec713f4c0 a2=0 a3=7ffec713f4ac items=0 ppid=2801 pid=2869 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:32:58.733000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572
Oct  2 21:32:58.740000 audit[2871]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2871 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 21:32:58.740000 audit[2871]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffcba5f15c0 a2=0 a3=7ffcba5f15ac items=0 ppid=2801 pid=2871 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:32:58.740000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365
Oct  2 21:32:58.751000 audit[2874]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2874 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 21:32:58.751000 audit[2874]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffea7285020 a2=0 a3=7ffea728500c items=0 ppid=2801 pid=2874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:32:58.751000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669
Oct  2 21:32:58.754000 audit[2875]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2875 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 21:32:58.754000 audit[2875]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffec78e7730 a2=0 a3=7ffec78e771c items=0 ppid=2801 pid=2875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:32:58.754000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572
Oct  2 21:32:58.761000 audit[2877]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2877 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 21:32:58.761000 audit[2877]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd8e5847e0 a2=0 a3=7ffd8e5847cc items=0 ppid=2801 pid=2877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:32:58.761000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453
Oct  2 21:32:58.764000 audit[2878]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2878 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 21:32:58.764000 audit[2878]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdbbc9f9f0 a2=0 a3=7ffdbbc9f9dc items=0 ppid=2801 pid=2878 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:32:58.764000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572
Oct  2 21:32:58.772000 audit[2880]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2880 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 21:32:58.772000 audit[2880]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffe0a6de330 a2=0 a3=7ffe0a6de31c items=0 ppid=2801 pid=2880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:32:58.772000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D
Oct  2 21:32:58.782000 audit[2883]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2883 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 21:32:58.782000 audit[2883]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffdef110c00 a2=0 a3=7ffdef110bec items=0 ppid=2801 pid=2883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:32:58.782000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53
Oct  2 21:32:58.784000 audit[2884]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2884 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 21:32:58.784000 audit[2884]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcbbf735c0 a2=0 a3=7ffcbbf735ac items=0 ppid=2801 pid=2884 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:32:58.784000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572
Oct  2 21:32:58.791000 audit[2886]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2886 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 21:32:58.791000 audit[2886]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff3d015c60 a2=0 a3=7fff3d015c4c items=0 ppid=2801 pid=2886 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:32:58.791000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244
Oct  2 21:32:58.794000 audit[2887]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2887 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 21:32:58.794000 audit[2887]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdfb476c10 a2=0 a3=7ffdfb476bfc items=0 ppid=2801 pid=2887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:32:58.794000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572
Oct  2 21:32:58.802000 audit[2889]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2889 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 21:32:58.802000 audit[2889]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe79d0ad70 a2=0 a3=7ffe79d0ad5c items=0 ppid=2801 pid=2889 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:32:58.802000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A
Oct  2 21:32:58.812000 audit[2892]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2892 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 21:32:58.812000 audit[2892]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd39e29ef0 a2=0 a3=7ffd39e29edc items=0 ppid=2801 pid=2892 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:32:58.812000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A
Oct  2 21:32:58.822000 audit[2895]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2895 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 21:32:58.822000 audit[2895]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe2d3d6d70 a2=0 a3=7ffe2d3d6d5c items=0 ppid=2801 pid=2895 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:32:58.822000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D
Oct  2 21:32:58.826000 audit[2896]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2896 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 21:32:58.826000 audit[2896]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff1d3758a0 a2=0 a3=7fff1d37588c items=0 ppid=2801 pid=2896 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:32:58.826000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174
Oct  2 21:32:58.832000 audit[2898]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2898 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 21:32:58.832000 audit[2898]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7ffe6b6e5470 a2=0 a3=7ffe6b6e545c items=0 ppid=2801 pid=2898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:32:58.832000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553
Oct  2 21:32:58.842000 audit[2901]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2901 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 21:32:58.842000 audit[2901]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffcde41aec0 a2=0 a3=7ffcde41aeac items=0 ppid=2801 pid=2901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:32:58.842000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553
Oct  2 21:32:58.845000 audit[2902]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2902 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 21:32:58.845000 audit[2902]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff24d96c80 a2=0 a3=7fff24d96c6c items=0 ppid=2801 pid=2902 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:32:58.845000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174
Oct  2 21:32:58.852367 kubelet[2553]: I1002 21:32:58.852313    2553 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-dlfwl" podStartSLOduration=0.852219646 podCreationTimestamp="2023-10-02 21:32:58 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 21:32:58.852059584 +0000 UTC m=+15.114676562" watchObservedRunningTime="2023-10-02 21:32:58.852219646 +0000 UTC m=+15.114836551"
Oct  2 21:32:58.853000 audit[2904]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2904 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Oct  2 21:32:58.853000 audit[2904]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7fffd7175fa0 a2=0 a3=7fffd7175f8c items=0 ppid=2801 pid=2904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:32:58.853000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47
Oct  2 21:32:58.896000 audit[2910]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2910 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Oct  2 21:32:58.896000 audit[2910]: SYSCALL arch=c000003e syscall=46 success=yes exit=4956 a0=3 a1=7fff90e193f0 a2=0 a3=7fff90e193dc items=0 ppid=2801 pid=2910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:32:58.896000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Oct  2 21:32:58.914000 audit[2910]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2910 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Oct  2 21:32:58.914000 audit[2910]: SYSCALL arch=c000003e syscall=46 success=yes exit=5340 a0=3 a1=7fff90e193f0 a2=0 a3=7fff90e193dc items=0 ppid=2801 pid=2910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:32:58.914000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Oct  2 21:32:58.918000 audit[2916]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2916 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Oct  2 21:32:58.918000 audit[2916]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffd7367e0b0 a2=0 a3=7ffd7367e09c items=0 ppid=2801 pid=2916 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:32:58.918000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572
Oct  2 21:32:58.925000 audit[2918]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2918 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Oct  2 21:32:58.925000 audit[2918]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffcfb9cf180 a2=0 a3=7ffcfb9cf16c items=0 ppid=2801 pid=2918 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:32:58.925000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963
Oct  2 21:32:58.935000 audit[2921]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2921 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Oct  2 21:32:58.935000 audit[2921]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffe52307430 a2=0 a3=7ffe5230741c items=0 ppid=2801 pid=2921 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:32:58.935000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276
Oct  2 21:32:58.938000 audit[2922]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2922 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Oct  2 21:32:58.938000 audit[2922]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffef4091b0 a2=0 a3=7fffef40919c items=0 ppid=2801 pid=2922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:32:58.938000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572
Oct  2 21:32:58.945000 audit[2924]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2924 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Oct  2 21:32:58.945000 audit[2924]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffee51eba80 a2=0 a3=7ffee51eba6c items=0 ppid=2801 pid=2924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:32:58.945000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453
Oct  2 21:32:58.948000 audit[2925]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2925 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Oct  2 21:32:58.948000 audit[2925]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff7977e1e0 a2=0 a3=7fff7977e1cc items=0 ppid=2801 pid=2925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:32:58.948000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572
Oct  2 21:32:58.955000 audit[2927]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2927 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Oct  2 21:32:58.955000 audit[2927]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fffab2b43b0 a2=0 a3=7fffab2b439c items=0 ppid=2801 pid=2927 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:32:58.955000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245
Oct  2 21:32:58.964000 audit[2930]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2930 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Oct  2 21:32:58.964000 audit[2930]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffe6523b880 a2=0 a3=7ffe6523b86c items=0 ppid=2801 pid=2930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:32:58.964000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D
Oct  2 21:32:58.967000 audit[2931]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2931 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Oct  2 21:32:58.967000 audit[2931]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdecd3e630 a2=0 a3=7ffdecd3e61c items=0 ppid=2801 pid=2931 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:32:58.967000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572
Oct  2 21:32:58.974000 audit[2933]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2933 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Oct  2 21:32:58.974000 audit[2933]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffcbf79c7c0 a2=0 a3=7ffcbf79c7ac items=0 ppid=2801 pid=2933 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:32:58.974000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244
Oct  2 21:32:58.977000 audit[2934]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2934 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Oct  2 21:32:58.977000 audit[2934]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd02de6f10 a2=0 a3=7ffd02de6efc items=0 ppid=2801 pid=2934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:32:58.977000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572
Oct  2 21:32:58.982387 update_engine[1447]: I1002 21:32:58.982300  1447 update_attempter.cc:505] Updating boot flags...
Oct  2 21:32:58.985000 audit[2937]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2937 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Oct  2 21:32:58.985000 audit[2937]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd86f77e70 a2=0 a3=7ffd86f77e5c items=0 ppid=2801 pid=2937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:32:58.985000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A
Oct  2 21:32:58.996000 audit[2943]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2943 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Oct  2 21:32:58.996000 audit[2943]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe57c91a90 a2=0 a3=7ffe57c91a7c items=0 ppid=2801 pid=2943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:32:58.996000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D
Oct  2 21:32:59.006000 audit[2947]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2947 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Oct  2 21:32:59.006000 audit[2947]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fffd7880c50 a2=0 a3=7fffd7880c3c items=0 ppid=2801 pid=2947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:32:59.006000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C
Oct  2 21:32:59.009000 audit[2948]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=2948 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Oct  2 21:32:59.009000 audit[2948]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff13db9a70 a2=0 a3=7fff13db9a5c items=0 ppid=2801 pid=2948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:32:59.009000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174
Oct  2 21:32:59.015000 audit[2951]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=2951 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Oct  2 21:32:59.015000 audit[2951]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffc345943a0 a2=0 a3=7ffc3459438c items=0 ppid=2801 pid=2951 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:32:59.015000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553
Oct  2 21:32:59.025000 audit[2955]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=2955 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Oct  2 21:32:59.025000 audit[2955]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffecc31f1b0 a2=0 a3=7ffecc31f19c items=0 ppid=2801 pid=2955 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:32:59.025000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553
Oct  2 21:32:59.028000 audit[2956]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=2956 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Oct  2 21:32:59.028000 audit[2956]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc91b53b70 a2=0 a3=7ffc91b53b5c items=0 ppid=2801 pid=2956 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:32:59.028000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174
Oct  2 21:32:59.033000 audit[2958]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=2958 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Oct  2 21:32:59.033000 audit[2958]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffcc7acf0d0 a2=0 a3=7ffcc7acf0bc items=0 ppid=2801 pid=2958 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:32:59.033000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47
Oct  2 21:32:59.035000 audit[2959]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=2959 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Oct  2 21:32:59.035000 audit[2959]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd152969f0 a2=0 a3=7ffd152969dc items=0 ppid=2801 pid=2959 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:32:59.035000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572
Oct  2 21:32:59.038000 audit[2961]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=2961 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Oct  2 21:32:59.038000 audit[2961]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fffdbac31e0 a2=0 a3=7fffdbac31cc items=0 ppid=2801 pid=2961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:32:59.038000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C
Oct  2 21:32:59.043000 audit[2969]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=2969 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Oct  2 21:32:59.043000 audit[2969]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc71cf89b0 a2=0 a3=7ffc71cf899c items=0 ppid=2801 pid=2969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:32:59.043000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C
Oct  2 21:32:59.046000 audit[2972]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=2972 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto"
Oct  2 21:32:59.046000 audit[2972]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffd409fa720 a2=0 a3=7ffd409fa70c items=0 ppid=2801 pid=2972 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:32:59.046000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Oct  2 21:32:59.046000 audit[2972]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=2972 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto"
Oct  2 21:32:59.046000 audit[2972]: SYSCALL arch=c000003e syscall=46 success=yes exit=1968 a0=3 a1=7ffd409fa720 a2=0 a3=7ffd409fa70c items=0 ppid=2801 pid=2972 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:32:59.046000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Oct  2 21:33:00.035141 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3963259218.mount: Deactivated successfully.
Oct  2 21:33:00.964189 env[1455]: time="2023-10-02T21:33:00.964046907Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.29.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 21:33:01.090621 env[1455]: time="2023-10-02T21:33:01.090489046Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:343ea4f89a32c8f197173c5d9f1ad64eb033df452c5b89a65877d8d3cfa692b1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 21:33:01.182879 env[1455]: time="2023-10-02T21:33:01.182743487Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.29.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 21:33:01.230054 env[1455]: time="2023-10-02T21:33:01.229801913Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:89eef35e1bbe8c88792ce69c3f3f38fb9838e58602c570524350b5f3ab127582,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 21:33:01.232404 env[1455]: time="2023-10-02T21:33:01.232259631Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.29.0\" returns image reference \"sha256:343ea4f89a32c8f197173c5d9f1ad64eb033df452c5b89a65877d8d3cfa692b1\""
Oct  2 21:33:01.237080 env[1455]: time="2023-10-02T21:33:01.236957836Z" level=info msg="CreateContainer within sandbox \"bec2b377cdb78b93bb75e5064b512479d4527b7afe8e1aa8ffd2049b50bb54f5\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}"
Oct  2 21:33:01.272121 env[1455]: time="2023-10-02T21:33:01.271987812Z" level=info msg="CreateContainer within sandbox \"bec2b377cdb78b93bb75e5064b512479d4527b7afe8e1aa8ffd2049b50bb54f5\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"c0c8e4b2e8586802fdd301a653f642852262be89557f08bbe1f0a6a012907a37\""
Oct  2 21:33:01.273165 env[1455]: time="2023-10-02T21:33:01.273055494Z" level=info msg="StartContainer for \"c0c8e4b2e8586802fdd301a653f642852262be89557f08bbe1f0a6a012907a37\""
Oct  2 21:33:01.311146 systemd[1]: Started cri-containerd-c0c8e4b2e8586802fdd301a653f642852262be89557f08bbe1f0a6a012907a37.scope.
Oct  2 21:33:01.334000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:01.370851 kernel: kauditd_printk_skb: 315 callbacks suppressed
Oct  2 21:33:01.370949 kernel: audit: type=1400 audit(1696282381.334:1046): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:01.434507 kernel: audit: type=1400 audit(1696282381.334:1047): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:01.334000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:01.334000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:01.561728 kernel: audit: type=1400 audit(1696282381.334:1048): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:01.561763 kernel: audit: type=1400 audit(1696282381.334:1049): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:01.334000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:01.625739 kernel: audit: type=1400 audit(1696282381.334:1050): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:01.334000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:01.689669 kernel: audit: type=1400 audit(1696282381.334:1051): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:01.334000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:01.753622 kernel: audit: type=1400 audit(1696282381.334:1052): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:01.334000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:01.817620 kernel: audit: type=1400 audit(1696282381.334:1053): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:01.334000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:01.881756 kernel: audit: type=1400 audit(1696282381.334:1054): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:01.334000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:01.434000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:02.009126 kernel: audit: type=1400 audit(1696282381.434:1055): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:01.434000 audit: BPF prog-id=123 op=LOAD
Oct  2 21:33:01.434000 audit[2984]: AVC avc:  denied  { bpf } for  pid=2984 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:01.434000 audit[2984]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2758 pid=2984 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:33:01.434000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330633865346232653835383638303266646433303161363533663634
Oct  2 21:33:01.434000 audit[2984]: AVC avc:  denied  { perfmon } for  pid=2984 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:01.434000 audit[2984]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2758 pid=2984 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:33:01.434000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330633865346232653835383638303266646433303161363533663634
Oct  2 21:33:01.434000 audit[2984]: AVC avc:  denied  { bpf } for  pid=2984 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:01.434000 audit[2984]: AVC avc:  denied  { bpf } for  pid=2984 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:01.434000 audit[2984]: AVC avc:  denied  { bpf } for  pid=2984 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:01.434000 audit[2984]: AVC avc:  denied  { perfmon } for  pid=2984 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:01.434000 audit[2984]: AVC avc:  denied  { perfmon } for  pid=2984 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:01.434000 audit[2984]: AVC avc:  denied  { perfmon } for  pid=2984 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:01.434000 audit[2984]: AVC avc:  denied  { perfmon } for  pid=2984 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:01.434000 audit[2984]: AVC avc:  denied  { perfmon } for  pid=2984 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:01.434000 audit[2984]: AVC avc:  denied  { bpf } for  pid=2984 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:01.434000 audit[2984]: AVC avc:  denied  { bpf } for  pid=2984 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:01.434000 audit: BPF prog-id=124 op=LOAD
Oct  2 21:33:01.434000 audit[2984]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002936d0 items=0 ppid=2758 pid=2984 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:33:01.434000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330633865346232653835383638303266646433303161363533663634
Oct  2 21:33:01.561000 audit[2984]: AVC avc:  denied  { bpf } for  pid=2984 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:01.561000 audit[2984]: AVC avc:  denied  { bpf } for  pid=2984 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:01.561000 audit[2984]: AVC avc:  denied  { perfmon } for  pid=2984 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:01.561000 audit[2984]: AVC avc:  denied  { perfmon } for  pid=2984 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:01.561000 audit[2984]: AVC avc:  denied  { perfmon } for  pid=2984 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:01.561000 audit[2984]: AVC avc:  denied  { perfmon } for  pid=2984 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:01.561000 audit[2984]: AVC avc:  denied  { perfmon } for  pid=2984 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:01.561000 audit[2984]: AVC avc:  denied  { bpf } for  pid=2984 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:01.561000 audit[2984]: AVC avc:  denied  { bpf } for  pid=2984 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:01.561000 audit: BPF prog-id=125 op=LOAD
Oct  2 21:33:01.561000 audit[2984]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000293718 items=0 ppid=2758 pid=2984 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:33:01.561000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330633865346232653835383638303266646433303161363533663634
Oct  2 21:33:01.689000 audit: BPF prog-id=125 op=UNLOAD
Oct  2 21:33:01.689000 audit: BPF prog-id=124 op=UNLOAD
Oct  2 21:33:01.689000 audit[2984]: AVC avc:  denied  { bpf } for  pid=2984 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:01.689000 audit[2984]: AVC avc:  denied  { bpf } for  pid=2984 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:01.689000 audit[2984]: AVC avc:  denied  { bpf } for  pid=2984 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:01.689000 audit[2984]: AVC avc:  denied  { perfmon } for  pid=2984 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:01.689000 audit[2984]: AVC avc:  denied  { perfmon } for  pid=2984 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:01.689000 audit[2984]: AVC avc:  denied  { perfmon } for  pid=2984 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:01.689000 audit[2984]: AVC avc:  denied  { perfmon } for  pid=2984 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:01.689000 audit[2984]: AVC avc:  denied  { perfmon } for  pid=2984 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:01.689000 audit[2984]: AVC avc:  denied  { bpf } for  pid=2984 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:01.689000 audit[2984]: AVC avc:  denied  { bpf } for  pid=2984 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:01.689000 audit: BPF prog-id=126 op=LOAD
Oct  2 21:33:01.689000 audit[2984]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000293b28 items=0 ppid=2758 pid=2984 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:33:01.689000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330633865346232653835383638303266646433303161363533663634
Oct  2 21:33:02.027302 env[1455]: time="2023-10-02T21:33:02.027245289Z" level=info msg="StartContainer for \"c0c8e4b2e8586802fdd301a653f642852262be89557f08bbe1f0a6a012907a37\" returns successfully"
Oct  2 21:33:02.856105 kubelet[2553]: I1002 21:33:02.856043    2553 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="tigera-operator/tigera-operator-8547bd6cc6-fzpwl" podStartSLOduration=2.212472156 podCreationTimestamp="2023-10-02 21:32:58 +0000 UTC" firstStartedPulling="2023-10-02 21:32:58.589377195 +0000 UTC m=+14.851994046" lastFinishedPulling="2023-10-02 21:33:01.232926821 +0000 UTC m=+17.495543776" observedRunningTime="2023-10-02 21:33:02.855917961 +0000 UTC m=+19.118534819" watchObservedRunningTime="2023-10-02 21:33:02.856021886 +0000 UTC m=+19.118638734"
Oct  2 21:33:03.743000 audit[3028]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=3028 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Oct  2 21:33:03.743000 audit[3028]: SYSCALL arch=c000003e syscall=46 success=yes exit=5660 a0=3 a1=7ffc9cb541b0 a2=0 a3=7ffc9cb5419c items=0 ppid=2801 pid=3028 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:33:03.743000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Oct  2 21:33:03.743000 audit[3028]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=3028 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Oct  2 21:33:03.743000 audit[3028]: SYSCALL arch=c000003e syscall=46 success=yes exit=2572 a0=3 a1=7ffc9cb541b0 a2=0 a3=31030 items=0 ppid=2801 pid=3028 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:33:03.743000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Oct  2 21:33:03.768000 audit[3030]: NETFILTER_CFG table=filter:91 family=2 entries=16 op=nft_register_rule pid=3030 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Oct  2 21:33:03.768000 audit[3030]: SYSCALL arch=c000003e syscall=46 success=yes exit=5660 a0=3 a1=7ffc0253c9f0 a2=0 a3=7ffc0253c9dc items=0 ppid=2801 pid=3030 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:33:03.768000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Oct  2 21:33:03.774000 audit[3030]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=3030 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Oct  2 21:33:03.774000 audit[3030]: SYSCALL arch=c000003e syscall=46 success=yes exit=2572 a0=3 a1=7ffc0253c9f0 a2=0 a3=31030 items=0 ppid=2801 pid=3030 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:33:03.774000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Oct  2 21:33:03.988116 kubelet[2553]: I1002 21:33:03.988052    2553 topology_manager.go:215] "Topology Admit Handler" podUID="79fe0098-286d-4220-b46e-318644155e5c" podNamespace="calico-system" podName="calico-typha-76fc48b76-qkmm7"
Oct  2 21:33:04.000624 systemd[1]: Created slice kubepods-besteffort-pod79fe0098_286d_4220_b46e_318644155e5c.slice.
Oct  2 21:33:04.032024 kubelet[2553]: I1002 21:33:04.031975    2553 topology_manager.go:215] "Topology Admit Handler" podUID="aec4d6eb-afdc-4566-b262-3377993dc970" podNamespace="calico-system" podName="calico-node-hrww7"
Oct  2 21:33:04.034741 systemd[1]: Created slice kubepods-besteffort-podaec4d6eb_afdc_4566_b262_3377993dc970.slice.
Oct  2 21:33:04.107502 kubelet[2553]: I1002 21:33:04.107357    2553 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/79fe0098-286d-4220-b46e-318644155e5c-tigera-ca-bundle\") pod \"calico-typha-76fc48b76-qkmm7\" (UID: \"79fe0098-286d-4220-b46e-318644155e5c\") " pod="calico-system/calico-typha-76fc48b76-qkmm7"
Oct  2 21:33:04.107502 kubelet[2553]: I1002 21:33:04.107508    2553 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/79fe0098-286d-4220-b46e-318644155e5c-typha-certs\") pod \"calico-typha-76fc48b76-qkmm7\" (UID: \"79fe0098-286d-4220-b46e-318644155e5c\") " pod="calico-system/calico-typha-76fc48b76-qkmm7"
Oct  2 21:33:04.107919 kubelet[2553]: I1002 21:33:04.107588    2553 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-m7nnt\" (UniqueName: \"kubernetes.io/projected/79fe0098-286d-4220-b46e-318644155e5c-kube-api-access-m7nnt\") pod \"calico-typha-76fc48b76-qkmm7\" (UID: \"79fe0098-286d-4220-b46e-318644155e5c\") " pod="calico-system/calico-typha-76fc48b76-qkmm7"
Oct  2 21:33:04.209257 kubelet[2553]: I1002 21:33:04.209147    2553 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/aec4d6eb-afdc-4566-b262-3377993dc970-var-lib-calico\") pod \"calico-node-hrww7\" (UID: \"aec4d6eb-afdc-4566-b262-3377993dc970\") " pod="calico-system/calico-node-hrww7"
Oct  2 21:33:04.209578 kubelet[2553]: I1002 21:33:04.209350    2553 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-4pll8\" (UniqueName: \"kubernetes.io/projected/aec4d6eb-afdc-4566-b262-3377993dc970-kube-api-access-4pll8\") pod \"calico-node-hrww7\" (UID: \"aec4d6eb-afdc-4566-b262-3377993dc970\") " pod="calico-system/calico-node-hrww7"
Oct  2 21:33:04.209740 kubelet[2553]: I1002 21:33:04.209669    2553 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/aec4d6eb-afdc-4566-b262-3377993dc970-cni-bin-dir\") pod \"calico-node-hrww7\" (UID: \"aec4d6eb-afdc-4566-b262-3377993dc970\") " pod="calico-system/calico-node-hrww7"
Oct  2 21:33:04.209976 kubelet[2553]: I1002 21:33:04.209871    2553 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/aec4d6eb-afdc-4566-b262-3377993dc970-cni-log-dir\") pod \"calico-node-hrww7\" (UID: \"aec4d6eb-afdc-4566-b262-3377993dc970\") " pod="calico-system/calico-node-hrww7"
Oct  2 21:33:04.210171 kubelet[2553]: I1002 21:33:04.210110    2553 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/aec4d6eb-afdc-4566-b262-3377993dc970-flexvol-driver-host\") pod \"calico-node-hrww7\" (UID: \"aec4d6eb-afdc-4566-b262-3377993dc970\") " pod="calico-system/calico-node-hrww7"
Oct  2 21:33:04.210308 kubelet[2553]: I1002 21:33:04.210211    2553 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/aec4d6eb-afdc-4566-b262-3377993dc970-xtables-lock\") pod \"calico-node-hrww7\" (UID: \"aec4d6eb-afdc-4566-b262-3377993dc970\") " pod="calico-system/calico-node-hrww7"
Oct  2 21:33:04.210308 kubelet[2553]: I1002 21:33:04.210297    2553 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/aec4d6eb-afdc-4566-b262-3377993dc970-cni-net-dir\") pod \"calico-node-hrww7\" (UID: \"aec4d6eb-afdc-4566-b262-3377993dc970\") " pod="calico-system/calico-node-hrww7"
Oct  2 21:33:04.210610 kubelet[2553]: I1002 21:33:04.210429    2553 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/aec4d6eb-afdc-4566-b262-3377993dc970-lib-modules\") pod \"calico-node-hrww7\" (UID: \"aec4d6eb-afdc-4566-b262-3377993dc970\") " pod="calico-system/calico-node-hrww7"
Oct  2 21:33:04.210610 kubelet[2553]: I1002 21:33:04.210540    2553 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/aec4d6eb-afdc-4566-b262-3377993dc970-var-run-calico\") pod \"calico-node-hrww7\" (UID: \"aec4d6eb-afdc-4566-b262-3377993dc970\") " pod="calico-system/calico-node-hrww7"
Oct  2 21:33:04.210877 kubelet[2553]: I1002 21:33:04.210824    2553 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/aec4d6eb-afdc-4566-b262-3377993dc970-tigera-ca-bundle\") pod \"calico-node-hrww7\" (UID: \"aec4d6eb-afdc-4566-b262-3377993dc970\") " pod="calico-system/calico-node-hrww7"
Oct  2 21:33:04.211179 kubelet[2553]: I1002 21:33:04.211082    2553 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/aec4d6eb-afdc-4566-b262-3377993dc970-node-certs\") pod \"calico-node-hrww7\" (UID: \"aec4d6eb-afdc-4566-b262-3377993dc970\") " pod="calico-system/calico-node-hrww7"
Oct  2 21:33:04.211386 kubelet[2553]: I1002 21:33:04.211277    2553 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/aec4d6eb-afdc-4566-b262-3377993dc970-policysync\") pod \"calico-node-hrww7\" (UID: \"aec4d6eb-afdc-4566-b262-3377993dc970\") " pod="calico-system/calico-node-hrww7"
Oct  2 21:33:04.304874 env[1455]: time="2023-10-02T21:33:04.304636588Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-76fc48b76-qkmm7,Uid:79fe0098-286d-4220-b46e-318644155e5c,Namespace:calico-system,Attempt:0,}"
Oct  2 21:33:04.313731 kubelet[2553]: E1002 21:33:04.313663    2553 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 21:33:04.313945 kubelet[2553]: W1002 21:33:04.313732    2553 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 21:33:04.313945 kubelet[2553]: E1002 21:33:04.313822    2553 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 21:33:04.314521 kubelet[2553]: E1002 21:33:04.314482    2553 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 21:33:04.314521 kubelet[2553]: W1002 21:33:04.314518    2553 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 21:33:04.314834 kubelet[2553]: E1002 21:33:04.314561    2553 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 21:33:04.317723 kubelet[2553]: E1002 21:33:04.317677    2553 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 21:33:04.317723 kubelet[2553]: W1002 21:33:04.317713    2553 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 21:33:04.318040 kubelet[2553]: E1002 21:33:04.317767    2553 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 21:33:04.320887 kubelet[2553]: E1002 21:33:04.320811    2553 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 21:33:04.320887 kubelet[2553]: W1002 21:33:04.320846    2553 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 21:33:04.320887 kubelet[2553]: E1002 21:33:04.320889    2553 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 21:33:04.329643 env[1455]: time="2023-10-02T21:33:04.329525425Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1
Oct  2 21:33:04.329643 env[1455]: time="2023-10-02T21:33:04.329605450Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1
Oct  2 21:33:04.329956 env[1455]: time="2023-10-02T21:33:04.329639368Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1
Oct  2 21:33:04.330065 env[1455]: time="2023-10-02T21:33:04.329890193Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/27de85eb4ddaa82281276a9f03af492b3045fb7fb4450f3b5198435c23429144 pid=3045 runtime=io.containerd.runc.v2
Oct  2 21:33:04.336351 kubelet[2553]: E1002 21:33:04.336324    2553 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 21:33:04.336351 kubelet[2553]: W1002 21:33:04.336345    2553 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 21:33:04.336566 kubelet[2553]: E1002 21:33:04.336374    2553 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 21:33:04.354750 systemd[1]: Started cri-containerd-27de85eb4ddaa82281276a9f03af492b3045fb7fb4450f3b5198435c23429144.scope.
Oct  2 21:33:04.363000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:04.363000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:04.363000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:04.363000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:04.363000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:04.363000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:04.363000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:04.363000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:04.363000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:04.363000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:04.363000 audit: BPF prog-id=127 op=LOAD
Oct  2 21:33:04.364000 audit[3055]: AVC avc:  denied  { bpf } for  pid=3055 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:04.364000 audit[3055]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3045 pid=3055 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:33:04.364000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237646538356562346464616138323238313237366139663033616634
Oct  2 21:33:04.364000 audit[3055]: AVC avc:  denied  { perfmon } for  pid=3055 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:04.364000 audit[3055]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3045 pid=3055 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:33:04.364000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237646538356562346464616138323238313237366139663033616634
Oct  2 21:33:04.364000 audit[3055]: AVC avc:  denied  { bpf } for  pid=3055 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:04.364000 audit[3055]: AVC avc:  denied  { bpf } for  pid=3055 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:04.364000 audit[3055]: AVC avc:  denied  { bpf } for  pid=3055 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:04.364000 audit[3055]: AVC avc:  denied  { perfmon } for  pid=3055 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:04.364000 audit[3055]: AVC avc:  denied  { perfmon } for  pid=3055 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:04.364000 audit[3055]: AVC avc:  denied  { perfmon } for  pid=3055 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:04.364000 audit[3055]: AVC avc:  denied  { perfmon } for  pid=3055 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:04.364000 audit[3055]: AVC avc:  denied  { perfmon } for  pid=3055 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:04.364000 audit[3055]: AVC avc:  denied  { bpf } for  pid=3055 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:04.364000 audit[3055]: AVC avc:  denied  { bpf } for  pid=3055 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:04.364000 audit: BPF prog-id=128 op=LOAD
Oct  2 21:33:04.364000 audit[3055]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002156e0 items=0 ppid=3045 pid=3055 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:33:04.364000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237646538356562346464616138323238313237366139663033616634
Oct  2 21:33:04.364000 audit[3055]: AVC avc:  denied  { bpf } for  pid=3055 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:04.364000 audit[3055]: AVC avc:  denied  { bpf } for  pid=3055 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:04.364000 audit[3055]: AVC avc:  denied  { perfmon } for  pid=3055 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:04.364000 audit[3055]: AVC avc:  denied  { perfmon } for  pid=3055 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:04.364000 audit[3055]: AVC avc:  denied  { perfmon } for  pid=3055 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:04.364000 audit[3055]: AVC avc:  denied  { perfmon } for  pid=3055 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:04.364000 audit[3055]: AVC avc:  denied  { perfmon } for  pid=3055 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:04.364000 audit[3055]: AVC avc:  denied  { bpf } for  pid=3055 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:04.364000 audit[3055]: AVC avc:  denied  { bpf } for  pid=3055 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:04.364000 audit: BPF prog-id=129 op=LOAD
Oct  2 21:33:04.364000 audit[3055]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000215728 items=0 ppid=3045 pid=3055 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:33:04.364000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237646538356562346464616138323238313237366139663033616634
Oct  2 21:33:04.364000 audit: BPF prog-id=129 op=UNLOAD
Oct  2 21:33:04.364000 audit: BPF prog-id=128 op=UNLOAD
Oct  2 21:33:04.364000 audit[3055]: AVC avc:  denied  { bpf } for  pid=3055 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:04.364000 audit[3055]: AVC avc:  denied  { bpf } for  pid=3055 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:04.364000 audit[3055]: AVC avc:  denied  { bpf } for  pid=3055 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:04.364000 audit[3055]: AVC avc:  denied  { perfmon } for  pid=3055 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:04.364000 audit[3055]: AVC avc:  denied  { perfmon } for  pid=3055 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:04.364000 audit[3055]: AVC avc:  denied  { perfmon } for  pid=3055 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:04.364000 audit[3055]: AVC avc:  denied  { perfmon } for  pid=3055 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:04.364000 audit[3055]: AVC avc:  denied  { perfmon } for  pid=3055 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:04.364000 audit[3055]: AVC avc:  denied  { bpf } for  pid=3055 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:04.364000 audit[3055]: AVC avc:  denied  { bpf } for  pid=3055 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:04.364000 audit: BPF prog-id=130 op=LOAD
Oct  2 21:33:04.364000 audit[3055]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000215b38 items=0 ppid=3045 pid=3055 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:33:04.364000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237646538356562346464616138323238313237366139663033616634
Oct  2 21:33:04.406435 env[1455]: time="2023-10-02T21:33:04.406401898Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-76fc48b76-qkmm7,Uid:79fe0098-286d-4220-b46e-318644155e5c,Namespace:calico-system,Attempt:0,} returns sandbox id \"27de85eb4ddaa82281276a9f03af492b3045fb7fb4450f3b5198435c23429144\""
Oct  2 21:33:04.407287 env[1455]: time="2023-10-02T21:33:04.407270768Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.25.0\""
Oct  2 21:33:04.636810 env[1455]: time="2023-10-02T21:33:04.636631227Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-hrww7,Uid:aec4d6eb-afdc-4566-b262-3377993dc970,Namespace:calico-system,Attempt:0,}"
Oct  2 21:33:04.655349 env[1455]: time="2023-10-02T21:33:04.655222743Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1
Oct  2 21:33:04.655349 env[1455]: time="2023-10-02T21:33:04.655292517Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1
Oct  2 21:33:04.655349 env[1455]: time="2023-10-02T21:33:04.655319038Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1
Oct  2 21:33:04.655760 env[1455]: time="2023-10-02T21:33:04.655594539Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e91b4a181c8f1a61bd7de2868a1418af7125973295601cdf6a5ce3ba60b19121 pid=3087 runtime=io.containerd.runc.v2
Oct  2 21:33:04.687076 systemd[1]: Started cri-containerd-e91b4a181c8f1a61bd7de2868a1418af7125973295601cdf6a5ce3ba60b19121.scope.
Oct  2 21:33:04.697000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:04.697000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:04.697000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:04.697000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:04.697000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:04.697000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:04.697000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:04.697000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:04.697000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:04.697000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:04.697000 audit: BPF prog-id=131 op=LOAD
Oct  2 21:33:04.698000 audit[3096]: AVC avc:  denied  { bpf } for  pid=3096 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:04.698000 audit[3096]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3087 pid=3096 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:33:04.698000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539316234613138316338663161363162643764653238363861313431
Oct  2 21:33:04.698000 audit[3096]: AVC avc:  denied  { perfmon } for  pid=3096 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:04.698000 audit[3096]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3087 pid=3096 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:33:04.698000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539316234613138316338663161363162643764653238363861313431
Oct  2 21:33:04.698000 audit[3096]: AVC avc:  denied  { bpf } for  pid=3096 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:04.698000 audit[3096]: AVC avc:  denied  { bpf } for  pid=3096 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:04.698000 audit[3096]: AVC avc:  denied  { bpf } for  pid=3096 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:04.698000 audit[3096]: AVC avc:  denied  { perfmon } for  pid=3096 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:04.698000 audit[3096]: AVC avc:  denied  { perfmon } for  pid=3096 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:04.698000 audit[3096]: AVC avc:  denied  { perfmon } for  pid=3096 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:04.698000 audit[3096]: AVC avc:  denied  { perfmon } for  pid=3096 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:04.698000 audit[3096]: AVC avc:  denied  { perfmon } for  pid=3096 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:04.698000 audit[3096]: AVC avc:  denied  { bpf } for  pid=3096 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:04.698000 audit[3096]: AVC avc:  denied  { bpf } for  pid=3096 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:04.698000 audit: BPF prog-id=132 op=LOAD
Oct  2 21:33:04.698000 audit[3096]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0001dd980 items=0 ppid=3087 pid=3096 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:33:04.698000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539316234613138316338663161363162643764653238363861313431
Oct  2 21:33:04.698000 audit[3096]: AVC avc:  denied  { bpf } for  pid=3096 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:04.698000 audit[3096]: AVC avc:  denied  { bpf } for  pid=3096 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:04.698000 audit[3096]: AVC avc:  denied  { perfmon } for  pid=3096 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:04.698000 audit[3096]: AVC avc:  denied  { perfmon } for  pid=3096 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:04.698000 audit[3096]: AVC avc:  denied  { perfmon } for  pid=3096 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:04.698000 audit[3096]: AVC avc:  denied  { perfmon } for  pid=3096 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:04.698000 audit[3096]: AVC avc:  denied  { perfmon } for  pid=3096 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:04.698000 audit[3096]: AVC avc:  denied  { bpf } for  pid=3096 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:04.698000 audit[3096]: AVC avc:  denied  { bpf } for  pid=3096 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:04.698000 audit: BPF prog-id=133 op=LOAD
Oct  2 21:33:04.698000 audit[3096]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0001dd9c8 items=0 ppid=3087 pid=3096 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:33:04.698000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539316234613138316338663161363162643764653238363861313431
Oct  2 21:33:04.698000 audit: BPF prog-id=133 op=UNLOAD
Oct  2 21:33:04.698000 audit: BPF prog-id=132 op=UNLOAD
Oct  2 21:33:04.698000 audit[3096]: AVC avc:  denied  { bpf } for  pid=3096 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:04.698000 audit[3096]: AVC avc:  denied  { bpf } for  pid=3096 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:04.698000 audit[3096]: AVC avc:  denied  { bpf } for  pid=3096 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:04.698000 audit[3096]: AVC avc:  denied  { perfmon } for  pid=3096 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:04.698000 audit[3096]: AVC avc:  denied  { perfmon } for  pid=3096 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:04.698000 audit[3096]: AVC avc:  denied  { perfmon } for  pid=3096 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:04.698000 audit[3096]: AVC avc:  denied  { perfmon } for  pid=3096 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:04.698000 audit[3096]: AVC avc:  denied  { perfmon } for  pid=3096 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:04.698000 audit[3096]: AVC avc:  denied  { bpf } for  pid=3096 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:04.698000 audit[3096]: AVC avc:  denied  { bpf } for  pid=3096 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:04.698000 audit: BPF prog-id=134 op=LOAD
Oct  2 21:33:04.698000 audit[3096]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0001dddd8 items=0 ppid=3087 pid=3096 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:33:04.698000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539316234613138316338663161363162643764653238363861313431
Oct  2 21:33:04.723350 env[1455]: time="2023-10-02T21:33:04.723302581Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-hrww7,Uid:aec4d6eb-afdc-4566-b262-3377993dc970,Namespace:calico-system,Attempt:0,} returns sandbox id \"e91b4a181c8f1a61bd7de2868a1418af7125973295601cdf6a5ce3ba60b19121\""
Oct  2 21:33:04.793000 audit[3121]: NETFILTER_CFG table=filter:93 family=2 entries=16 op=nft_register_rule pid=3121 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Oct  2 21:33:04.793000 audit[3121]: SYSCALL arch=c000003e syscall=46 success=yes exit=5660 a0=3 a1=7ffceec6fa60 a2=0 a3=7ffceec6fa4c items=0 ppid=2801 pid=3121 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:33:04.793000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Oct  2 21:33:04.794000 audit[3121]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=3121 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Oct  2 21:33:04.794000 audit[3121]: SYSCALL arch=c000003e syscall=46 success=yes exit=2572 a0=3 a1=7ffceec6fa60 a2=0 a3=31030 items=0 ppid=2801 pid=3121 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:33:04.794000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Oct  2 21:33:05.921472 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1204233123.mount: Deactivated successfully.
Oct  2 21:33:07.768215 env[1455]: time="2023-10-02T21:33:07.768161936Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 21:33:07.768800 env[1455]: time="2023-10-02T21:33:07.768756021Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7b60c7012b1c9f468779a685b9b50ddfd754f2d92ea6769a681942aafb2d113f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 21:33:07.769869 env[1455]: time="2023-10-02T21:33:07.769829666Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 21:33:07.770887 env[1455]: time="2023-10-02T21:33:07.770845536Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:7fb0e011ffae9f88333b7a7488dae37f1d534b46d2b11a0fe2b5d129df58789c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 21:33:07.771321 env[1455]: time="2023-10-02T21:33:07.771281368Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.25.0\" returns image reference \"sha256:7b60c7012b1c9f468779a685b9b50ddfd754f2d92ea6769a681942aafb2d113f\""
Oct  2 21:33:07.771779 env[1455]: time="2023-10-02T21:33:07.771718554Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.25.0\""
Oct  2 21:33:07.772710 env[1455]: time="2023-10-02T21:33:07.772697882Z" level=info msg="CreateContainer within sandbox \"27de85eb4ddaa82281276a9f03af492b3045fb7fb4450f3b5198435c23429144\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}"
Oct  2 21:33:07.777860 env[1455]: time="2023-10-02T21:33:07.777808227Z" level=info msg="CreateContainer within sandbox \"27de85eb4ddaa82281276a9f03af492b3045fb7fb4450f3b5198435c23429144\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"c53dfbdf234b877cbd25d64771087c4e87b6c46942487da8fa03b23629ec9aa5\""
Oct  2 21:33:07.778155 env[1455]: time="2023-10-02T21:33:07.778098060Z" level=info msg="StartContainer for \"c53dfbdf234b877cbd25d64771087c4e87b6c46942487da8fa03b23629ec9aa5\""
Oct  2 21:33:07.799972 systemd[1]: Started cri-containerd-c53dfbdf234b877cbd25d64771087c4e87b6c46942487da8fa03b23629ec9aa5.scope.
Oct  2 21:33:07.803000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:07.832511 kernel: kauditd_printk_skb: 179 callbacks suppressed
Oct  2 21:33:07.832598 kernel: audit: type=1400 audit(1696282387.803:1106): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:07.803000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:07.959931 kernel: audit: type=1400 audit(1696282387.803:1107): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:07.959961 kernel: audit: type=1400 audit(1696282387.803:1108): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:07.803000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:07.803000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:08.087242 kernel: audit: type=1400 audit(1696282387.803:1109): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:08.087283 kernel: audit: type=1400 audit(1696282387.803:1110): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:07.803000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:07.803000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:08.215053 kernel: audit: type=1400 audit(1696282387.803:1111): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:08.215102 kernel: audit: type=1400 audit(1696282387.803:1112): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:07.803000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:07.803000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:08.343150 kernel: audit: type=1400 audit(1696282387.803:1113): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:08.343235 kernel: audit: type=1400 audit(1696282387.803:1114): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:07.803000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:07.958000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:08.470711 kernel: audit: type=1400 audit(1696282387.958:1115): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:07.958000 audit: BPF prog-id=135 op=LOAD
Oct  2 21:33:07.958000 audit[3129]: AVC avc:  denied  { bpf } for  pid=3129 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:07.958000 audit[3129]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=3045 pid=3129 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:33:07.958000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335336466626466323334623837376362643235643634373731303837
Oct  2 21:33:07.958000 audit[3129]: AVC avc:  denied  { perfmon } for  pid=3129 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:07.958000 audit[3129]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=3045 pid=3129 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:33:07.958000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335336466626466323334623837376362643235643634373731303837
Oct  2 21:33:07.958000 audit[3129]: AVC avc:  denied  { bpf } for  pid=3129 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:07.958000 audit[3129]: AVC avc:  denied  { bpf } for  pid=3129 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:07.958000 audit[3129]: AVC avc:  denied  { bpf } for  pid=3129 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:07.958000 audit[3129]: AVC avc:  denied  { perfmon } for  pid=3129 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:07.958000 audit[3129]: AVC avc:  denied  { perfmon } for  pid=3129 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:07.958000 audit[3129]: AVC avc:  denied  { perfmon } for  pid=3129 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:07.958000 audit[3129]: AVC avc:  denied  { perfmon } for  pid=3129 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:07.958000 audit[3129]: AVC avc:  denied  { perfmon } for  pid=3129 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:07.958000 audit[3129]: AVC avc:  denied  { bpf } for  pid=3129 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:07.958000 audit[3129]: AVC avc:  denied  { bpf } for  pid=3129 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:07.958000 audit: BPF prog-id=136 op=LOAD
Oct  2 21:33:07.958000 audit[3129]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c0001f36a0 items=0 ppid=3045 pid=3129 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:33:07.958000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335336466626466323334623837376362643235643634373731303837
Oct  2 21:33:08.085000 audit[3129]: AVC avc:  denied  { bpf } for  pid=3129 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:08.085000 audit[3129]: AVC avc:  denied  { bpf } for  pid=3129 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:08.085000 audit[3129]: AVC avc:  denied  { perfmon } for  pid=3129 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:08.085000 audit[3129]: AVC avc:  denied  { perfmon } for  pid=3129 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:08.085000 audit[3129]: AVC avc:  denied  { perfmon } for  pid=3129 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:08.085000 audit[3129]: AVC avc:  denied  { perfmon } for  pid=3129 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:08.085000 audit[3129]: AVC avc:  denied  { perfmon } for  pid=3129 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:08.085000 audit[3129]: AVC avc:  denied  { bpf } for  pid=3129 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:08.085000 audit[3129]: AVC avc:  denied  { bpf } for  pid=3129 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:08.085000 audit: BPF prog-id=137 op=LOAD
Oct  2 21:33:08.085000 audit[3129]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c0001f36e8 items=0 ppid=3045 pid=3129 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:33:08.085000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335336466626466323334623837376362643235643634373731303837
Oct  2 21:33:08.213000 audit: BPF prog-id=137 op=UNLOAD
Oct  2 21:33:08.213000 audit: BPF prog-id=136 op=UNLOAD
Oct  2 21:33:08.213000 audit[3129]: AVC avc:  denied  { bpf } for  pid=3129 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:08.213000 audit[3129]: AVC avc:  denied  { bpf } for  pid=3129 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:08.213000 audit[3129]: AVC avc:  denied  { bpf } for  pid=3129 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:08.213000 audit[3129]: AVC avc:  denied  { perfmon } for  pid=3129 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:08.213000 audit[3129]: AVC avc:  denied  { perfmon } for  pid=3129 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:08.213000 audit[3129]: AVC avc:  denied  { perfmon } for  pid=3129 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:08.213000 audit[3129]: AVC avc:  denied  { perfmon } for  pid=3129 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:08.213000 audit[3129]: AVC avc:  denied  { perfmon } for  pid=3129 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:08.213000 audit[3129]: AVC avc:  denied  { bpf } for  pid=3129 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:08.213000 audit[3129]: AVC avc:  denied  { bpf } for  pid=3129 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:08.213000 audit: BPF prog-id=138 op=LOAD
Oct  2 21:33:08.213000 audit[3129]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c0001f3af8 items=0 ppid=3045 pid=3129 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:33:08.213000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335336466626466323334623837376362643235643634373731303837
Oct  2 21:33:08.495047 env[1455]: time="2023-10-02T21:33:08.495018225Z" level=info msg="StartContainer for \"c53dfbdf234b877cbd25d64771087c4e87b6c46942487da8fa03b23629ec9aa5\" returns successfully"
Oct  2 21:33:08.886599 kubelet[2553]: I1002 21:33:08.886516    2553 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-typha-76fc48b76-qkmm7" podStartSLOduration=2.521953254 podCreationTimestamp="2023-10-02 21:33:03 +0000 UTC" firstStartedPulling="2023-10-02 21:33:04.407088108 +0000 UTC m=+20.669704963" lastFinishedPulling="2023-10-02 21:33:07.771538083 +0000 UTC m=+24.034154935" observedRunningTime="2023-10-02 21:33:08.885341721 +0000 UTC m=+25.147958638" watchObservedRunningTime="2023-10-02 21:33:08.886403226 +0000 UTC m=+25.149020124"
Oct  2 21:33:08.921000 audit[3174]: NETFILTER_CFG table=filter:95 family=2 entries=15 op=nft_register_rule pid=3174 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Oct  2 21:33:08.921000 audit[3174]: SYSCALL arch=c000003e syscall=46 success=yes exit=4956 a0=3 a1=7ffcf91189b0 a2=0 a3=7ffcf911899c items=0 ppid=2801 pid=3174 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:33:08.921000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Oct  2 21:33:08.937828 kubelet[2553]: E1002 21:33:08.937775    2553 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 21:33:08.937828 kubelet[2553]: W1002 21:33:08.937819    2553 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 21:33:08.938199 kubelet[2553]: E1002 21:33:08.937879    2553 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 21:33:08.938417 kubelet[2553]: E1002 21:33:08.938383    2553 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 21:33:08.938610 kubelet[2553]: W1002 21:33:08.938413    2553 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 21:33:08.938610 kubelet[2553]: E1002 21:33:08.938498    2553 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 21:33:08.938952 kubelet[2553]: E1002 21:33:08.938918    2553 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 21:33:08.939121 kubelet[2553]: W1002 21:33:08.938952    2553 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 21:33:08.939121 kubelet[2553]: E1002 21:33:08.939001    2553 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 21:33:08.939451 kubelet[2553]: E1002 21:33:08.939407    2553 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 21:33:08.939625 kubelet[2553]: W1002 21:33:08.939437    2553 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 21:33:08.939625 kubelet[2553]: E1002 21:33:08.939519    2553 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 21:33:08.940033 kubelet[2553]: E1002 21:33:08.939997    2553 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 21:33:08.940033 kubelet[2553]: W1002 21:33:08.940025    2553 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 21:33:08.940343 kubelet[2553]: E1002 21:33:08.940072    2553 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 21:33:08.940516 kubelet[2553]: E1002 21:33:08.940478    2553 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 21:33:08.940516 kubelet[2553]: W1002 21:33:08.940507    2553 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 21:33:08.940836 kubelet[2553]: E1002 21:33:08.940551    2553 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 21:33:08.941043 kubelet[2553]: E1002 21:33:08.941008    2553 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 21:33:08.941043 kubelet[2553]: W1002 21:33:08.941034    2553 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 21:33:08.941354 kubelet[2553]: E1002 21:33:08.941083    2553 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 21:33:08.941542 kubelet[2553]: E1002 21:33:08.941493    2553 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 21:33:08.941542 kubelet[2553]: W1002 21:33:08.941523    2553 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 21:33:08.941856 kubelet[2553]: E1002 21:33:08.941567    2553 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 21:33:08.942088 kubelet[2553]: E1002 21:33:08.942052    2553 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 21:33:08.942088 kubelet[2553]: W1002 21:33:08.942079    2553 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 21:33:08.942387 kubelet[2553]: E1002 21:33:08.942122    2553 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 21:33:08.942628 kubelet[2553]: E1002 21:33:08.942592    2553 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 21:33:08.942628 kubelet[2553]: W1002 21:33:08.942621    2553 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 21:33:08.942954 kubelet[2553]: E1002 21:33:08.942666    2553 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 21:33:08.943115 kubelet[2553]: E1002 21:33:08.943077    2553 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 21:33:08.943115 kubelet[2553]: W1002 21:33:08.943108    2553 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 21:33:08.943415 kubelet[2553]: E1002 21:33:08.943154    2553 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 21:33:08.943632 kubelet[2553]: E1002 21:33:08.943597    2553 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 21:33:08.943801 kubelet[2553]: W1002 21:33:08.943630    2553 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 21:33:08.943801 kubelet[2553]: E1002 21:33:08.943675    2553 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 21:33:08.944155 kubelet[2553]: E1002 21:33:08.944123    2553 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 21:33:08.944155 kubelet[2553]: W1002 21:33:08.944152    2553 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 21:33:08.942000 audit[3174]: NETFILTER_CFG table=nat:96 family=2 entries=19 op=nft_register_chain pid=3174 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Oct  2 21:33:08.942000 audit[3174]: SYSCALL arch=c000003e syscall=46 success=yes exit=6068 a0=3 a1=7ffcf91189b0 a2=0 a3=7ffcf911899c items=0 ppid=2801 pid=3174 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:33:08.942000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Oct  2 21:33:08.945113 kubelet[2553]: E1002 21:33:08.944199    2553 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 21:33:08.945113 kubelet[2553]: E1002 21:33:08.944636    2553 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 21:33:08.945113 kubelet[2553]: W1002 21:33:08.944667    2553 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 21:33:08.945113 kubelet[2553]: E1002 21:33:08.944714    2553 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 21:33:08.945113 kubelet[2553]: E1002 21:33:08.945108    2553 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 21:33:08.945873 kubelet[2553]: W1002 21:33:08.945138    2553 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 21:33:08.945873 kubelet[2553]: E1002 21:33:08.945185    2553 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 21:33:08.945873 kubelet[2553]: E1002 21:33:08.945779    2553 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 21:33:08.945873 kubelet[2553]: W1002 21:33:08.945810    2553 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 21:33:08.945873 kubelet[2553]: E1002 21:33:08.945855    2553 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 21:33:08.946632 kubelet[2553]: E1002 21:33:08.946373    2553 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 21:33:08.946632 kubelet[2553]: W1002 21:33:08.946403    2553 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 21:33:08.946632 kubelet[2553]: E1002 21:33:08.946548    2553 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 21:33:08.947067 kubelet[2553]: E1002 21:33:08.947026    2553 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 21:33:08.947188 kubelet[2553]: W1002 21:33:08.947067    2553 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 21:33:08.947188 kubelet[2553]: E1002 21:33:08.947132    2553 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 21:33:08.947690 kubelet[2553]: E1002 21:33:08.947657    2553 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 21:33:08.947800 kubelet[2553]: W1002 21:33:08.947688    2553 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 21:33:08.947800 kubelet[2553]: E1002 21:33:08.947743    2553 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 21:33:08.948316 kubelet[2553]: E1002 21:33:08.948285    2553 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 21:33:08.948435 kubelet[2553]: W1002 21:33:08.948317    2553 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 21:33:08.948558 kubelet[2553]: E1002 21:33:08.948424    2553 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 21:33:08.948884 kubelet[2553]: E1002 21:33:08.948854    2553 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 21:33:08.948999 kubelet[2553]: W1002 21:33:08.948885    2553 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 21:33:08.948999 kubelet[2553]: E1002 21:33:08.948977    2553 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 21:33:08.949452 kubelet[2553]: E1002 21:33:08.949414    2553 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 21:33:08.949578 kubelet[2553]: W1002 21:33:08.949456    2553 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 21:33:08.949578 kubelet[2553]: E1002 21:33:08.949544    2553 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 21:33:08.950099 kubelet[2553]: E1002 21:33:08.950024    2553 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 21:33:08.950099 kubelet[2553]: W1002 21:33:08.950055    2553 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 21:33:08.950419 kubelet[2553]: E1002 21:33:08.950110    2553 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 21:33:08.950736 kubelet[2553]: E1002 21:33:08.950659    2553 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 21:33:08.950736 kubelet[2553]: W1002 21:33:08.950692    2553 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 21:33:08.951023 kubelet[2553]: E1002 21:33:08.950745    2553 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 21:33:08.951274 kubelet[2553]: E1002 21:33:08.951217    2553 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 21:33:08.951274 kubelet[2553]: W1002 21:33:08.951248    2553 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 21:33:08.951554 kubelet[2553]: E1002 21:33:08.951339    2553 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 21:33:08.951868 kubelet[2553]: E1002 21:33:08.951783    2553 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 21:33:08.951868 kubelet[2553]: W1002 21:33:08.951815    2553 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 21:33:08.952148 kubelet[2553]: E1002 21:33:08.951941    2553 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 21:33:08.952319 kubelet[2553]: E1002 21:33:08.952291    2553 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 21:33:08.952319 kubelet[2553]: W1002 21:33:08.952317    2553 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 21:33:08.952599 kubelet[2553]: E1002 21:33:08.952383    2553 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 21:33:08.952958 kubelet[2553]: E1002 21:33:08.952883    2553 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 21:33:08.952958 kubelet[2553]: W1002 21:33:08.952914    2553 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 21:33:08.952958 kubelet[2553]: E1002 21:33:08.952959    2553 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 21:33:08.953520 kubelet[2553]: E1002 21:33:08.953482    2553 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 21:33:08.953520 kubelet[2553]: W1002 21:33:08.953508    2553 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 21:33:08.953800 kubelet[2553]: E1002 21:33:08.953598    2553 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 21:33:08.954062 kubelet[2553]: E1002 21:33:08.954010    2553 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 21:33:08.954062 kubelet[2553]: W1002 21:33:08.954045    2553 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 21:33:08.954296 kubelet[2553]: E1002 21:33:08.954097    2553 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 21:33:08.954667 kubelet[2553]: E1002 21:33:08.954627    2553 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 21:33:08.954667 kubelet[2553]: W1002 21:33:08.954651    2553 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 21:33:08.954973 kubelet[2553]: E1002 21:33:08.954696    2553 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 21:33:08.955265 kubelet[2553]: E1002 21:33:08.955237    2553 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 21:33:08.955387 kubelet[2553]: W1002 21:33:08.955266    2553 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 21:33:08.955387 kubelet[2553]: E1002 21:33:08.955317    2553 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 21:33:08.955914 kubelet[2553]: E1002 21:33:08.955872    2553 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 21:33:08.955914 kubelet[2553]: W1002 21:33:08.955904    2553 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 21:33:08.956206 kubelet[2553]: E1002 21:33:08.955942    2553 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 21:33:09.275521 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3152780885.mount: Deactivated successfully.
Oct  2 21:33:09.953315 kubelet[2553]: E1002 21:33:09.953233    2553 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 21:33:09.953315 kubelet[2553]: W1002 21:33:09.953272    2553 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 21:33:09.953315 kubelet[2553]: E1002 21:33:09.953318    2553 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 21:33:09.954229 kubelet[2553]: E1002 21:33:09.953792    2553 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 21:33:09.954229 kubelet[2553]: W1002 21:33:09.953821    2553 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 21:33:09.954229 kubelet[2553]: E1002 21:33:09.953864    2553 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 21:33:09.954524 kubelet[2553]: E1002 21:33:09.954341    2553 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 21:33:09.954524 kubelet[2553]: W1002 21:33:09.954369    2553 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 21:33:09.954524 kubelet[2553]: E1002 21:33:09.954405    2553 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 21:33:09.954985 kubelet[2553]: E1002 21:33:09.954911    2553 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 21:33:09.954985 kubelet[2553]: W1002 21:33:09.954942    2553 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 21:33:09.954985 kubelet[2553]: E1002 21:33:09.954978    2553 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 21:33:09.955554 kubelet[2553]: E1002 21:33:09.955462    2553 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 21:33:09.955554 kubelet[2553]: W1002 21:33:09.955507    2553 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 21:33:09.955554 kubelet[2553]: E1002 21:33:09.955530    2553 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 21:33:09.955931 kubelet[2553]: E1002 21:33:09.955866    2553 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 21:33:09.955931 kubelet[2553]: W1002 21:33:09.955888    2553 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 21:33:09.955931 kubelet[2553]: E1002 21:33:09.955914    2553 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 21:33:09.956312 kubelet[2553]: E1002 21:33:09.956260    2553 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 21:33:09.956312 kubelet[2553]: W1002 21:33:09.956279    2553 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 21:33:09.956312 kubelet[2553]: E1002 21:33:09.956303    2553 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 21:33:09.956703 kubelet[2553]: E1002 21:33:09.956641    2553 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 21:33:09.956703 kubelet[2553]: W1002 21:33:09.956664    2553 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 21:33:09.956703 kubelet[2553]: E1002 21:33:09.956690    2553 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 21:33:09.957126 kubelet[2553]: E1002 21:33:09.957068    2553 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 21:33:09.957126 kubelet[2553]: W1002 21:33:09.957089    2553 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 21:33:09.957126 kubelet[2553]: E1002 21:33:09.957115    2553 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 21:33:09.957450 kubelet[2553]: E1002 21:33:09.957423    2553 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 21:33:09.957450 kubelet[2553]: W1002 21:33:09.957448    2553 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 21:33:09.957611 kubelet[2553]: E1002 21:33:09.957472    2553 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 21:33:09.957866 kubelet[2553]: E1002 21:33:09.957808    2553 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 21:33:09.957866 kubelet[2553]: W1002 21:33:09.957829    2553 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 21:33:09.957866 kubelet[2553]: E1002 21:33:09.957855    2553 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 21:33:09.958248 kubelet[2553]: E1002 21:33:09.958204    2553 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 21:33:09.958248 kubelet[2553]: W1002 21:33:09.958222    2553 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 21:33:09.958415 kubelet[2553]: E1002 21:33:09.958255    2553 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 21:33:09.958650 kubelet[2553]: E1002 21:33:09.958624    2553 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 21:33:09.958650 kubelet[2553]: W1002 21:33:09.958645    2553 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 21:33:09.958876 kubelet[2553]: E1002 21:33:09.958672    2553 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 21:33:09.959002 kubelet[2553]: E1002 21:33:09.958983    2553 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 21:33:09.959002 kubelet[2553]: W1002 21:33:09.958999    2553 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 21:33:09.959130 kubelet[2553]: E1002 21:33:09.959022    2553 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 21:33:09.959290 kubelet[2553]: E1002 21:33:09.959272    2553 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 21:33:09.959290 kubelet[2553]: W1002 21:33:09.959288    2553 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 21:33:09.959431 kubelet[2553]: E1002 21:33:09.959308    2553 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 21:33:09.959691 kubelet[2553]: E1002 21:33:09.959673    2553 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 21:33:09.959691 kubelet[2553]: W1002 21:33:09.959689    2553 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 21:33:09.959822 kubelet[2553]: E1002 21:33:09.959711    2553 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 21:33:09.960049 kubelet[2553]: E1002 21:33:09.960029    2553 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 21:33:09.960049 kubelet[2553]: W1002 21:33:09.960046    2553 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 21:33:09.960271 kubelet[2553]: E1002 21:33:09.960073    2553 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 21:33:09.960457 kubelet[2553]: E1002 21:33:09.960421    2553 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 21:33:09.960542 kubelet[2553]: W1002 21:33:09.960463    2553 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 21:33:09.960542 kubelet[2553]: E1002 21:33:09.960502    2553 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 21:33:09.960788 kubelet[2553]: E1002 21:33:09.960775    2553 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 21:33:09.960849 kubelet[2553]: W1002 21:33:09.960788    2553 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 21:33:09.960849 kubelet[2553]: E1002 21:33:09.960808    2553 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 21:33:09.961048 kubelet[2553]: E1002 21:33:09.961032    2553 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 21:33:09.961048 kubelet[2553]: W1002 21:33:09.961045    2553 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 21:33:09.961223 kubelet[2553]: E1002 21:33:09.961064    2553 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 21:33:09.961324 kubelet[2553]: E1002 21:33:09.961308    2553 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 21:33:09.961324 kubelet[2553]: W1002 21:33:09.961320    2553 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 21:33:09.961519 kubelet[2553]: E1002 21:33:09.961347    2553 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 21:33:09.961519 kubelet[2553]: E1002 21:33:09.961516    2553 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 21:33:09.961674 kubelet[2553]: W1002 21:33:09.961527    2553 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 21:33:09.961674 kubelet[2553]: E1002 21:33:09.961552    2553 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 21:33:09.961822 kubelet[2553]: E1002 21:33:09.961803    2553 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 21:33:09.961822 kubelet[2553]: W1002 21:33:09.961820    2553 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 21:33:09.961941 kubelet[2553]: E1002 21:33:09.961858    2553 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 21:33:09.962099 kubelet[2553]: E1002 21:33:09.962080    2553 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 21:33:09.962099 kubelet[2553]: W1002 21:33:09.962097    2553 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 21:33:09.962263 kubelet[2553]: E1002 21:33:09.962122    2553 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 21:33:09.962355 kubelet[2553]: E1002 21:33:09.962340    2553 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 21:33:09.962355 kubelet[2553]: W1002 21:33:09.962352    2553 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 21:33:09.962550 kubelet[2553]: E1002 21:33:09.962372    2553 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 21:33:09.962654 kubelet[2553]: E1002 21:33:09.962606    2553 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 21:33:09.962654 kubelet[2553]: W1002 21:33:09.962617    2553 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 21:33:09.962654 kubelet[2553]: E1002 21:33:09.962636    2553 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 21:33:09.962921 kubelet[2553]: E1002 21:33:09.962898    2553 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 21:33:09.962921 kubelet[2553]: W1002 21:33:09.962919    2553 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 21:33:09.963103 kubelet[2553]: E1002 21:33:09.962944    2553 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 21:33:09.963230 kubelet[2553]: E1002 21:33:09.963215    2553 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 21:33:09.963230 kubelet[2553]: W1002 21:33:09.963228    2553 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 21:33:09.963409 kubelet[2553]: E1002 21:33:09.963273    2553 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 21:33:09.963514 kubelet[2553]: E1002 21:33:09.963428    2553 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 21:33:09.963514 kubelet[2553]: W1002 21:33:09.963449    2553 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 21:33:09.963514 kubelet[2553]: E1002 21:33:09.963471    2553 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 21:33:09.963758 kubelet[2553]: E1002 21:33:09.963739    2553 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 21:33:09.963758 kubelet[2553]: W1002 21:33:09.963756    2553 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 21:33:09.963873 kubelet[2553]: E1002 21:33:09.963779    2553 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 21:33:09.964090 kubelet[2553]: E1002 21:33:09.964075    2553 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 21:33:09.964146 kubelet[2553]: W1002 21:33:09.964090    2553 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 21:33:09.964146 kubelet[2553]: E1002 21:33:09.964112    2553 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 21:33:09.964473 kubelet[2553]: E1002 21:33:09.964436    2553 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 21:33:09.964473 kubelet[2553]: W1002 21:33:09.964467    2553 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 21:33:09.964586 kubelet[2553]: E1002 21:33:09.964489    2553 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 21:33:09.964856 kubelet[2553]: E1002 21:33:09.964817    2553 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 21:33:09.964856 kubelet[2553]: W1002 21:33:09.964835    2553 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 21:33:09.964856 kubelet[2553]: E1002 21:33:09.964856    2553 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 21:33:10.966667 kubelet[2553]: E1002 21:33:10.966607    2553 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 21:33:10.966667 kubelet[2553]: W1002 21:33:10.966648    2553 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 21:33:10.967571 kubelet[2553]: E1002 21:33:10.966702    2553 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 21:33:10.967571 kubelet[2553]: E1002 21:33:10.967192    2553 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 21:33:10.967571 kubelet[2553]: W1002 21:33:10.967221    2553 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 21:33:10.967571 kubelet[2553]: E1002 21:33:10.967260    2553 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 21:33:10.968015 kubelet[2553]: E1002 21:33:10.967768    2553 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 21:33:10.968015 kubelet[2553]: W1002 21:33:10.967798    2553 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 21:33:10.968015 kubelet[2553]: E1002 21:33:10.967834    2553 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 21:33:10.968311 kubelet[2553]: E1002 21:33:10.968279    2553 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 21:33:10.968311 kubelet[2553]: W1002 21:33:10.968302    2553 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 21:33:10.968548 kubelet[2553]: E1002 21:33:10.968334    2553 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 21:33:10.968937 kubelet[2553]: E1002 21:33:10.968894    2553 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 21:33:10.968937 kubelet[2553]: W1002 21:33:10.968924    2553 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 21:33:10.969233 kubelet[2553]: E1002 21:33:10.968961    2553 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 21:33:10.969532 kubelet[2553]: E1002 21:33:10.969429    2553 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 21:33:10.969532 kubelet[2553]: W1002 21:33:10.969484    2553 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 21:33:10.969532 kubelet[2553]: E1002 21:33:10.969523    2553 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 21:33:10.970067 kubelet[2553]: E1002 21:33:10.969975    2553 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 21:33:10.970067 kubelet[2553]: W1002 21:33:10.970006    2553 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 21:33:10.970067 kubelet[2553]: E1002 21:33:10.970041    2553 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 21:33:10.970539 kubelet[2553]: E1002 21:33:10.970497    2553 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 21:33:10.970539 kubelet[2553]: W1002 21:33:10.970520    2553 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 21:33:10.970819 kubelet[2553]: E1002 21:33:10.970551    2553 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 21:33:10.971137 kubelet[2553]: E1002 21:33:10.971071    2553 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 21:33:10.971137 kubelet[2553]: W1002 21:33:10.971104    2553 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 21:33:10.971137 kubelet[2553]: E1002 21:33:10.971140    2553 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 21:33:10.971706 kubelet[2553]: E1002 21:33:10.971663    2553 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 21:33:10.971706 kubelet[2553]: W1002 21:33:10.971694    2553 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 21:33:10.972031 kubelet[2553]: E1002 21:33:10.971745    2553 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 21:33:10.972262 kubelet[2553]: E1002 21:33:10.972230    2553 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 21:33:10.972393 kubelet[2553]: W1002 21:33:10.972261    2553 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 21:33:10.972393 kubelet[2553]: E1002 21:33:10.972295    2553 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 21:33:10.972811 kubelet[2553]: E1002 21:33:10.972769    2553 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 21:33:10.972811 kubelet[2553]: W1002 21:33:10.972800    2553 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 21:33:10.973169 kubelet[2553]: E1002 21:33:10.972837    2553 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 21:33:10.973306 kubelet[2553]: E1002 21:33:10.973280    2553 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 21:33:10.973306 kubelet[2553]: W1002 21:33:10.973303    2553 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 21:33:10.973545 kubelet[2553]: E1002 21:33:10.973335    2553 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 21:33:10.973864 kubelet[2553]: E1002 21:33:10.973830    2553 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 21:33:10.974016 kubelet[2553]: W1002 21:33:10.973864    2553 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 21:33:10.974016 kubelet[2553]: E1002 21:33:10.973916    2553 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 21:33:10.974428 kubelet[2553]: E1002 21:33:10.974398    2553 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 21:33:10.974600 kubelet[2553]: W1002 21:33:10.974433    2553 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 21:33:10.974600 kubelet[2553]: E1002 21:33:10.974499    2553 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 21:33:10.975116 kubelet[2553]: E1002 21:33:10.975052    2553 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 21:33:10.975116 kubelet[2553]: W1002 21:33:10.975084    2553 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 21:33:10.975406 kubelet[2553]: E1002 21:33:10.975139    2553 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 21:33:10.975753 kubelet[2553]: E1002 21:33:10.975669    2553 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 21:33:10.975753 kubelet[2553]: W1002 21:33:10.975701    2553 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 21:33:10.975753 kubelet[2553]: E1002 21:33:10.975755    2553 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 21:33:10.976295 kubelet[2553]: E1002 21:33:10.976267    2553 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 21:33:10.976477 kubelet[2553]: W1002 21:33:10.976297    2553 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 21:33:10.976477 kubelet[2553]: E1002 21:33:10.976353    2553 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 21:33:10.976915 kubelet[2553]: E1002 21:33:10.976879    2553 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 21:33:10.976915 kubelet[2553]: W1002 21:33:10.976914    2553 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 21:33:10.977160 kubelet[2553]: E1002 21:33:10.976963    2553 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 21:33:10.977464 kubelet[2553]: E1002 21:33:10.977419    2553 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 21:33:10.977610 kubelet[2553]: W1002 21:33:10.977470    2553 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 21:33:10.977610 kubelet[2553]: E1002 21:33:10.977559    2553 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 21:33:10.977982 kubelet[2553]: E1002 21:33:10.977950    2553 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 21:33:10.977982 kubelet[2553]: W1002 21:33:10.977980    2553 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 21:33:10.978198 kubelet[2553]: E1002 21:33:10.978095    2553 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 21:33:10.978459 kubelet[2553]: E1002 21:33:10.978417    2553 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 21:33:10.978591 kubelet[2553]: W1002 21:33:10.978467    2553 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 21:33:10.978693 kubelet[2553]: E1002 21:33:10.978593    2553 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 21:33:10.978927 kubelet[2553]: E1002 21:33:10.978886    2553 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 21:33:10.978927 kubelet[2553]: W1002 21:33:10.978917    2553 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 21:33:10.979137 kubelet[2553]: E1002 21:33:10.978967    2553 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 21:33:10.979480 kubelet[2553]: E1002 21:33:10.979429    2553 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 21:33:10.979615 kubelet[2553]: W1002 21:33:10.979481    2553 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 21:33:10.979615 kubelet[2553]: E1002 21:33:10.979532    2553 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 21:33:10.980129 kubelet[2553]: E1002 21:33:10.980074    2553 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 21:33:10.980129 kubelet[2553]: W1002 21:33:10.980105    2553 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 21:33:10.980349 kubelet[2553]: E1002 21:33:10.980147    2553 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 21:33:10.980544 kubelet[2553]: E1002 21:33:10.980502    2553 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 21:33:10.980544 kubelet[2553]: W1002 21:33:10.980526    2553 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 21:33:10.980786 kubelet[2553]: E1002 21:33:10.980602    2553 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 21:33:10.980968 kubelet[2553]: E1002 21:33:10.980925    2553 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 21:33:10.980968 kubelet[2553]: W1002 21:33:10.980949    2553 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 21:33:10.981188 kubelet[2553]: E1002 21:33:10.981016    2553 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 21:33:10.981307 kubelet[2553]: E1002 21:33:10.981283    2553 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 21:33:10.981307 kubelet[2553]: W1002 21:33:10.981305    2553 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 21:33:10.981523 kubelet[2553]: E1002 21:33:10.981368    2553 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 21:33:10.981724 kubelet[2553]: E1002 21:33:10.981693    2553 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 21:33:10.981824 kubelet[2553]: W1002 21:33:10.981725    2553 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 21:33:10.981824 kubelet[2553]: E1002 21:33:10.981770    2553 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 21:33:10.982271 kubelet[2553]: E1002 21:33:10.982243    2553 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 21:33:10.982384 kubelet[2553]: W1002 21:33:10.982275    2553 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 21:33:10.982384 kubelet[2553]: E1002 21:33:10.982326    2553 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 21:33:10.982927 kubelet[2553]: E1002 21:33:10.982840    2553 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 21:33:10.982927 kubelet[2553]: W1002 21:33:10.982871    2553 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 21:33:10.982927 kubelet[2553]: E1002 21:33:10.982923    2553 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 21:33:10.983547 kubelet[2553]: E1002 21:33:10.983468    2553 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 21:33:10.983547 kubelet[2553]: W1002 21:33:10.983498    2553 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 21:33:10.983547 kubelet[2553]: E1002 21:33:10.983539    2553 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 21:33:10.984082 kubelet[2553]: E1002 21:33:10.984029    2553 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Oct  2 21:33:10.984082 kubelet[2553]: W1002 21:33:10.984060    2553 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Oct  2 21:33:10.984292 kubelet[2553]: E1002 21:33:10.984098    2553 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Oct  2 21:33:11.054179 env[1455]: time="2023-10-02T21:33:11.054156377Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 21:33:11.054789 env[1455]: time="2023-10-02T21:33:11.054778155Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ed8b7bbb113fecfcce8e15c7d7232b3fe31ed6f37b04df455f6a3f2bc8695d72,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 21:33:11.056246 env[1455]: time="2023-10-02T21:33:11.056231753Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 21:33:11.057231 env[1455]: time="2023-10-02T21:33:11.057204433Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:182a323c25a3503be8c504892a12a55d99a42c3a582cb8e93a1ecc7c193a44c5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 21:33:11.057783 env[1455]: time="2023-10-02T21:33:11.057740055Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.25.0\" returns image reference \"sha256:ed8b7bbb113fecfcce8e15c7d7232b3fe31ed6f37b04df455f6a3f2bc8695d72\""
Oct  2 21:33:11.059101 env[1455]: time="2023-10-02T21:33:11.059086453Z" level=info msg="CreateContainer within sandbox \"e91b4a181c8f1a61bd7de2868a1418af7125973295601cdf6a5ce3ba60b19121\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}"
Oct  2 21:33:11.064219 env[1455]: time="2023-10-02T21:33:11.064177988Z" level=info msg="CreateContainer within sandbox \"e91b4a181c8f1a61bd7de2868a1418af7125973295601cdf6a5ce3ba60b19121\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"537d4c4c9f2cd7064f40f88c123a8fbad6877c97def5600b218062cb564f2656\""
Oct  2 21:33:11.064418 env[1455]: time="2023-10-02T21:33:11.064407301Z" level=info msg="StartContainer for \"537d4c4c9f2cd7064f40f88c123a8fbad6877c97def5600b218062cb564f2656\""
Oct  2 21:33:11.099497 systemd[1]: Started cri-containerd-537d4c4c9f2cd7064f40f88c123a8fbad6877c97def5600b218062cb564f2656.scope.
Oct  2 21:33:11.130000 audit[3281]: AVC avc:  denied  { perfmon } for  pid=3281 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:11.130000 audit[3281]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3087 pid=3281 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:33:11.130000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3533376434633463396632636437303634663430663838633132336138
Oct  2 21:33:11.130000 audit[3281]: AVC avc:  denied  { bpf } for  pid=3281 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:11.130000 audit[3281]: AVC avc:  denied  { bpf } for  pid=3281 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:11.130000 audit[3281]: AVC avc:  denied  { bpf } for  pid=3281 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:11.130000 audit[3281]: AVC avc:  denied  { perfmon } for  pid=3281 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:11.130000 audit[3281]: AVC avc:  denied  { perfmon } for  pid=3281 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:11.130000 audit[3281]: AVC avc:  denied  { perfmon } for  pid=3281 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:11.130000 audit[3281]: AVC avc:  denied  { perfmon } for  pid=3281 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:11.130000 audit[3281]: AVC avc:  denied  { perfmon } for  pid=3281 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:11.130000 audit[3281]: AVC avc:  denied  { bpf } for  pid=3281 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:11.130000 audit[3281]: AVC avc:  denied  { bpf } for  pid=3281 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:11.130000 audit: BPF prog-id=139 op=LOAD
Oct  2 21:33:11.130000 audit[3281]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c00030ac60 items=0 ppid=3087 pid=3281 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:33:11.130000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3533376434633463396632636437303634663430663838633132336138
Oct  2 21:33:11.130000 audit[3281]: AVC avc:  denied  { bpf } for  pid=3281 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:11.130000 audit[3281]: AVC avc:  denied  { bpf } for  pid=3281 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:11.130000 audit[3281]: AVC avc:  denied  { perfmon } for  pid=3281 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:11.130000 audit[3281]: AVC avc:  denied  { perfmon } for  pid=3281 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:11.130000 audit[3281]: AVC avc:  denied  { perfmon } for  pid=3281 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:11.130000 audit[3281]: AVC avc:  denied  { perfmon } for  pid=3281 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:11.130000 audit[3281]: AVC avc:  denied  { perfmon } for  pid=3281 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:11.130000 audit[3281]: AVC avc:  denied  { bpf } for  pid=3281 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:11.130000 audit[3281]: AVC avc:  denied  { bpf } for  pid=3281 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:11.130000 audit: BPF prog-id=140 op=LOAD
Oct  2 21:33:11.130000 audit[3281]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c00030aca8 items=0 ppid=3087 pid=3281 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:33:11.130000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3533376434633463396632636437303634663430663838633132336138
Oct  2 21:33:11.131000 audit: BPF prog-id=140 op=UNLOAD
Oct  2 21:33:11.131000 audit: BPF prog-id=139 op=UNLOAD
Oct  2 21:33:11.131000 audit[3281]: AVC avc:  denied  { bpf } for  pid=3281 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:11.131000 audit[3281]: AVC avc:  denied  { bpf } for  pid=3281 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:11.131000 audit[3281]: AVC avc:  denied  { bpf } for  pid=3281 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:11.131000 audit[3281]: AVC avc:  denied  { perfmon } for  pid=3281 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:11.131000 audit[3281]: AVC avc:  denied  { perfmon } for  pid=3281 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:11.131000 audit[3281]: AVC avc:  denied  { perfmon } for  pid=3281 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:11.131000 audit[3281]: AVC avc:  denied  { perfmon } for  pid=3281 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:11.131000 audit[3281]: AVC avc:  denied  { perfmon } for  pid=3281 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:11.131000 audit[3281]: AVC avc:  denied  { bpf } for  pid=3281 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:11.131000 audit[3281]: AVC avc:  denied  { bpf } for  pid=3281 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:11.131000 audit: BPF prog-id=141 op=LOAD
Oct  2 21:33:11.131000 audit[3281]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c00030ad38 items=0 ppid=3087 pid=3281 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:33:11.131000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3533376434633463396632636437303634663430663838633132336138
Oct  2 21:33:11.180096 env[1455]: time="2023-10-02T21:33:11.179998973Z" level=info msg="StartContainer for \"537d4c4c9f2cd7064f40f88c123a8fbad6877c97def5600b218062cb564f2656\" returns successfully"
Oct  2 21:33:11.198409 systemd[1]: cri-containerd-537d4c4c9f2cd7064f40f88c123a8fbad6877c97def5600b218062cb564f2656.scope: Deactivated successfully.
Oct  2 21:33:11.212000 audit: BPF prog-id=141 op=UNLOAD
Oct  2 21:33:11.249604 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-537d4c4c9f2cd7064f40f88c123a8fbad6877c97def5600b218062cb564f2656-rootfs.mount: Deactivated successfully.
Oct  2 21:33:11.638065 env[1455]: time="2023-10-02T21:33:11.637814406Z" level=info msg="shim disconnected" id=537d4c4c9f2cd7064f40f88c123a8fbad6877c97def5600b218062cb564f2656
Oct  2 21:33:11.638065 env[1455]: time="2023-10-02T21:33:11.637924782Z" level=warning msg="cleaning up after shim disconnected" id=537d4c4c9f2cd7064f40f88c123a8fbad6877c97def5600b218062cb564f2656 namespace=k8s.io
Oct  2 21:33:11.638065 env[1455]: time="2023-10-02T21:33:11.637955069Z" level=info msg="cleaning up dead shim"
Oct  2 21:33:11.646939 env[1455]: time="2023-10-02T21:33:11.646883370Z" level=warning msg="cleanup warnings time=\"2023-10-02T21:33:11Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3320 runtime=io.containerd.runc.v2\n"
Oct  2 21:33:11.879906 env[1455]: time="2023-10-02T21:33:11.879783535Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.25.0\""
Oct  2 21:33:13.395838 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3005768326.mount: Deactivated successfully.
Oct  2 21:33:16.454906 env[1455]: time="2023-10-02T21:33:16.454883150Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 21:33:16.455482 env[1455]: time="2023-10-02T21:33:16.455469872Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d70a5947d57e5ab3340d126a38e6ae51bd9e8e0b342daa2012e78d8868bed5b7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 21:33:16.456663 env[1455]: time="2023-10-02T21:33:16.456649474Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 21:33:16.457431 env[1455]: time="2023-10-02T21:33:16.457418795Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:34bf454be8cd5b9a35ab29c2479ff68a26497c2c87eb606e4bfe57c7fbeeff35,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 21:33:16.457915 env[1455]: time="2023-10-02T21:33:16.457901309Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.25.0\" returns image reference \"sha256:d70a5947d57e5ab3340d126a38e6ae51bd9e8e0b342daa2012e78d8868bed5b7\""
Oct  2 21:33:16.458990 env[1455]: time="2023-10-02T21:33:16.458920871Z" level=info msg="CreateContainer within sandbox \"e91b4a181c8f1a61bd7de2868a1418af7125973295601cdf6a5ce3ba60b19121\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}"
Oct  2 21:33:16.464635 env[1455]: time="2023-10-02T21:33:16.464617813Z" level=info msg="CreateContainer within sandbox \"e91b4a181c8f1a61bd7de2868a1418af7125973295601cdf6a5ce3ba60b19121\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"aefada51d9cfa812d96e0c9c5b011ce3e32b7e4bacdf7a3065fe79ca56d004a5\""
Oct  2 21:33:16.464988 env[1455]: time="2023-10-02T21:33:16.464936654Z" level=info msg="StartContainer for \"aefada51d9cfa812d96e0c9c5b011ce3e32b7e4bacdf7a3065fe79ca56d004a5\""
Oct  2 21:33:16.494628 systemd[1]: Started cri-containerd-aefada51d9cfa812d96e0c9c5b011ce3e32b7e4bacdf7a3065fe79ca56d004a5.scope.
Oct  2 21:33:16.500000 audit[3346]: AVC avc:  denied  { perfmon } for  pid=3346 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:16.529388 kernel: kauditd_printk_skb: 97 callbacks suppressed
Oct  2 21:33:16.529464 kernel: audit: type=1400 audit(1696282396.500:1133): avc:  denied  { perfmon } for  pid=3346 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:16.500000 audit[3346]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3087 pid=3346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:33:16.690030 kernel: audit: type=1300 audit(1696282396.500:1133): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3087 pid=3346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:33:16.690068 kernel: audit: type=1327 audit(1696282396.500:1133): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165666164613531643963666138313264393665306339633562303131
Oct  2 21:33:16.500000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165666164613531643963666138313264393665306339633562303131
Oct  2 21:33:16.784134 kernel: audit: type=1400 audit(1696282396.500:1134): avc:  denied  { bpf } for  pid=3346 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:16.500000 audit[3346]: AVC avc:  denied  { bpf } for  pid=3346 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:16.848128 kernel: audit: type=1400 audit(1696282396.500:1134): avc:  denied  { bpf } for  pid=3346 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:16.500000 audit[3346]: AVC avc:  denied  { bpf } for  pid=3346 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:16.912183 kernel: audit: type=1400 audit(1696282396.500:1134): avc:  denied  { bpf } for  pid=3346 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:16.500000 audit[3346]: AVC avc:  denied  { bpf } for  pid=3346 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:16.976185 kernel: audit: type=1400 audit(1696282396.500:1134): avc:  denied  { perfmon } for  pid=3346 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:16.500000 audit[3346]: AVC avc:  denied  { perfmon } for  pid=3346 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:17.040582 kernel: audit: type=1400 audit(1696282396.500:1134): avc:  denied  { perfmon } for  pid=3346 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:16.500000 audit[3346]: AVC avc:  denied  { perfmon } for  pid=3346 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:17.059481 env[1455]: time="2023-10-02T21:33:17.059446942Z" level=info msg="StartContainer for \"aefada51d9cfa812d96e0c9c5b011ce3e32b7e4bacdf7a3065fe79ca56d004a5\" returns successfully"
Oct  2 21:33:17.105026 kernel: audit: type=1400 audit(1696282396.500:1134): avc:  denied  { perfmon } for  pid=3346 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:16.500000 audit[3346]: AVC avc:  denied  { perfmon } for  pid=3346 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:17.169521 kernel: audit: type=1400 audit(1696282396.500:1134): avc:  denied  { perfmon } for  pid=3346 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:16.500000 audit[3346]: AVC avc:  denied  { perfmon } for  pid=3346 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:16.500000 audit[3346]: AVC avc:  denied  { perfmon } for  pid=3346 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:16.500000 audit[3346]: AVC avc:  denied  { bpf } for  pid=3346 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:16.500000 audit[3346]: AVC avc:  denied  { bpf } for  pid=3346 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:16.500000 audit: BPF prog-id=142 op=LOAD
Oct  2 21:33:16.500000 audit[3346]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000277c70 items=0 ppid=3087 pid=3346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:33:16.500000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165666164613531643963666138313264393665306339633562303131
Oct  2 21:33:16.688000 audit[3346]: AVC avc:  denied  { bpf } for  pid=3346 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:16.688000 audit[3346]: AVC avc:  denied  { bpf } for  pid=3346 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:16.688000 audit[3346]: AVC avc:  denied  { perfmon } for  pid=3346 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:16.688000 audit[3346]: AVC avc:  denied  { perfmon } for  pid=3346 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:16.688000 audit[3346]: AVC avc:  denied  { perfmon } for  pid=3346 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:16.688000 audit[3346]: AVC avc:  denied  { perfmon } for  pid=3346 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:16.688000 audit[3346]: AVC avc:  denied  { perfmon } for  pid=3346 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:16.688000 audit[3346]: AVC avc:  denied  { bpf } for  pid=3346 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:16.688000 audit[3346]: AVC avc:  denied  { bpf } for  pid=3346 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:16.688000 audit: BPF prog-id=143 op=LOAD
Oct  2 21:33:16.688000 audit[3346]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c000277cb8 items=0 ppid=3087 pid=3346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:33:16.688000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165666164613531643963666138313264393665306339633562303131
Oct  2 21:33:16.846000 audit: BPF prog-id=143 op=UNLOAD
Oct  2 21:33:16.846000 audit: BPF prog-id=142 op=UNLOAD
Oct  2 21:33:16.846000 audit[3346]: AVC avc:  denied  { bpf } for  pid=3346 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:16.846000 audit[3346]: AVC avc:  denied  { bpf } for  pid=3346 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:16.846000 audit[3346]: AVC avc:  denied  { bpf } for  pid=3346 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:16.846000 audit[3346]: AVC avc:  denied  { perfmon } for  pid=3346 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:16.846000 audit[3346]: AVC avc:  denied  { perfmon } for  pid=3346 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:16.846000 audit[3346]: AVC avc:  denied  { perfmon } for  pid=3346 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:16.846000 audit[3346]: AVC avc:  denied  { perfmon } for  pid=3346 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:16.846000 audit[3346]: AVC avc:  denied  { perfmon } for  pid=3346 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:16.846000 audit[3346]: AVC avc:  denied  { bpf } for  pid=3346 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:16.846000 audit[3346]: AVC avc:  denied  { bpf } for  pid=3346 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:16.846000 audit: BPF prog-id=144 op=LOAD
Oct  2 21:33:16.846000 audit[3346]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c000277d48 items=0 ppid=3087 pid=3346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:33:16.846000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165666164613531643963666138313264393665306339633562303131
Oct  2 21:33:17.718025 systemd[1]: cri-containerd-aefada51d9cfa812d96e0c9c5b011ce3e32b7e4bacdf7a3065fe79ca56d004a5.scope: Deactivated successfully.
Oct  2 21:33:17.731000 audit: BPF prog-id=144 op=UNLOAD
Oct  2 21:33:17.740005 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-aefada51d9cfa812d96e0c9c5b011ce3e32b7e4bacdf7a3065fe79ca56d004a5-rootfs.mount: Deactivated successfully.
Oct  2 21:33:17.766412 kubelet[2553]: I1002 21:33:17.766389    2553 kubelet_node_status.go:493] "Fast updating node status as it just became ready"
Oct  2 21:33:17.791302 kubelet[2553]: I1002 21:33:17.791287    2553 topology_manager.go:215] "Topology Admit Handler" podUID="08a61aaa-2cf9-4b33-86ce-8de9f79ca724" podNamespace="kube-system" podName="coredns-5dd5756b68-7p5tc"
Oct  2 21:33:17.794104 systemd[1]: Created slice kubepods-burstable-pod08a61aaa_2cf9_4b33_86ce_8de9f79ca724.slice.
Oct  2 21:33:17.806448 kubelet[2553]: I1002 21:33:17.806418    2553 topology_manager.go:215] "Topology Admit Handler" podUID="109a1c21-ae79-4281-81b4-7b2bcab3876b" podNamespace="kube-system" podName="coredns-5dd5756b68-qkf4n"
Oct  2 21:33:17.806700 kubelet[2553]: I1002 21:33:17.806687    2553 topology_manager.go:215] "Topology Admit Handler" podUID="de6c269b-507a-4781-82d6-2e325f82e757" podNamespace="calico-system" podName="calico-kube-controllers-74b9887bb6-48chr"
Oct  2 21:33:17.809725 kubelet[2553]: I1002 21:33:17.809704    2553 topology_manager.go:215] "Topology Admit Handler" podUID="96f60c96-bc95-4de5-a016-9864623478a6" podNamespace="calico-system" podName="csi-node-driver-7djgt"
Oct  2 21:33:17.810386 systemd[1]: Created slice kubepods-burstable-pod109a1c21_ae79_4281_81b4_7b2bcab3876b.slice.
Oct  2 21:33:17.814015 systemd[1]: Created slice kubepods-besteffort-podde6c269b_507a_4781_82d6_2e325f82e757.slice.
Oct  2 21:33:17.816879 systemd[1]: Created slice kubepods-besteffort-pod96f60c96_bc95_4de5_a016_9864623478a6.slice.
Oct  2 21:33:17.921762 kubelet[2553]: I1002 21:33:17.921676    2553 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-4j7vd\" (UniqueName: \"kubernetes.io/projected/96f60c96-bc95-4de5-a016-9864623478a6-kube-api-access-4j7vd\") pod \"csi-node-driver-7djgt\" (UID: \"96f60c96-bc95-4de5-a016-9864623478a6\") " pod="calico-system/csi-node-driver-7djgt"
Oct  2 21:33:17.921762 kubelet[2553]: I1002 21:33:17.921770    2553 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/08a61aaa-2cf9-4b33-86ce-8de9f79ca724-config-volume\") pod \"coredns-5dd5756b68-7p5tc\" (UID: \"08a61aaa-2cf9-4b33-86ce-8de9f79ca724\") " pod="kube-system/coredns-5dd5756b68-7p5tc"
Oct  2 21:33:17.922380 kubelet[2553]: I1002 21:33:17.921831    2553 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/109a1c21-ae79-4281-81b4-7b2bcab3876b-config-volume\") pod \"coredns-5dd5756b68-qkf4n\" (UID: \"109a1c21-ae79-4281-81b4-7b2bcab3876b\") " pod="kube-system/coredns-5dd5756b68-qkf4n"
Oct  2 21:33:17.922380 kubelet[2553]: I1002 21:33:17.921887    2553 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/96f60c96-bc95-4de5-a016-9864623478a6-registration-dir\") pod \"csi-node-driver-7djgt\" (UID: \"96f60c96-bc95-4de5-a016-9864623478a6\") " pod="calico-system/csi-node-driver-7djgt"
Oct  2 21:33:17.922380 kubelet[2553]: I1002 21:33:17.922214    2553 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-zqfdw\" (UniqueName: \"kubernetes.io/projected/109a1c21-ae79-4281-81b4-7b2bcab3876b-kube-api-access-zqfdw\") pod \"coredns-5dd5756b68-qkf4n\" (UID: \"109a1c21-ae79-4281-81b4-7b2bcab3876b\") " pod="kube-system/coredns-5dd5756b68-qkf4n"
Oct  2 21:33:17.922380 kubelet[2553]: I1002 21:33:17.922338    2553 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/96f60c96-bc95-4de5-a016-9864623478a6-varrun\") pod \"csi-node-driver-7djgt\" (UID: \"96f60c96-bc95-4de5-a016-9864623478a6\") " pod="calico-system/csi-node-driver-7djgt"
Oct  2 21:33:17.923003 kubelet[2553]: I1002 21:33:17.922507    2553 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/96f60c96-bc95-4de5-a016-9864623478a6-kubelet-dir\") pod \"csi-node-driver-7djgt\" (UID: \"96f60c96-bc95-4de5-a016-9864623478a6\") " pod="calico-system/csi-node-driver-7djgt"
Oct  2 21:33:17.923003 kubelet[2553]: I1002 21:33:17.922588    2553 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/96f60c96-bc95-4de5-a016-9864623478a6-socket-dir\") pod \"csi-node-driver-7djgt\" (UID: \"96f60c96-bc95-4de5-a016-9864623478a6\") " pod="calico-system/csi-node-driver-7djgt"
Oct  2 21:33:17.923003 kubelet[2553]: I1002 21:33:17.922980    2553 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-mg7rt\" (UniqueName: \"kubernetes.io/projected/08a61aaa-2cf9-4b33-86ce-8de9f79ca724-kube-api-access-mg7rt\") pod \"coredns-5dd5756b68-7p5tc\" (UID: \"08a61aaa-2cf9-4b33-86ce-8de9f79ca724\") " pod="kube-system/coredns-5dd5756b68-7p5tc"
Oct  2 21:33:17.923499 kubelet[2553]: I1002 21:33:17.923143    2553 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-qhd4z\" (UniqueName: \"kubernetes.io/projected/de6c269b-507a-4781-82d6-2e325f82e757-kube-api-access-qhd4z\") pod \"calico-kube-controllers-74b9887bb6-48chr\" (UID: \"de6c269b-507a-4781-82d6-2e325f82e757\") " pod="calico-system/calico-kube-controllers-74b9887bb6-48chr"
Oct  2 21:33:17.923499 kubelet[2553]: I1002 21:33:17.923273    2553 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"etccalico\" (UniqueName: \"kubernetes.io/host-path/96f60c96-bc95-4de5-a016-9864623478a6-etccalico\") pod \"csi-node-driver-7djgt\" (UID: \"96f60c96-bc95-4de5-a016-9864623478a6\") " pod="calico-system/csi-node-driver-7djgt"
Oct  2 21:33:18.097227 env[1455]: time="2023-10-02T21:33:18.097128515Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-7p5tc,Uid:08a61aaa-2cf9-4b33-86ce-8de9f79ca724,Namespace:kube-system,Attempt:0,}"
Oct  2 21:33:18.113477 env[1455]: time="2023-10-02T21:33:18.113365273Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-qkf4n,Uid:109a1c21-ae79-4281-81b4-7b2bcab3876b,Namespace:kube-system,Attempt:0,}"
Oct  2 21:33:18.116622 env[1455]: time="2023-10-02T21:33:18.116510137Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-74b9887bb6-48chr,Uid:de6c269b-507a-4781-82d6-2e325f82e757,Namespace:calico-system,Attempt:0,}"
Oct  2 21:33:18.119613 env[1455]: time="2023-10-02T21:33:18.119502729Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-7djgt,Uid:96f60c96-bc95-4de5-a016-9864623478a6,Namespace:calico-system,Attempt:0,}"
Oct  2 21:33:18.225141 env[1455]: time="2023-10-02T21:33:18.225038122Z" level=info msg="shim disconnected" id=aefada51d9cfa812d96e0c9c5b011ce3e32b7e4bacdf7a3065fe79ca56d004a5
Oct  2 21:33:18.225463 env[1455]: time="2023-10-02T21:33:18.225137969Z" level=warning msg="cleaning up after shim disconnected" id=aefada51d9cfa812d96e0c9c5b011ce3e32b7e4bacdf7a3065fe79ca56d004a5 namespace=k8s.io
Oct  2 21:33:18.225463 env[1455]: time="2023-10-02T21:33:18.225174813Z" level=info msg="cleaning up dead shim"
Oct  2 21:33:18.255145 env[1455]: time="2023-10-02T21:33:18.255027378Z" level=warning msg="cleanup warnings time=\"2023-10-02T21:33:18Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3411 runtime=io.containerd.runc.v2\n"
Oct  2 21:33:18.301918 env[1455]: time="2023-10-02T21:33:18.301830999Z" level=error msg="Failed to destroy network for sandbox \"fc1f2b39cec18d0737c2ebd9e4b62ab912d3224915559a5a84367a29f4d9ddd3\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Oct  2 21:33:18.302022 env[1455]: time="2023-10-02T21:33:18.301910707Z" level=error msg="Failed to destroy network for sandbox \"930b2dc07e7b43c2105f81d278bf08f5407559ee860d9038dee07ff66696907a\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Oct  2 21:33:18.302022 env[1455]: time="2023-10-02T21:33:18.301997457Z" level=error msg="Failed to destroy network for sandbox \"8b449774db8e54805f256bb2768d44630cb0c1b60dc7b2afede34aa38d463a50\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Oct  2 21:33:18.302153 env[1455]: time="2023-10-02T21:33:18.302133868Z" level=error msg="Failed to destroy network for sandbox \"828466ccfe00090816a76a7752a8aface1c9d36ab42a7898dcfdbf5504380056\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Oct  2 21:33:18.302280 env[1455]: time="2023-10-02T21:33:18.302260214Z" level=error msg="encountered an error cleaning up failed sandbox \"930b2dc07e7b43c2105f81d278bf08f5407559ee860d9038dee07ff66696907a\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Oct  2 21:33:18.302309 env[1455]: time="2023-10-02T21:33:18.302270292Z" level=error msg="encountered an error cleaning up failed sandbox \"8b449774db8e54805f256bb2768d44630cb0c1b60dc7b2afede34aa38d463a50\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Oct  2 21:33:18.302309 env[1455]: time="2023-10-02T21:33:18.302281851Z" level=error msg="encountered an error cleaning up failed sandbox \"fc1f2b39cec18d0737c2ebd9e4b62ab912d3224915559a5a84367a29f4d9ddd3\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Oct  2 21:33:18.302355 env[1455]: time="2023-10-02T21:33:18.302301570Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-7djgt,Uid:96f60c96-bc95-4de5-a016-9864623478a6,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"8b449774db8e54805f256bb2768d44630cb0c1b60dc7b2afede34aa38d463a50\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Oct  2 21:33:18.302355 env[1455]: time="2023-10-02T21:33:18.302296539Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-qkf4n,Uid:109a1c21-ae79-4281-81b4-7b2bcab3876b,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"930b2dc07e7b43c2105f81d278bf08f5407559ee860d9038dee07ff66696907a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Oct  2 21:33:18.302355 env[1455]: time="2023-10-02T21:33:18.302310448Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-7p5tc,Uid:08a61aaa-2cf9-4b33-86ce-8de9f79ca724,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"fc1f2b39cec18d0737c2ebd9e4b62ab912d3224915559a5a84367a29f4d9ddd3\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Oct  2 21:33:18.302355 env[1455]: time="2023-10-02T21:33:18.302324173Z" level=error msg="encountered an error cleaning up failed sandbox \"828466ccfe00090816a76a7752a8aface1c9d36ab42a7898dcfdbf5504380056\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Oct  2 21:33:18.302457 env[1455]: time="2023-10-02T21:33:18.302348875Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-74b9887bb6-48chr,Uid:de6c269b-507a-4781-82d6-2e325f82e757,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"828466ccfe00090816a76a7752a8aface1c9d36ab42a7898dcfdbf5504380056\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Oct  2 21:33:18.302511 kubelet[2553]: E1002 21:33:18.302470    2553 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"828466ccfe00090816a76a7752a8aface1c9d36ab42a7898dcfdbf5504380056\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Oct  2 21:33:18.302511 kubelet[2553]: E1002 21:33:18.302470    2553 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8b449774db8e54805f256bb2768d44630cb0c1b60dc7b2afede34aa38d463a50\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Oct  2 21:33:18.302511 kubelet[2553]: E1002 21:33:18.302511    2553 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8b449774db8e54805f256bb2768d44630cb0c1b60dc7b2afede34aa38d463a50\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-7djgt"
Oct  2 21:33:18.302594 kubelet[2553]: E1002 21:33:18.302512    2553 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"828466ccfe00090816a76a7752a8aface1c9d36ab42a7898dcfdbf5504380056\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-74b9887bb6-48chr"
Oct  2 21:33:18.302594 kubelet[2553]: E1002 21:33:18.302526    2553 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8b449774db8e54805f256bb2768d44630cb0c1b60dc7b2afede34aa38d463a50\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-7djgt"
Oct  2 21:33:18.302594 kubelet[2553]: E1002 21:33:18.302527    2553 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"828466ccfe00090816a76a7752a8aface1c9d36ab42a7898dcfdbf5504380056\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-74b9887bb6-48chr"
Oct  2 21:33:18.302594 kubelet[2553]: E1002 21:33:18.302470    2553 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"fc1f2b39cec18d0737c2ebd9e4b62ab912d3224915559a5a84367a29f4d9ddd3\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Oct  2 21:33:18.302696 kubelet[2553]: E1002 21:33:18.302548    2553 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"fc1f2b39cec18d0737c2ebd9e4b62ab912d3224915559a5a84367a29f4d9ddd3\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5dd5756b68-7p5tc"
Oct  2 21:33:18.302696 kubelet[2553]: E1002 21:33:18.302560    2553 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"fc1f2b39cec18d0737c2ebd9e4b62ab912d3224915559a5a84367a29f4d9ddd3\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5dd5756b68-7p5tc"
Oct  2 21:33:18.302696 kubelet[2553]: E1002 21:33:18.302560    2553 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-74b9887bb6-48chr_calico-system(de6c269b-507a-4781-82d6-2e325f82e757)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-74b9887bb6-48chr_calico-system(de6c269b-507a-4781-82d6-2e325f82e757)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"828466ccfe00090816a76a7752a8aface1c9d36ab42a7898dcfdbf5504380056\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-74b9887bb6-48chr" podUID="de6c269b-507a-4781-82d6-2e325f82e757"
Oct  2 21:33:18.302790 kubelet[2553]: E1002 21:33:18.302584    2553 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-5dd5756b68-7p5tc_kube-system(08a61aaa-2cf9-4b33-86ce-8de9f79ca724)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-5dd5756b68-7p5tc_kube-system(08a61aaa-2cf9-4b33-86ce-8de9f79ca724)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"fc1f2b39cec18d0737c2ebd9e4b62ab912d3224915559a5a84367a29f4d9ddd3\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-7p5tc" podUID="08a61aaa-2cf9-4b33-86ce-8de9f79ca724"
Oct  2 21:33:18.302790 kubelet[2553]: E1002 21:33:18.302588    2553 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-7djgt_calico-system(96f60c96-bc95-4de5-a016-9864623478a6)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-7djgt_calico-system(96f60c96-bc95-4de5-a016-9864623478a6)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"8b449774db8e54805f256bb2768d44630cb0c1b60dc7b2afede34aa38d463a50\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-7djgt" podUID="96f60c96-bc95-4de5-a016-9864623478a6"
Oct  2 21:33:18.302790 kubelet[2553]: E1002 21:33:18.302470    2553 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"930b2dc07e7b43c2105f81d278bf08f5407559ee860d9038dee07ff66696907a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Oct  2 21:33:18.302891 kubelet[2553]: E1002 21:33:18.302609    2553 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"930b2dc07e7b43c2105f81d278bf08f5407559ee860d9038dee07ff66696907a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5dd5756b68-qkf4n"
Oct  2 21:33:18.302891 kubelet[2553]: E1002 21:33:18.302620    2553 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"930b2dc07e7b43c2105f81d278bf08f5407559ee860d9038dee07ff66696907a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5dd5756b68-qkf4n"
Oct  2 21:33:18.302891 kubelet[2553]: E1002 21:33:18.302641    2553 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-5dd5756b68-qkf4n_kube-system(109a1c21-ae79-4281-81b4-7b2bcab3876b)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-5dd5756b68-qkf4n_kube-system(109a1c21-ae79-4281-81b4-7b2bcab3876b)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"930b2dc07e7b43c2105f81d278bf08f5407559ee860d9038dee07ff66696907a\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-qkf4n" podUID="109a1c21-ae79-4281-81b4-7b2bcab3876b"
Oct  2 21:33:18.744381 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-8b449774db8e54805f256bb2768d44630cb0c1b60dc7b2afede34aa38d463a50-shm.mount: Deactivated successfully.
Oct  2 21:33:18.744450 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-828466ccfe00090816a76a7752a8aface1c9d36ab42a7898dcfdbf5504380056-shm.mount: Deactivated successfully.
Oct  2 21:33:18.744546 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-fc1f2b39cec18d0737c2ebd9e4b62ab912d3224915559a5a84367a29f4d9ddd3-shm.mount: Deactivated successfully.
Oct  2 21:33:18.744594 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-930b2dc07e7b43c2105f81d278bf08f5407559ee860d9038dee07ff66696907a-shm.mount: Deactivated successfully.
Oct  2 21:33:18.908184 env[1455]: time="2023-10-02T21:33:18.908089351Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.25.0\""
Oct  2 21:33:18.908524 kubelet[2553]: I1002 21:33:18.908192    2553 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="930b2dc07e7b43c2105f81d278bf08f5407559ee860d9038dee07ff66696907a"
Oct  2 21:33:18.909700 env[1455]: time="2023-10-02T21:33:18.909581432Z" level=info msg="StopPodSandbox for \"930b2dc07e7b43c2105f81d278bf08f5407559ee860d9038dee07ff66696907a\""
Oct  2 21:33:18.910646 kubelet[2553]: I1002 21:33:18.910529    2553 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="8b449774db8e54805f256bb2768d44630cb0c1b60dc7b2afede34aa38d463a50"
Oct  2 21:33:18.911909 env[1455]: time="2023-10-02T21:33:18.911819266Z" level=info msg="StopPodSandbox for \"8b449774db8e54805f256bb2768d44630cb0c1b60dc7b2afede34aa38d463a50\""
Oct  2 21:33:18.913399 kubelet[2553]: I1002 21:33:18.913345    2553 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="828466ccfe00090816a76a7752a8aface1c9d36ab42a7898dcfdbf5504380056"
Oct  2 21:33:18.918036 env[1455]: time="2023-10-02T21:33:18.918017545Z" level=info msg="StopPodSandbox for \"828466ccfe00090816a76a7752a8aface1c9d36ab42a7898dcfdbf5504380056\""
Oct  2 21:33:18.918476 kubelet[2553]: I1002 21:33:18.918460    2553 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="fc1f2b39cec18d0737c2ebd9e4b62ab912d3224915559a5a84367a29f4d9ddd3"
Oct  2 21:33:18.918826 env[1455]: time="2023-10-02T21:33:18.918802725Z" level=info msg="StopPodSandbox for \"fc1f2b39cec18d0737c2ebd9e4b62ab912d3224915559a5a84367a29f4d9ddd3\""
Oct  2 21:33:18.931386 env[1455]: time="2023-10-02T21:33:18.931348909Z" level=error msg="StopPodSandbox for \"8b449774db8e54805f256bb2768d44630cb0c1b60dc7b2afede34aa38d463a50\" failed" error="failed to destroy network for sandbox \"8b449774db8e54805f256bb2768d44630cb0c1b60dc7b2afede34aa38d463a50\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Oct  2 21:33:18.931540 kubelet[2553]: E1002 21:33:18.931527    2553 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"8b449774db8e54805f256bb2768d44630cb0c1b60dc7b2afede34aa38d463a50\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="8b449774db8e54805f256bb2768d44630cb0c1b60dc7b2afede34aa38d463a50"
Oct  2 21:33:18.931584 kubelet[2553]: E1002 21:33:18.931571    2553 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"8b449774db8e54805f256bb2768d44630cb0c1b60dc7b2afede34aa38d463a50"}
Oct  2 21:33:18.931607 kubelet[2553]: E1002 21:33:18.931594    2553 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"96f60c96-bc95-4de5-a016-9864623478a6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8b449774db8e54805f256bb2768d44630cb0c1b60dc7b2afede34aa38d463a50\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\""
Oct  2 21:33:18.931655 kubelet[2553]: E1002 21:33:18.931610    2553 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"96f60c96-bc95-4de5-a016-9864623478a6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8b449774db8e54805f256bb2768d44630cb0c1b60dc7b2afede34aa38d463a50\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-7djgt" podUID="96f60c96-bc95-4de5-a016-9864623478a6"
Oct  2 21:33:18.932157 env[1455]: time="2023-10-02T21:33:18.932134941Z" level=error msg="StopPodSandbox for \"fc1f2b39cec18d0737c2ebd9e4b62ab912d3224915559a5a84367a29f4d9ddd3\" failed" error="failed to destroy network for sandbox \"fc1f2b39cec18d0737c2ebd9e4b62ab912d3224915559a5a84367a29f4d9ddd3\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Oct  2 21:33:18.932225 kubelet[2553]: E1002 21:33:18.932217    2553 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"fc1f2b39cec18d0737c2ebd9e4b62ab912d3224915559a5a84367a29f4d9ddd3\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="fc1f2b39cec18d0737c2ebd9e4b62ab912d3224915559a5a84367a29f4d9ddd3"
Oct  2 21:33:18.932251 kubelet[2553]: E1002 21:33:18.932233    2553 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"fc1f2b39cec18d0737c2ebd9e4b62ab912d3224915559a5a84367a29f4d9ddd3"}
Oct  2 21:33:18.932276 kubelet[2553]: E1002 21:33:18.932251    2553 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"08a61aaa-2cf9-4b33-86ce-8de9f79ca724\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"fc1f2b39cec18d0737c2ebd9e4b62ab912d3224915559a5a84367a29f4d9ddd3\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\""
Oct  2 21:33:18.932276 kubelet[2553]: E1002 21:33:18.932265    2553 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"08a61aaa-2cf9-4b33-86ce-8de9f79ca724\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"fc1f2b39cec18d0737c2ebd9e4b62ab912d3224915559a5a84367a29f4d9ddd3\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-7p5tc" podUID="08a61aaa-2cf9-4b33-86ce-8de9f79ca724"
Oct  2 21:33:18.932933 env[1455]: time="2023-10-02T21:33:18.932886620Z" level=error msg="StopPodSandbox for \"930b2dc07e7b43c2105f81d278bf08f5407559ee860d9038dee07ff66696907a\" failed" error="failed to destroy network for sandbox \"930b2dc07e7b43c2105f81d278bf08f5407559ee860d9038dee07ff66696907a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Oct  2 21:33:18.932993 kubelet[2553]: E1002 21:33:18.932987    2553 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"930b2dc07e7b43c2105f81d278bf08f5407559ee860d9038dee07ff66696907a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="930b2dc07e7b43c2105f81d278bf08f5407559ee860d9038dee07ff66696907a"
Oct  2 21:33:18.933021 kubelet[2553]: E1002 21:33:18.933000    2553 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"930b2dc07e7b43c2105f81d278bf08f5407559ee860d9038dee07ff66696907a"}
Oct  2 21:33:18.933021 kubelet[2553]: E1002 21:33:18.933017    2553 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"109a1c21-ae79-4281-81b4-7b2bcab3876b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"930b2dc07e7b43c2105f81d278bf08f5407559ee860d9038dee07ff66696907a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\""
Oct  2 21:33:18.933078 kubelet[2553]: E1002 21:33:18.933035    2553 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"109a1c21-ae79-4281-81b4-7b2bcab3876b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"930b2dc07e7b43c2105f81d278bf08f5407559ee860d9038dee07ff66696907a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-qkf4n" podUID="109a1c21-ae79-4281-81b4-7b2bcab3876b"
Oct  2 21:33:18.933671 env[1455]: time="2023-10-02T21:33:18.933625011Z" level=error msg="StopPodSandbox for \"828466ccfe00090816a76a7752a8aface1c9d36ab42a7898dcfdbf5504380056\" failed" error="failed to destroy network for sandbox \"828466ccfe00090816a76a7752a8aface1c9d36ab42a7898dcfdbf5504380056\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Oct  2 21:33:18.933711 kubelet[2553]: E1002 21:33:18.933695    2553 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"828466ccfe00090816a76a7752a8aface1c9d36ab42a7898dcfdbf5504380056\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="828466ccfe00090816a76a7752a8aface1c9d36ab42a7898dcfdbf5504380056"
Oct  2 21:33:18.933711 kubelet[2553]: E1002 21:33:18.933708    2553 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"828466ccfe00090816a76a7752a8aface1c9d36ab42a7898dcfdbf5504380056"}
Oct  2 21:33:18.933758 kubelet[2553]: E1002 21:33:18.933725    2553 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"de6c269b-507a-4781-82d6-2e325f82e757\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"828466ccfe00090816a76a7752a8aface1c9d36ab42a7898dcfdbf5504380056\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\""
Oct  2 21:33:18.933758 kubelet[2553]: E1002 21:33:18.933739    2553 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"de6c269b-507a-4781-82d6-2e325f82e757\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"828466ccfe00090816a76a7752a8aface1c9d36ab42a7898dcfdbf5504380056\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-74b9887bb6-48chr" podUID="de6c269b-507a-4781-82d6-2e325f82e757"
Oct  2 21:33:23.880784 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1663069318.mount: Deactivated successfully.
Oct  2 21:33:23.905936 env[1455]: time="2023-10-02T21:33:23.905895649Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 21:33:23.907576 env[1455]: time="2023-10-02T21:33:23.907517555Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:08616d26b8e74867402274687491e5978ba4a6ded94e9f5ecc3e364024e5683e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 21:33:23.909868 env[1455]: time="2023-10-02T21:33:23.909807536Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 21:33:23.910980 env[1455]: time="2023-10-02T21:33:23.910958638Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:e898f4b7b55c908c88dad008ae939024e71ed93c5effbb10cca891b658b2f001,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 21:33:23.911532 env[1455]: time="2023-10-02T21:33:23.911508335Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.25.0\" returns image reference \"sha256:08616d26b8e74867402274687491e5978ba4a6ded94e9f5ecc3e364024e5683e\""
Oct  2 21:33:23.913117 env[1455]: time="2023-10-02T21:33:23.913088649Z" level=info msg="CreateContainer within sandbox \"e91b4a181c8f1a61bd7de2868a1418af7125973295601cdf6a5ce3ba60b19121\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}"
Oct  2 21:33:23.920947 env[1455]: time="2023-10-02T21:33:23.920890639Z" level=info msg="CreateContainer within sandbox \"e91b4a181c8f1a61bd7de2868a1418af7125973295601cdf6a5ce3ba60b19121\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"9e290ed60a2ed84498e17266a2ff53527462770a99ef3a3ed79a0dc53b317234\""
Oct  2 21:33:23.921277 env[1455]: time="2023-10-02T21:33:23.921250623Z" level=info msg="StartContainer for \"9e290ed60a2ed84498e17266a2ff53527462770a99ef3a3ed79a0dc53b317234\""
Oct  2 21:33:23.944516 systemd[1]: Started cri-containerd-9e290ed60a2ed84498e17266a2ff53527462770a99ef3a3ed79a0dc53b317234.scope.
Oct  2 21:33:23.952000 audit[3748]: AVC avc:  denied  { perfmon } for  pid=3748 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:23.980246 kernel: kauditd_printk_skb: 34 callbacks suppressed
Oct  2 21:33:23.980304 kernel: audit: type=1400 audit(1696282403.952:1140): avc:  denied  { perfmon } for  pid=3748 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:23.952000 audit[3748]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3087 pid=3748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:33:24.141322 kernel: audit: type=1300 audit(1696282403.952:1140): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3087 pid=3748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:33:24.141362 kernel: audit: type=1327 audit(1696282403.952:1140): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965323930656436306132656438343439386531373236366132666635
Oct  2 21:33:23.952000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965323930656436306132656438343439386531373236366132666635
Oct  2 21:33:24.235347 kernel: audit: type=1400 audit(1696282403.952:1141): avc:  denied  { bpf } for  pid=3748 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:23.952000 audit[3748]: AVC avc:  denied  { bpf } for  pid=3748 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:24.299358 kernel: audit: type=1400 audit(1696282403.952:1141): avc:  denied  { bpf } for  pid=3748 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:23.952000 audit[3748]: AVC avc:  denied  { bpf } for  pid=3748 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:24.363381 kernel: audit: type=1400 audit(1696282403.952:1141): avc:  denied  { bpf } for  pid=3748 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:23.952000 audit[3748]: AVC avc:  denied  { bpf } for  pid=3748 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:24.427358 kernel: audit: type=1400 audit(1696282403.952:1141): avc:  denied  { perfmon } for  pid=3748 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:23.952000 audit[3748]: AVC avc:  denied  { perfmon } for  pid=3748 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:24.491776 kernel: audit: type=1400 audit(1696282403.952:1141): avc:  denied  { perfmon } for  pid=3748 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:23.952000 audit[3748]: AVC avc:  denied  { perfmon } for  pid=3748 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:24.509556 env[1455]: time="2023-10-02T21:33:24.509534100Z" level=info msg="StartContainer for \"9e290ed60a2ed84498e17266a2ff53527462770a99ef3a3ed79a0dc53b317234\" returns successfully"
Oct  2 21:33:24.556208 kernel: audit: type=1400 audit(1696282403.952:1141): avc:  denied  { perfmon } for  pid=3748 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:23.952000 audit[3748]: AVC avc:  denied  { perfmon } for  pid=3748 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:24.620665 kernel: audit: type=1400 audit(1696282403.952:1141): avc:  denied  { perfmon } for  pid=3748 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:23.952000 audit[3748]: AVC avc:  denied  { perfmon } for  pid=3748 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:23.952000 audit[3748]: AVC avc:  denied  { perfmon } for  pid=3748 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:23.952000 audit[3748]: AVC avc:  denied  { bpf } for  pid=3748 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:23.952000 audit[3748]: AVC avc:  denied  { bpf } for  pid=3748 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:23.952000 audit: BPF prog-id=145 op=LOAD
Oct  2 21:33:23.952000 audit[3748]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0002efc70 items=0 ppid=3087 pid=3748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:33:23.952000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965323930656436306132656438343439386531373236366132666635
Oct  2 21:33:24.140000 audit[3748]: AVC avc:  denied  { bpf } for  pid=3748 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:24.140000 audit[3748]: AVC avc:  denied  { bpf } for  pid=3748 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:24.140000 audit[3748]: AVC avc:  denied  { perfmon } for  pid=3748 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:24.140000 audit[3748]: AVC avc:  denied  { perfmon } for  pid=3748 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:24.140000 audit[3748]: AVC avc:  denied  { perfmon } for  pid=3748 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:24.140000 audit[3748]: AVC avc:  denied  { perfmon } for  pid=3748 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:24.140000 audit[3748]: AVC avc:  denied  { perfmon } for  pid=3748 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:24.140000 audit[3748]: AVC avc:  denied  { bpf } for  pid=3748 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:24.140000 audit[3748]: AVC avc:  denied  { bpf } for  pid=3748 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:24.140000 audit: BPF prog-id=146 op=LOAD
Oct  2 21:33:24.140000 audit[3748]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0002efcb8 items=0 ppid=3087 pid=3748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:33:24.140000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965323930656436306132656438343439386531373236366132666635
Oct  2 21:33:24.298000 audit: BPF prog-id=146 op=UNLOAD
Oct  2 21:33:24.298000 audit: BPF prog-id=145 op=UNLOAD
Oct  2 21:33:24.298000 audit[3748]: AVC avc:  denied  { bpf } for  pid=3748 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:24.298000 audit[3748]: AVC avc:  denied  { bpf } for  pid=3748 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:24.298000 audit[3748]: AVC avc:  denied  { bpf } for  pid=3748 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:24.298000 audit[3748]: AVC avc:  denied  { perfmon } for  pid=3748 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:24.298000 audit[3748]: AVC avc:  denied  { perfmon } for  pid=3748 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:24.298000 audit[3748]: AVC avc:  denied  { perfmon } for  pid=3748 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:24.298000 audit[3748]: AVC avc:  denied  { perfmon } for  pid=3748 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:24.298000 audit[3748]: AVC avc:  denied  { perfmon } for  pid=3748 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:24.298000 audit[3748]: AVC avc:  denied  { bpf } for  pid=3748 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:24.298000 audit[3748]: AVC avc:  denied  { bpf } for  pid=3748 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:24.298000 audit: BPF prog-id=147 op=LOAD
Oct  2 21:33:24.298000 audit[3748]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0002efd48 items=0 ppid=3087 pid=3748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:33:24.298000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965323930656436306132656438343439386531373236366132666635
Oct  2 21:33:24.769647 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information.
Oct  2 21:33:24.769699 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld <Jason@zx2c4.com>. All Rights Reserved.
Oct  2 21:33:24.938907 kubelet[2553]: I1002 21:33:24.938826    2553 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-hrww7" podStartSLOduration=1.751474934 podCreationTimestamp="2023-10-02 21:33:04 +0000 UTC" firstStartedPulling="2023-10-02 21:33:04.724351405 +0000 UTC m=+20.986968270" lastFinishedPulling="2023-10-02 21:33:23.911660711 +0000 UTC m=+40.174277575" observedRunningTime="2023-10-02 21:33:24.93851281 +0000 UTC m=+41.201129681" watchObservedRunningTime="2023-10-02 21:33:24.938784239 +0000 UTC m=+41.201401100"
Oct  2 21:33:26.020000 audit[3926]: AVC avc:  denied  { write } for  pid=3926 comm="tee" name="fd" dev="proc" ino=37279 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0
Oct  2 21:33:26.020000 audit[3926]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc4a07c972 a2=241 a3=1b6 items=1 ppid=3893 pid=3926 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:33:26.020000 audit: CWD cwd="/etc/service/enabled/bird/log"
Oct  2 21:33:26.020000 audit: PATH item=0 name="/dev/fd/63" inode=9001 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 21:33:26.020000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633
Oct  2 21:33:26.021000 audit[3931]: AVC avc:  denied  { write } for  pid=3931 comm="tee" name="fd" dev="proc" ino=33223 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0
Oct  2 21:33:26.021000 audit[3931]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffcde40973 a2=241 a3=1b6 items=1 ppid=3896 pid=3931 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:33:26.021000 audit: CWD cwd="/etc/service/enabled/cni/log"
Oct  2 21:33:26.021000 audit: PATH item=0 name="/dev/fd/63" inode=40015 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 21:33:26.021000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633
Oct  2 21:33:26.021000 audit[3928]: AVC avc:  denied  { write } for  pid=3928 comm="tee" name="fd" dev="proc" ino=40018 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0
Oct  2 21:33:26.021000 audit[3928]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffee378d962 a2=241 a3=1b6 items=1 ppid=3895 pid=3928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:33:26.021000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log"
Oct  2 21:33:26.021000 audit: PATH item=0 name="/dev/fd/63" inode=33220 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 21:33:26.021000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633
Oct  2 21:33:26.021000 audit[3936]: AVC avc:  denied  { write } for  pid=3936 comm="tee" name="fd" dev="proc" ino=30454 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0
Oct  2 21:33:26.021000 audit[3936]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc59fb0961 a2=241 a3=1b6 items=1 ppid=3894 pid=3936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:33:26.021000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log"
Oct  2 21:33:26.021000 audit: PATH item=0 name="/dev/fd/63" inode=30451 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 21:33:26.021000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633
Oct  2 21:33:26.021000 audit[3938]: AVC avc:  denied  { write } for  pid=3938 comm="tee" name="fd" dev="proc" ino=25349 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0
Oct  2 21:33:26.021000 audit[3938]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffdfb3bc971 a2=241 a3=1b6 items=1 ppid=3898 pid=3938 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:33:26.021000 audit: CWD cwd="/etc/service/enabled/bird6/log"
Oct  2 21:33:26.021000 audit: PATH item=0 name="/dev/fd/63" inode=25346 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 21:33:26.021000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633
Oct  2 21:33:26.021000 audit[3939]: AVC avc:  denied  { write } for  pid=3939 comm="tee" name="fd" dev="proc" ino=41993 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0
Oct  2 21:33:26.021000 audit[3939]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffec951f971 a2=241 a3=1b6 items=1 ppid=3897 pid=3939 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:33:26.021000 audit: CWD cwd="/etc/service/enabled/felix/log"
Oct  2 21:33:26.021000 audit: PATH item=0 name="/dev/fd/63" inode=41990 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 21:33:26.021000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633
Oct  2 21:33:26.021000 audit[3940]: AVC avc:  denied  { write } for  pid=3940 comm="tee" name="fd" dev="proc" ino=31325 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0
Oct  2 21:33:26.021000 audit[3940]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd32e99971 a2=241 a3=1b6 items=1 ppid=3899 pid=3940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:33:26.021000 audit: CWD cwd="/etc/service/enabled/confd/log"
Oct  2 21:33:26.021000 audit: PATH item=0 name="/dev/fd/63" inode=31322 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Oct  2 21:33:26.021000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633
Oct  2 21:33:26.116000 audit[4078]: AVC avc:  denied  { bpf } for  pid=4078 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:26.116000 audit[4078]: AVC avc:  denied  { bpf } for  pid=4078 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:26.116000 audit[4078]: AVC avc:  denied  { perfmon } for  pid=4078 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:26.116000 audit[4078]: AVC avc:  denied  { perfmon } for  pid=4078 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:26.116000 audit[4078]: AVC avc:  denied  { perfmon } for  pid=4078 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:26.116000 audit[4078]: AVC avc:  denied  { perfmon } for  pid=4078 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:26.116000 audit[4078]: AVC avc:  denied  { perfmon } for  pid=4078 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:26.116000 audit[4078]: AVC avc:  denied  { bpf } for  pid=4078 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:26.116000 audit[4078]: AVC avc:  denied  { bpf } for  pid=4078 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:26.116000 audit: BPF prog-id=148 op=LOAD
Oct  2 21:33:26.116000 audit[4078]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe22567340 a2=70 a3=7fcb0e151000 items=0 ppid=3906 pid=4078 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:33:26.116000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470
Oct  2 21:33:26.116000 audit: BPF prog-id=148 op=UNLOAD
Oct  2 21:33:26.116000 audit[4078]: AVC avc:  denied  { bpf } for  pid=4078 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:26.116000 audit[4078]: AVC avc:  denied  { bpf } for  pid=4078 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:26.116000 audit[4078]: AVC avc:  denied  { perfmon } for  pid=4078 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:26.116000 audit[4078]: AVC avc:  denied  { perfmon } for  pid=4078 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:26.116000 audit[4078]: AVC avc:  denied  { perfmon } for  pid=4078 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:26.116000 audit[4078]: AVC avc:  denied  { perfmon } for  pid=4078 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:26.116000 audit[4078]: AVC avc:  denied  { perfmon } for  pid=4078 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:26.116000 audit[4078]: AVC avc:  denied  { bpf } for  pid=4078 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:26.116000 audit[4078]: AVC avc:  denied  { bpf } for  pid=4078 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:26.116000 audit: BPF prog-id=149 op=LOAD
Oct  2 21:33:26.116000 audit[4078]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe22567340 a2=70 a3=6e items=0 ppid=3906 pid=4078 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:33:26.116000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470
Oct  2 21:33:26.116000 audit: BPF prog-id=149 op=UNLOAD
Oct  2 21:33:26.116000 audit[4078]: AVC avc:  denied  { perfmon } for  pid=4078 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:26.116000 audit[4078]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffe225672f0 a2=70 a3=7ffe22567340 items=0 ppid=3906 pid=4078 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:33:26.116000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470
Oct  2 21:33:26.116000 audit[4078]: AVC avc:  denied  { bpf } for  pid=4078 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:26.116000 audit[4078]: AVC avc:  denied  { bpf } for  pid=4078 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:26.116000 audit[4078]: AVC avc:  denied  { perfmon } for  pid=4078 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:26.116000 audit[4078]: AVC avc:  denied  { perfmon } for  pid=4078 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:26.116000 audit[4078]: AVC avc:  denied  { perfmon } for  pid=4078 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:26.116000 audit[4078]: AVC avc:  denied  { perfmon } for  pid=4078 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:26.116000 audit[4078]: AVC avc:  denied  { perfmon } for  pid=4078 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:26.116000 audit[4078]: AVC avc:  denied  { bpf } for  pid=4078 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:26.116000 audit[4078]: AVC avc:  denied  { bpf } for  pid=4078 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:26.116000 audit: BPF prog-id=150 op=LOAD
Oct  2 21:33:26.116000 audit[4078]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7ffe225672d0 a2=70 a3=7ffe22567340 items=0 ppid=3906 pid=4078 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:33:26.116000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470
Oct  2 21:33:26.116000 audit: BPF prog-id=150 op=UNLOAD
Oct  2 21:33:26.116000 audit[4078]: AVC avc:  denied  { bpf } for  pid=4078 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:26.116000 audit[4078]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe225673b0 a2=70 a3=0 items=0 ppid=3906 pid=4078 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:33:26.116000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470
Oct  2 21:33:26.116000 audit[4078]: AVC avc:  denied  { bpf } for  pid=4078 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:26.116000 audit[4078]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe225673a0 a2=70 a3=0 items=0 ppid=3906 pid=4078 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:33:26.116000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470
Oct  2 21:33:26.116000 audit[4078]: AVC avc:  denied  { bpf } for  pid=4078 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:26.116000 audit[4078]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=0 a1=7ffe225673e0 a2=70 a3=0 items=0 ppid=3906 pid=4078 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:33:26.116000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470
Oct  2 21:33:26.116000 audit[4078]: AVC avc:  denied  { bpf } for  pid=4078 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:26.116000 audit[4078]: AVC avc:  denied  { bpf } for  pid=4078 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:26.116000 audit[4078]: AVC avc:  denied  { bpf } for  pid=4078 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:26.116000 audit[4078]: AVC avc:  denied  { perfmon } for  pid=4078 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:26.116000 audit[4078]: AVC avc:  denied  { perfmon } for  pid=4078 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:26.116000 audit[4078]: AVC avc:  denied  { perfmon } for  pid=4078 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:26.116000 audit[4078]: AVC avc:  denied  { perfmon } for  pid=4078 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:26.116000 audit[4078]: AVC avc:  denied  { perfmon } for  pid=4078 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:26.116000 audit[4078]: AVC avc:  denied  { bpf } for  pid=4078 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:26.116000 audit[4078]: AVC avc:  denied  { bpf } for  pid=4078 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:26.116000 audit: BPF prog-id=151 op=LOAD
Oct  2 21:33:26.116000 audit[4078]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7ffe22567300 a2=70 a3=ffffffff items=0 ppid=3906 pid=4078 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:33:26.116000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470
Oct  2 21:33:26.117000 audit[4082]: AVC avc:  denied  { bpf } for  pid=4082 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:26.117000 audit[4082]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffceb21f880 a2=70 a3=fff80800 items=0 ppid=3906 pid=4082 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:33:26.117000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41
Oct  2 21:33:26.117000 audit[4082]: AVC avc:  denied  { bpf } for  pid=4082 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:26.117000 audit[4082]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffceb21f750 a2=70 a3=3 items=0 ppid=3906 pid=4082 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:33:26.117000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41
Oct  2 21:33:26.133000 audit: BPF prog-id=151 op=UNLOAD
Oct  2 21:33:26.216000 audit[4140]: NETFILTER_CFG table=mangle:97 family=2 entries=19 op=nft_register_chain pid=4140 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re"
Oct  2 21:33:26.216000 audit[4140]: SYSCALL arch=c000003e syscall=46 success=yes exit=6800 a0=3 a1=7ffe5007bbd0 a2=0 a3=7ffe5007bbbc items=0 ppid=3906 pid=4140 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:33:26.216000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030
Oct  2 21:33:26.219000 audit[4139]: NETFILTER_CFG table=raw:98 family=2 entries=19 op=nft_register_chain pid=4139 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re"
Oct  2 21:33:26.219000 audit[4139]: SYSCALL arch=c000003e syscall=46 success=yes exit=6132 a0=3 a1=7ffe99f55280 a2=0 a3=561bde627000 items=0 ppid=3906 pid=4139 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:33:26.219000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030
Oct  2 21:33:26.221000 audit[4141]: NETFILTER_CFG table=nat:99 family=2 entries=16 op=nft_register_chain pid=4141 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re"
Oct  2 21:33:26.221000 audit[4141]: SYSCALL arch=c000003e syscall=46 success=yes exit=5188 a0=3 a1=7ffcc8f67c70 a2=0 a3=55f82fbc0000 items=0 ppid=3906 pid=4141 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:33:26.221000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030
Oct  2 21:33:26.225000 audit[4144]: NETFILTER_CFG table=filter:100 family=2 entries=39 op=nft_register_chain pid=4144 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re"
Oct  2 21:33:26.225000 audit[4144]: SYSCALL arch=c000003e syscall=46 success=yes exit=18472 a0=3 a1=7fff19e35830 a2=0 a3=561944576000 items=0 ppid=3906 pid=4144 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:33:26.225000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030
Oct  2 21:33:27.094767 systemd-networkd[1301]: vxlan.calico: Link UP
Oct  2 21:33:27.094770 systemd-networkd[1301]: vxlan.calico: Gained carrier
Oct  2 21:33:28.857750 systemd-networkd[1301]: vxlan.calico: Gained IPv6LL
Oct  2 21:33:29.791299 env[1455]: time="2023-10-02T21:33:29.791243352Z" level=info msg="StopPodSandbox for \"fc1f2b39cec18d0737c2ebd9e4b62ab912d3224915559a5a84367a29f4d9ddd3\""
Oct  2 21:33:29.791870 env[1455]: time="2023-10-02T21:33:29.791239556Z" level=info msg="StopPodSandbox for \"930b2dc07e7b43c2105f81d278bf08f5407559ee860d9038dee07ff66696907a\""
Oct  2 21:33:29.836657 env[1455]: 2023-10-02 21:33:29.819 [INFO][4202] k8s.go 576: Cleaning up netns ContainerID="930b2dc07e7b43c2105f81d278bf08f5407559ee860d9038dee07ff66696907a"
Oct  2 21:33:29.836657 env[1455]: 2023-10-02 21:33:29.820 [INFO][4202] dataplane_linux.go 524: Deleting workload's device in netns. ContainerID="930b2dc07e7b43c2105f81d278bf08f5407559ee860d9038dee07ff66696907a" iface="eth0" netns="/var/run/netns/cni-19a65967-8e7c-a03c-f98e-839a2014848a"
Oct  2 21:33:29.836657 env[1455]: 2023-10-02 21:33:29.820 [INFO][4202] dataplane_linux.go 535: Entered netns, deleting veth. ContainerID="930b2dc07e7b43c2105f81d278bf08f5407559ee860d9038dee07ff66696907a" iface="eth0" netns="/var/run/netns/cni-19a65967-8e7c-a03c-f98e-839a2014848a"
Oct  2 21:33:29.836657 env[1455]: 2023-10-02 21:33:29.820 [INFO][4202] dataplane_linux.go 562: Workload's veth was already gone.  Nothing to do. ContainerID="930b2dc07e7b43c2105f81d278bf08f5407559ee860d9038dee07ff66696907a" iface="eth0" netns="/var/run/netns/cni-19a65967-8e7c-a03c-f98e-839a2014848a"
Oct  2 21:33:29.836657 env[1455]: 2023-10-02 21:33:29.820 [INFO][4202] k8s.go 583: Releasing IP address(es) ContainerID="930b2dc07e7b43c2105f81d278bf08f5407559ee860d9038dee07ff66696907a"
Oct  2 21:33:29.836657 env[1455]: 2023-10-02 21:33:29.820 [INFO][4202] utils.go 196: Calico CNI releasing IP address ContainerID="930b2dc07e7b43c2105f81d278bf08f5407559ee860d9038dee07ff66696907a"
Oct  2 21:33:29.836657 env[1455]: 2023-10-02 21:33:29.830 [INFO][4228] ipam_plugin.go 416: Releasing address using handleID ContainerID="930b2dc07e7b43c2105f81d278bf08f5407559ee860d9038dee07ff66696907a" HandleID="k8s-pod-network.930b2dc07e7b43c2105f81d278bf08f5407559ee860d9038dee07ff66696907a" Workload="ci--3510.3.0--a--a1bcd9ea1c-k8s-coredns--5dd5756b68--qkf4n-eth0"
Oct  2 21:33:29.836657 env[1455]: time="2023-10-02T21:33:29Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357"
Oct  2 21:33:29.836657 env[1455]: time="2023-10-02T21:33:29Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372"
Oct  2 21:33:29.836657 env[1455]: 2023-10-02 21:33:29.834 [WARNING][4228] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="930b2dc07e7b43c2105f81d278bf08f5407559ee860d9038dee07ff66696907a" HandleID="k8s-pod-network.930b2dc07e7b43c2105f81d278bf08f5407559ee860d9038dee07ff66696907a" Workload="ci--3510.3.0--a--a1bcd9ea1c-k8s-coredns--5dd5756b68--qkf4n-eth0"
Oct  2 21:33:29.836657 env[1455]: 2023-10-02 21:33:29.834 [INFO][4228] ipam_plugin.go 444: Releasing address using workloadID ContainerID="930b2dc07e7b43c2105f81d278bf08f5407559ee860d9038dee07ff66696907a" HandleID="k8s-pod-network.930b2dc07e7b43c2105f81d278bf08f5407559ee860d9038dee07ff66696907a" Workload="ci--3510.3.0--a--a1bcd9ea1c-k8s-coredns--5dd5756b68--qkf4n-eth0"
Oct  2 21:33:29.836657 env[1455]: time="2023-10-02T21:33:29Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378"
Oct  2 21:33:29.836657 env[1455]: 2023-10-02 21:33:29.836 [INFO][4202] k8s.go 589: Teardown processing complete. ContainerID="930b2dc07e7b43c2105f81d278bf08f5407559ee860d9038dee07ff66696907a"
Oct  2 21:33:29.836965 env[1455]: time="2023-10-02T21:33:29.836679668Z" level=info msg="TearDown network for sandbox \"930b2dc07e7b43c2105f81d278bf08f5407559ee860d9038dee07ff66696907a\" successfully"
Oct  2 21:33:29.836965 env[1455]: time="2023-10-02T21:33:29.836699807Z" level=info msg="StopPodSandbox for \"930b2dc07e7b43c2105f81d278bf08f5407559ee860d9038dee07ff66696907a\" returns successfully"
Oct  2 21:33:29.837984 env[1455]: time="2023-10-02T21:33:29.837942908Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-qkf4n,Uid:109a1c21-ae79-4281-81b4-7b2bcab3876b,Namespace:kube-system,Attempt:1,}"
Oct  2 21:33:29.838268 systemd[1]: run-netns-cni\x2d19a65967\x2d8e7c\x2da03c\x2df98e\x2d839a2014848a.mount: Deactivated successfully.
Oct  2 21:33:29.844404 env[1455]: 2023-10-02 21:33:29.820 [INFO][4203] k8s.go 576: Cleaning up netns ContainerID="fc1f2b39cec18d0737c2ebd9e4b62ab912d3224915559a5a84367a29f4d9ddd3"
Oct  2 21:33:29.844404 env[1455]: 2023-10-02 21:33:29.820 [INFO][4203] dataplane_linux.go 524: Deleting workload's device in netns. ContainerID="fc1f2b39cec18d0737c2ebd9e4b62ab912d3224915559a5a84367a29f4d9ddd3" iface="eth0" netns="/var/run/netns/cni-586eaef1-0309-7679-a698-8afb731658af"
Oct  2 21:33:29.844404 env[1455]: 2023-10-02 21:33:29.821 [INFO][4203] dataplane_linux.go 535: Entered netns, deleting veth. ContainerID="fc1f2b39cec18d0737c2ebd9e4b62ab912d3224915559a5a84367a29f4d9ddd3" iface="eth0" netns="/var/run/netns/cni-586eaef1-0309-7679-a698-8afb731658af"
Oct  2 21:33:29.844404 env[1455]: 2023-10-02 21:33:29.821 [INFO][4203] dataplane_linux.go 562: Workload's veth was already gone.  Nothing to do. ContainerID="fc1f2b39cec18d0737c2ebd9e4b62ab912d3224915559a5a84367a29f4d9ddd3" iface="eth0" netns="/var/run/netns/cni-586eaef1-0309-7679-a698-8afb731658af"
Oct  2 21:33:29.844404 env[1455]: 2023-10-02 21:33:29.821 [INFO][4203] k8s.go 583: Releasing IP address(es) ContainerID="fc1f2b39cec18d0737c2ebd9e4b62ab912d3224915559a5a84367a29f4d9ddd3"
Oct  2 21:33:29.844404 env[1455]: 2023-10-02 21:33:29.821 [INFO][4203] utils.go 196: Calico CNI releasing IP address ContainerID="fc1f2b39cec18d0737c2ebd9e4b62ab912d3224915559a5a84367a29f4d9ddd3"
Oct  2 21:33:29.844404 env[1455]: 2023-10-02 21:33:29.831 [INFO][4236] ipam_plugin.go 416: Releasing address using handleID ContainerID="fc1f2b39cec18d0737c2ebd9e4b62ab912d3224915559a5a84367a29f4d9ddd3" HandleID="k8s-pod-network.fc1f2b39cec18d0737c2ebd9e4b62ab912d3224915559a5a84367a29f4d9ddd3" Workload="ci--3510.3.0--a--a1bcd9ea1c-k8s-coredns--5dd5756b68--7p5tc-eth0"
Oct  2 21:33:29.844404 env[1455]: time="2023-10-02T21:33:29Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357"
Oct  2 21:33:29.844404 env[1455]: time="2023-10-02T21:33:29Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372"
Oct  2 21:33:29.844404 env[1455]: 2023-10-02 21:33:29.839 [WARNING][4236] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="fc1f2b39cec18d0737c2ebd9e4b62ab912d3224915559a5a84367a29f4d9ddd3" HandleID="k8s-pod-network.fc1f2b39cec18d0737c2ebd9e4b62ab912d3224915559a5a84367a29f4d9ddd3" Workload="ci--3510.3.0--a--a1bcd9ea1c-k8s-coredns--5dd5756b68--7p5tc-eth0"
Oct  2 21:33:29.844404 env[1455]: 2023-10-02 21:33:29.839 [INFO][4236] ipam_plugin.go 444: Releasing address using workloadID ContainerID="fc1f2b39cec18d0737c2ebd9e4b62ab912d3224915559a5a84367a29f4d9ddd3" HandleID="k8s-pod-network.fc1f2b39cec18d0737c2ebd9e4b62ab912d3224915559a5a84367a29f4d9ddd3" Workload="ci--3510.3.0--a--a1bcd9ea1c-k8s-coredns--5dd5756b68--7p5tc-eth0"
Oct  2 21:33:29.844404 env[1455]: time="2023-10-02T21:33:29Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378"
Oct  2 21:33:29.844404 env[1455]: 2023-10-02 21:33:29.841 [INFO][4203] k8s.go 589: Teardown processing complete. ContainerID="fc1f2b39cec18d0737c2ebd9e4b62ab912d3224915559a5a84367a29f4d9ddd3"
Oct  2 21:33:29.844710 env[1455]: time="2023-10-02T21:33:29.844497471Z" level=info msg="TearDown network for sandbox \"fc1f2b39cec18d0737c2ebd9e4b62ab912d3224915559a5a84367a29f4d9ddd3\" successfully"
Oct  2 21:33:29.844710 env[1455]: time="2023-10-02T21:33:29.844519359Z" level=info msg="StopPodSandbox for \"fc1f2b39cec18d0737c2ebd9e4b62ab912d3224915559a5a84367a29f4d9ddd3\" returns successfully"
Oct  2 21:33:29.844952 env[1455]: time="2023-10-02T21:33:29.844932482Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-7p5tc,Uid:08a61aaa-2cf9-4b33-86ce-8de9f79ca724,Namespace:kube-system,Attempt:1,}"
Oct  2 21:33:29.845341 systemd[1]: run-netns-cni\x2d586eaef1\x2d0309\x2d7679\x2da698\x2d8afb731658af.mount: Deactivated successfully.
Oct  2 21:33:29.987258 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready
Oct  2 21:33:29.987333 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calic84721f7a90: link becomes ready
Oct  2 21:33:30.016537 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali7f20f82f84e: link becomes ready
Oct  2 21:33:30.055071 systemd-networkd[1301]: calic84721f7a90: Link UP
Oct  2 21:33:30.055074 systemd-networkd[1301]: calic84721f7a90: Gained carrier
Oct  2 21:33:30.084558 systemd-networkd[1301]: cali7f20f82f84e: Link UP
Oct  2 21:33:30.084574 systemd-networkd[1301]: cali7f20f82f84e: Gained carrier
Oct  2 21:33:30.103259 env[1455]: 2023-10-02 21:33:29.860 [INFO][4263] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.0--a--a1bcd9ea1c-k8s-coredns--5dd5756b68--qkf4n-eth0 coredns-5dd5756b68- kube-system  109a1c21-ae79-4281-81b4-7b2bcab3876b 699 0 2023-10-02 21:32:58 +0000 UTC <nil> <nil> map[k8s-app:kube-dns pod-template-hash:5dd5756b68 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] []  []} {k8s  ci-3510.3.0-a-a1bcd9ea1c  coredns-5dd5756b68-qkf4n eth0 coredns [] []   [kns.kube-system ksa.kube-system.coredns] calic84721f7a90  [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="80e61dfe4083f5226d94c674bf6b923d0e75e6dd0a59400e2b6fbb80451328a0" Namespace="kube-system" Pod="coredns-5dd5756b68-qkf4n" WorkloadEndpoint="ci--3510.3.0--a--a1bcd9ea1c-k8s-coredns--5dd5756b68--qkf4n-"
Oct  2 21:33:30.103259 env[1455]: 2023-10-02 21:33:29.860 [INFO][4263] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="80e61dfe4083f5226d94c674bf6b923d0e75e6dd0a59400e2b6fbb80451328a0" Namespace="kube-system" Pod="coredns-5dd5756b68-qkf4n" WorkloadEndpoint="ci--3510.3.0--a--a1bcd9ea1c-k8s-coredns--5dd5756b68--qkf4n-eth0"
Oct  2 21:33:30.103259 env[1455]: 2023-10-02 21:33:29.876 [INFO][4305] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="80e61dfe4083f5226d94c674bf6b923d0e75e6dd0a59400e2b6fbb80451328a0" HandleID="k8s-pod-network.80e61dfe4083f5226d94c674bf6b923d0e75e6dd0a59400e2b6fbb80451328a0" Workload="ci--3510.3.0--a--a1bcd9ea1c-k8s-coredns--5dd5756b68--qkf4n-eth0"
Oct  2 21:33:30.103259 env[1455]: 2023-10-02 21:33:29.884 [INFO][4305] ipam_plugin.go 269: Auto assigning IP ContainerID="80e61dfe4083f5226d94c674bf6b923d0e75e6dd0a59400e2b6fbb80451328a0" HandleID="k8s-pod-network.80e61dfe4083f5226d94c674bf6b923d0e75e6dd0a59400e2b6fbb80451328a0" Workload="ci--3510.3.0--a--a1bcd9ea1c-k8s-coredns--5dd5756b68--qkf4n-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0001cb4d0), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510.3.0-a-a1bcd9ea1c", "pod":"coredns-5dd5756b68-qkf4n", "timestamp":"2023-10-02 21:33:29.87685396 +0000 UTC"}, Hostname:"ci-3510.3.0-a-a1bcd9ea1c", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"}
Oct  2 21:33:30.103259 env[1455]: time="2023-10-02T21:33:29Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357"
Oct  2 21:33:30.103259 env[1455]: time="2023-10-02T21:33:29Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372"
Oct  2 21:33:30.103259 env[1455]: 2023-10-02 21:33:29.884 [INFO][4305] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.0-a-a1bcd9ea1c'
Oct  2 21:33:30.103259 env[1455]: 2023-10-02 21:33:29.885 [INFO][4305] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.80e61dfe4083f5226d94c674bf6b923d0e75e6dd0a59400e2b6fbb80451328a0" host="ci-3510.3.0-a-a1bcd9ea1c"
Oct  2 21:33:30.103259 env[1455]: 2023-10-02 21:33:29.888 [INFO][4305] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.0-a-a1bcd9ea1c"
Oct  2 21:33:30.103259 env[1455]: 2023-10-02 21:33:29.891 [INFO][4305] ipam.go 489: Trying affinity for 192.168.32.64/26 host="ci-3510.3.0-a-a1bcd9ea1c"
Oct  2 21:33:30.103259 env[1455]: 2023-10-02 21:33:29.892 [INFO][4305] ipam.go 155: Attempting to load block cidr=192.168.32.64/26 host="ci-3510.3.0-a-a1bcd9ea1c"
Oct  2 21:33:30.103259 env[1455]: 2023-10-02 21:33:29.894 [INFO][4305] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.32.64/26 host="ci-3510.3.0-a-a1bcd9ea1c"
Oct  2 21:33:30.103259 env[1455]: 2023-10-02 21:33:29.894 [INFO][4305] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.32.64/26 handle="k8s-pod-network.80e61dfe4083f5226d94c674bf6b923d0e75e6dd0a59400e2b6fbb80451328a0" host="ci-3510.3.0-a-a1bcd9ea1c"
Oct  2 21:33:30.103259 env[1455]: 2023-10-02 21:33:29.895 [INFO][4305] ipam.go 1682: Creating new handle: k8s-pod-network.80e61dfe4083f5226d94c674bf6b923d0e75e6dd0a59400e2b6fbb80451328a0
Oct  2 21:33:30.103259 env[1455]: 2023-10-02 21:33:29.899 [INFO][4305] ipam.go 1203: Writing block in order to claim IPs block=192.168.32.64/26 handle="k8s-pod-network.80e61dfe4083f5226d94c674bf6b923d0e75e6dd0a59400e2b6fbb80451328a0" host="ci-3510.3.0-a-a1bcd9ea1c"
Oct  2 21:33:30.103259 env[1455]: 2023-10-02 21:33:29.911 [INFO][4305] ipam.go 1216: Successfully claimed IPs: [192.168.32.65/26] block=192.168.32.64/26 handle="k8s-pod-network.80e61dfe4083f5226d94c674bf6b923d0e75e6dd0a59400e2b6fbb80451328a0" host="ci-3510.3.0-a-a1bcd9ea1c"
Oct  2 21:33:30.103259 env[1455]: 2023-10-02 21:33:29.912 [INFO][4305] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.32.65/26] handle="k8s-pod-network.80e61dfe4083f5226d94c674bf6b923d0e75e6dd0a59400e2b6fbb80451328a0" host="ci-3510.3.0-a-a1bcd9ea1c"
Oct  2 21:33:30.103259 env[1455]: time="2023-10-02T21:33:29Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378"
Oct  2 21:33:30.103259 env[1455]: 2023-10-02 21:33:29.912 [INFO][4305] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.32.65/26] IPv6=[] ContainerID="80e61dfe4083f5226d94c674bf6b923d0e75e6dd0a59400e2b6fbb80451328a0" HandleID="k8s-pod-network.80e61dfe4083f5226d94c674bf6b923d0e75e6dd0a59400e2b6fbb80451328a0" Workload="ci--3510.3.0--a--a1bcd9ea1c-k8s-coredns--5dd5756b68--qkf4n-eth0"
Oct  2 21:33:30.106576 env[1455]: 2023-10-02 21:33:29.916 [INFO][4263] k8s.go 383: Populated endpoint ContainerID="80e61dfe4083f5226d94c674bf6b923d0e75e6dd0a59400e2b6fbb80451328a0" Namespace="kube-system" Pod="coredns-5dd5756b68-qkf4n" WorkloadEndpoint="ci--3510.3.0--a--a1bcd9ea1c-k8s-coredns--5dd5756b68--qkf4n-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--a1bcd9ea1c-k8s-coredns--5dd5756b68--qkf4n-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"109a1c21-ae79-4281-81b4-7b2bcab3876b", ResourceVersion:"699", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 21, 32, 58, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-a1bcd9ea1c", ContainerID:"", Pod:"coredns-5dd5756b68-qkf4n", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.32.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calic84721f7a90", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}}
Oct  2 21:33:30.106576 env[1455]: 2023-10-02 21:33:29.917 [INFO][4263] k8s.go 384: Calico CNI using IPs: [192.168.32.65/32] ContainerID="80e61dfe4083f5226d94c674bf6b923d0e75e6dd0a59400e2b6fbb80451328a0" Namespace="kube-system" Pod="coredns-5dd5756b68-qkf4n" WorkloadEndpoint="ci--3510.3.0--a--a1bcd9ea1c-k8s-coredns--5dd5756b68--qkf4n-eth0"
Oct  2 21:33:30.106576 env[1455]: 2023-10-02 21:33:29.917 [INFO][4263] dataplane_linux.go 68: Setting the host side veth name to calic84721f7a90 ContainerID="80e61dfe4083f5226d94c674bf6b923d0e75e6dd0a59400e2b6fbb80451328a0" Namespace="kube-system" Pod="coredns-5dd5756b68-qkf4n" WorkloadEndpoint="ci--3510.3.0--a--a1bcd9ea1c-k8s-coredns--5dd5756b68--qkf4n-eth0"
Oct  2 21:33:30.106576 env[1455]: 2023-10-02 21:33:29.987 [INFO][4263] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="80e61dfe4083f5226d94c674bf6b923d0e75e6dd0a59400e2b6fbb80451328a0" Namespace="kube-system" Pod="coredns-5dd5756b68-qkf4n" WorkloadEndpoint="ci--3510.3.0--a--a1bcd9ea1c-k8s-coredns--5dd5756b68--qkf4n-eth0"
Oct  2 21:33:30.106576 env[1455]: 2023-10-02 21:33:30.083 [INFO][4263] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="80e61dfe4083f5226d94c674bf6b923d0e75e6dd0a59400e2b6fbb80451328a0" Namespace="kube-system" Pod="coredns-5dd5756b68-qkf4n" WorkloadEndpoint="ci--3510.3.0--a--a1bcd9ea1c-k8s-coredns--5dd5756b68--qkf4n-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--a1bcd9ea1c-k8s-coredns--5dd5756b68--qkf4n-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"109a1c21-ae79-4281-81b4-7b2bcab3876b", ResourceVersion:"699", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 21, 32, 58, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-a1bcd9ea1c", ContainerID:"80e61dfe4083f5226d94c674bf6b923d0e75e6dd0a59400e2b6fbb80451328a0", Pod:"coredns-5dd5756b68-qkf4n", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.32.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calic84721f7a90", MAC:"56:56:07:db:4d:f6", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}}
Oct  2 21:33:30.106576 env[1455]: 2023-10-02 21:33:30.099 [INFO][4263] k8s.go 489: Wrote updated endpoint to datastore ContainerID="80e61dfe4083f5226d94c674bf6b923d0e75e6dd0a59400e2b6fbb80451328a0" Namespace="kube-system" Pod="coredns-5dd5756b68-qkf4n" WorkloadEndpoint="ci--3510.3.0--a--a1bcd9ea1c-k8s-coredns--5dd5756b68--qkf4n-eth0"
Oct  2 21:33:30.113238 env[1455]: 2023-10-02 21:33:29.866 [INFO][4280] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.0--a--a1bcd9ea1c-k8s-coredns--5dd5756b68--7p5tc-eth0 coredns-5dd5756b68- kube-system  08a61aaa-2cf9-4b33-86ce-8de9f79ca724 700 0 2023-10-02 21:32:58 +0000 UTC <nil> <nil> map[k8s-app:kube-dns pod-template-hash:5dd5756b68 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] []  []} {k8s  ci-3510.3.0-a-a1bcd9ea1c  coredns-5dd5756b68-7p5tc eth0 coredns [] []   [kns.kube-system ksa.kube-system.coredns] cali7f20f82f84e  [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="f8929669586a29e8abd1e0077e97a3a691b7cced59fa55772320a22d344c7769" Namespace="kube-system" Pod="coredns-5dd5756b68-7p5tc" WorkloadEndpoint="ci--3510.3.0--a--a1bcd9ea1c-k8s-coredns--5dd5756b68--7p5tc-"
Oct  2 21:33:30.113238 env[1455]: 2023-10-02 21:33:29.866 [INFO][4280] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="f8929669586a29e8abd1e0077e97a3a691b7cced59fa55772320a22d344c7769" Namespace="kube-system" Pod="coredns-5dd5756b68-7p5tc" WorkloadEndpoint="ci--3510.3.0--a--a1bcd9ea1c-k8s-coredns--5dd5756b68--7p5tc-eth0"
Oct  2 21:33:30.113238 env[1455]: 2023-10-02 21:33:29.880 [INFO][4313] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="f8929669586a29e8abd1e0077e97a3a691b7cced59fa55772320a22d344c7769" HandleID="k8s-pod-network.f8929669586a29e8abd1e0077e97a3a691b7cced59fa55772320a22d344c7769" Workload="ci--3510.3.0--a--a1bcd9ea1c-k8s-coredns--5dd5756b68--7p5tc-eth0"
Oct  2 21:33:30.113238 env[1455]: 2023-10-02 21:33:29.886 [INFO][4313] ipam_plugin.go 269: Auto assigning IP ContainerID="f8929669586a29e8abd1e0077e97a3a691b7cced59fa55772320a22d344c7769" HandleID="k8s-pod-network.f8929669586a29e8abd1e0077e97a3a691b7cced59fa55772320a22d344c7769" Workload="ci--3510.3.0--a--a1bcd9ea1c-k8s-coredns--5dd5756b68--7p5tc-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0001c5610), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510.3.0-a-a1bcd9ea1c", "pod":"coredns-5dd5756b68-7p5tc", "timestamp":"2023-10-02 21:33:29.880500965 +0000 UTC"}, Hostname:"ci-3510.3.0-a-a1bcd9ea1c", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"}
Oct  2 21:33:30.113238 env[1455]: time="2023-10-02T21:33:29Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357"
Oct  2 21:33:30.113238 env[1455]: time="2023-10-02T21:33:29Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372"
Oct  2 21:33:30.113238 env[1455]: 2023-10-02 21:33:29.912 [INFO][4313] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.0-a-a1bcd9ea1c'
Oct  2 21:33:30.113238 env[1455]: 2023-10-02 21:33:29.917 [INFO][4313] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.f8929669586a29e8abd1e0077e97a3a691b7cced59fa55772320a22d344c7769" host="ci-3510.3.0-a-a1bcd9ea1c"
Oct  2 21:33:30.113238 env[1455]: 2023-10-02 21:33:29.926 [INFO][4313] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.0-a-a1bcd9ea1c"
Oct  2 21:33:30.113238 env[1455]: 2023-10-02 21:33:29.959 [INFO][4313] ipam.go 489: Trying affinity for 192.168.32.64/26 host="ci-3510.3.0-a-a1bcd9ea1c"
Oct  2 21:33:30.113238 env[1455]: 2023-10-02 21:33:29.961 [INFO][4313] ipam.go 155: Attempting to load block cidr=192.168.32.64/26 host="ci-3510.3.0-a-a1bcd9ea1c"
Oct  2 21:33:30.113238 env[1455]: 2023-10-02 21:33:29.963 [INFO][4313] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.32.64/26 host="ci-3510.3.0-a-a1bcd9ea1c"
Oct  2 21:33:30.113238 env[1455]: 2023-10-02 21:33:29.963 [INFO][4313] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.32.64/26 handle="k8s-pod-network.f8929669586a29e8abd1e0077e97a3a691b7cced59fa55772320a22d344c7769" host="ci-3510.3.0-a-a1bcd9ea1c"
Oct  2 21:33:30.113238 env[1455]: 2023-10-02 21:33:29.964 [INFO][4313] ipam.go 1682: Creating new handle: k8s-pod-network.f8929669586a29e8abd1e0077e97a3a691b7cced59fa55772320a22d344c7769
Oct  2 21:33:30.113238 env[1455]: 2023-10-02 21:33:29.967 [INFO][4313] ipam.go 1203: Writing block in order to claim IPs block=192.168.32.64/26 handle="k8s-pod-network.f8929669586a29e8abd1e0077e97a3a691b7cced59fa55772320a22d344c7769" host="ci-3510.3.0-a-a1bcd9ea1c"
Oct  2 21:33:30.113238 env[1455]: 2023-10-02 21:33:29.970 [INFO][4313] ipam.go 1216: Successfully claimed IPs: [192.168.32.66/26] block=192.168.32.64/26 handle="k8s-pod-network.f8929669586a29e8abd1e0077e97a3a691b7cced59fa55772320a22d344c7769" host="ci-3510.3.0-a-a1bcd9ea1c"
Oct  2 21:33:30.113238 env[1455]: 2023-10-02 21:33:29.970 [INFO][4313] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.32.66/26] handle="k8s-pod-network.f8929669586a29e8abd1e0077e97a3a691b7cced59fa55772320a22d344c7769" host="ci-3510.3.0-a-a1bcd9ea1c"
Oct  2 21:33:30.113238 env[1455]: time="2023-10-02T21:33:29Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378"
Oct  2 21:33:30.113238 env[1455]: 2023-10-02 21:33:29.970 [INFO][4313] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.32.66/26] IPv6=[] ContainerID="f8929669586a29e8abd1e0077e97a3a691b7cced59fa55772320a22d344c7769" HandleID="k8s-pod-network.f8929669586a29e8abd1e0077e97a3a691b7cced59fa55772320a22d344c7769" Workload="ci--3510.3.0--a--a1bcd9ea1c-k8s-coredns--5dd5756b68--7p5tc-eth0"
Oct  2 21:33:30.116014 env[1455]: 2023-10-02 21:33:29.971 [INFO][4280] k8s.go 383: Populated endpoint ContainerID="f8929669586a29e8abd1e0077e97a3a691b7cced59fa55772320a22d344c7769" Namespace="kube-system" Pod="coredns-5dd5756b68-7p5tc" WorkloadEndpoint="ci--3510.3.0--a--a1bcd9ea1c-k8s-coredns--5dd5756b68--7p5tc-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--a1bcd9ea1c-k8s-coredns--5dd5756b68--7p5tc-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"08a61aaa-2cf9-4b33-86ce-8de9f79ca724", ResourceVersion:"700", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 21, 32, 58, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-a1bcd9ea1c", ContainerID:"", Pod:"coredns-5dd5756b68-7p5tc", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.32.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali7f20f82f84e", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}}
Oct  2 21:33:30.116014 env[1455]: 2023-10-02 21:33:29.971 [INFO][4280] k8s.go 384: Calico CNI using IPs: [192.168.32.66/32] ContainerID="f8929669586a29e8abd1e0077e97a3a691b7cced59fa55772320a22d344c7769" Namespace="kube-system" Pod="coredns-5dd5756b68-7p5tc" WorkloadEndpoint="ci--3510.3.0--a--a1bcd9ea1c-k8s-coredns--5dd5756b68--7p5tc-eth0"
Oct  2 21:33:30.116014 env[1455]: 2023-10-02 21:33:29.971 [INFO][4280] dataplane_linux.go 68: Setting the host side veth name to cali7f20f82f84e ContainerID="f8929669586a29e8abd1e0077e97a3a691b7cced59fa55772320a22d344c7769" Namespace="kube-system" Pod="coredns-5dd5756b68-7p5tc" WorkloadEndpoint="ci--3510.3.0--a--a1bcd9ea1c-k8s-coredns--5dd5756b68--7p5tc-eth0"
Oct  2 21:33:30.116014 env[1455]: 2023-10-02 21:33:30.054 [INFO][4280] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="f8929669586a29e8abd1e0077e97a3a691b7cced59fa55772320a22d344c7769" Namespace="kube-system" Pod="coredns-5dd5756b68-7p5tc" WorkloadEndpoint="ci--3510.3.0--a--a1bcd9ea1c-k8s-coredns--5dd5756b68--7p5tc-eth0"
Oct  2 21:33:30.116014 env[1455]: 2023-10-02 21:33:30.084 [INFO][4280] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="f8929669586a29e8abd1e0077e97a3a691b7cced59fa55772320a22d344c7769" Namespace="kube-system" Pod="coredns-5dd5756b68-7p5tc" WorkloadEndpoint="ci--3510.3.0--a--a1bcd9ea1c-k8s-coredns--5dd5756b68--7p5tc-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--a1bcd9ea1c-k8s-coredns--5dd5756b68--7p5tc-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"08a61aaa-2cf9-4b33-86ce-8de9f79ca724", ResourceVersion:"700", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 21, 32, 58, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-a1bcd9ea1c", ContainerID:"f8929669586a29e8abd1e0077e97a3a691b7cced59fa55772320a22d344c7769", Pod:"coredns-5dd5756b68-7p5tc", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.32.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali7f20f82f84e", MAC:"56:66:06:a4:77:5c", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}}
Oct  2 21:33:30.116014 env[1455]: 2023-10-02 21:33:30.103 [INFO][4280] k8s.go 489: Wrote updated endpoint to datastore ContainerID="f8929669586a29e8abd1e0077e97a3a691b7cced59fa55772320a22d344c7769" Namespace="kube-system" Pod="coredns-5dd5756b68-7p5tc" WorkloadEndpoint="ci--3510.3.0--a--a1bcd9ea1c-k8s-coredns--5dd5756b68--7p5tc-eth0"
Oct  2 21:33:30.128279 env[1455]: time="2023-10-02T21:33:30.128203816Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1
Oct  2 21:33:30.128279 env[1455]: time="2023-10-02T21:33:30.128251114Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1
Oct  2 21:33:30.128279 env[1455]: time="2023-10-02T21:33:30.128267685Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1
Oct  2 21:33:30.128623 env[1455]: time="2023-10-02T21:33:30.128427689Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/80e61dfe4083f5226d94c674bf6b923d0e75e6dd0a59400e2b6fbb80451328a0 pid=4379 runtime=io.containerd.runc.v2
Oct  2 21:33:30.130922 env[1455]: time="2023-10-02T21:33:30.130828667Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1
Oct  2 21:33:30.130922 env[1455]: time="2023-10-02T21:33:30.130878005Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1
Oct  2 21:33:30.130922 env[1455]: time="2023-10-02T21:33:30.130893761Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1
Oct  2 21:33:30.131142 env[1455]: time="2023-10-02T21:33:30.131046101Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f8929669586a29e8abd1e0077e97a3a691b7cced59fa55772320a22d344c7769 pid=4391 runtime=io.containerd.runc.v2
Oct  2 21:33:30.132000 audit[4406]: NETFILTER_CFG table=filter:101 family=2 entries=58 op=nft_register_chain pid=4406 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re"
Oct  2 21:33:30.151690 systemd[1]: Started cri-containerd-80e61dfe4083f5226d94c674bf6b923d0e75e6dd0a59400e2b6fbb80451328a0.scope.
Oct  2 21:33:30.152453 systemd[1]: Started cri-containerd-f8929669586a29e8abd1e0077e97a3a691b7cced59fa55772320a22d344c7769.scope.
Oct  2 21:33:30.160418 kernel: kauditd_printk_skb: 151 callbacks suppressed
Oct  2 21:33:30.160502 kernel: audit: type=1325 audit(1696282410.132:1171): table=filter:101 family=2 entries=58 op=nft_register_chain pid=4406 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re"
Oct  2 21:33:30.132000 audit[4406]: SYSCALL arch=c000003e syscall=46 success=yes exit=33688 a0=3 a1=7ffd19af0880 a2=0 a3=7ffd19af086c items=0 ppid=3906 pid=4406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:33:30.218444 kernel: audit: type=1300 audit(1696282410.132:1171): arch=c000003e syscall=46 success=yes exit=33688 a0=3 a1=7ffd19af0880 a2=0 a3=7ffd19af086c items=0 ppid=3906 pid=4406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:33:30.132000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030
Oct  2 21:33:30.223000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:30.435990 kernel: audit: type=1327 audit(1696282410.132:1171): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030
Oct  2 21:33:30.436025 kernel: audit: type=1400 audit(1696282410.223:1172): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:30.436053 kernel: audit: type=1400 audit(1696282410.223:1173): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:30.223000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:30.223000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:30.559956 kernel: audit: type=1400 audit(1696282410.223:1174): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:30.560032 kernel: audit: audit_backlog=65 > audit_backlog_limit=64
Oct  2 21:33:30.560067 kernel: audit: type=1400 audit(1696282410.223:1175): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:30.223000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:30.586447 kernel: audit: audit_backlog=65 > audit_backlog_limit=64
Oct  2 21:33:30.586479 kernel: audit: audit_lost=4 audit_rate_limit=0 audit_backlog_limit=64
Oct  2 21:33:30.223000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:30.223000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:30.223000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:30.223000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:30.223000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:30.372000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:30.372000 audit: BPF prog-id=152 op=LOAD
Oct  2 21:33:30.372000 audit[4402]: AVC avc:  denied  { bpf } for  pid=4402 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:30.372000 audit[4402]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=4379 pid=4402 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:33:30.372000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830653631646665343038336635323236643934633637346266366239
Oct  2 21:33:30.372000 audit[4402]: AVC avc:  denied  { perfmon } for  pid=4402 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:30.372000 audit[4402]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=4379 pid=4402 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:33:30.372000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830653631646665343038336635323236643934633637346266366239
Oct  2 21:33:30.372000 audit[4402]: AVC avc:  denied  { bpf } for  pid=4402 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:30.372000 audit[4402]: AVC avc:  denied  { bpf } for  pid=4402 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:30.372000 audit[4402]: AVC avc:  denied  { bpf } for  pid=4402 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:30.372000 audit[4402]: AVC avc:  denied  { perfmon } for  pid=4402 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:30.372000 audit[4402]: AVC avc:  denied  { perfmon } for  pid=4402 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:30.372000 audit[4402]: AVC avc:  denied  { perfmon } for  pid=4402 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:30.372000 audit[4402]: AVC avc:  denied  { perfmon } for  pid=4402 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:30.372000 audit[4402]: AVC avc:  denied  { perfmon } for  pid=4402 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:30.372000 audit[4402]: AVC avc:  denied  { bpf } for  pid=4402 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:30.373000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:30.373000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:30.373000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:30.373000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:30.373000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:30.373000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:30.373000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:30.373000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:30.373000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:30.372000 audit[4402]: AVC avc:  denied  { bpf } for  pid=4402 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:30.372000 audit: BPF prog-id=153 op=LOAD
Oct  2 21:33:30.372000 audit[4402]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c00024a940 items=0 ppid=4379 pid=4402 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:33:30.372000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830653631646665343038336635323236643934633637346266366239
Oct  2 21:33:30.496000 audit[4402]: AVC avc:  denied  { bpf } for  pid=4402 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:30.496000 audit[4402]: AVC avc:  denied  { bpf } for  pid=4402 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:30.496000 audit[4402]: AVC avc:  denied  { perfmon } for  pid=4402 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:30.496000 audit[4402]: AVC avc:  denied  { perfmon } for  pid=4402 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:30.496000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:30.496000 audit[4402]: AVC avc:  denied  { perfmon } for  pid=4402 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:30.496000 audit[4402]: AVC avc:  denied  { perfmon } for  pid=4402 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:30.496000 audit: BPF prog-id=154 op=LOAD
Oct  2 21:33:30.496000 audit[4402]: AVC avc:  denied  { perfmon } for  pid=4402 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:30.496000 audit[4402]: AVC avc:  denied  { bpf } for  pid=4402 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:30.496000 audit[4415]: AVC avc:  denied  { bpf } for  pid=4415 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:30.496000 audit[4415]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001c5c48 a2=10 a3=1c items=0 ppid=4391 pid=4415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:33:30.496000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638393239363639353836613239653861626431653030373765393761
Oct  2 21:33:30.496000 audit[4415]: AVC avc:  denied  { perfmon } for  pid=4415 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:30.496000 audit[4415]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001c56b0 a2=3c a3=c items=0 ppid=4391 pid=4415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:33:30.496000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638393239363639353836613239653861626431653030373765393761
Oct  2 21:33:30.496000 audit[4415]: AVC avc:  denied  { bpf } for  pid=4415 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:30.496000 audit[4415]: AVC avc:  denied  { bpf } for  pid=4415 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:30.496000 audit[4415]: AVC avc:  denied  { bpf } for  pid=4415 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:30.496000 audit[4415]: AVC avc:  denied  { perfmon } for  pid=4415 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:30.496000 audit[4415]: AVC avc:  denied  { perfmon } for  pid=4415 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:30.496000 audit[4415]: AVC avc:  denied  { perfmon } for  pid=4415 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:30.496000 audit[4415]: AVC avc:  denied  { perfmon } for  pid=4415 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:30.496000 audit[4415]: AVC avc:  denied  { perfmon } for  pid=4415 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:30.496000 audit[4402]: AVC avc:  denied  { bpf } for  pid=4402 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:30.496000 audit[4415]: AVC avc:  denied  { bpf } for  pid=4415 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:30.496000 audit: BPF prog-id=156 op=LOAD
Oct  2 21:33:30.496000 audit[4415]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001c59d8 a2=78 a3=c000253170 items=0 ppid=4391 pid=4415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:33:30.496000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638393239363639353836613239653861626431653030373765393761
Oct  2 21:33:30.672000 audit[4415]: AVC avc:  denied  { bpf } for  pid=4415 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:30.672000 audit[4415]: AVC avc:  denied  { bpf } for  pid=4415 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:30.672000 audit[4415]: AVC avc:  denied  { perfmon } for  pid=4415 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:30.672000 audit[4415]: AVC avc:  denied  { perfmon } for  pid=4415 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:30.672000 audit[4415]: AVC avc:  denied  { perfmon } for  pid=4415 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:30.672000 audit[4415]: AVC avc:  denied  { perfmon } for  pid=4415 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:30.672000 audit[4415]: AVC avc:  denied  { perfmon } for  pid=4415 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:30.672000 audit[4415]: AVC avc:  denied  { bpf } for  pid=4415 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:30.496000 audit[4402]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c00024a988 items=0 ppid=4379 pid=4402 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:33:30.496000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830653631646665343038336635323236643934633637346266366239
Oct  2 21:33:30.699000 audit: BPF prog-id=155 op=UNLOAD
Oct  2 21:33:30.699000 audit: BPF prog-id=153 op=UNLOAD
Oct  2 21:33:30.699000 audit[4402]: AVC avc:  denied  { bpf } for  pid=4402 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:30.699000 audit[4402]: AVC avc:  denied  { bpf } for  pid=4402 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:30.699000 audit[4402]: AVC avc:  denied  { bpf } for  pid=4402 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:30.699000 audit[4402]: AVC avc:  denied  { perfmon } for  pid=4402 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:30.699000 audit[4402]: AVC avc:  denied  { perfmon } for  pid=4402 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:30.699000 audit[4402]: AVC avc:  denied  { perfmon } for  pid=4402 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:30.699000 audit[4402]: AVC avc:  denied  { perfmon } for  pid=4402 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:30.699000 audit[4402]: AVC avc:  denied  { perfmon } for  pid=4402 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:30.699000 audit[4402]: AVC avc:  denied  { bpf } for  pid=4402 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:30.672000 audit[4415]: AVC avc:  denied  { bpf } for  pid=4415 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:30.672000 audit: BPF prog-id=157 op=LOAD
Oct  2 21:33:30.672000 audit[4415]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001c5770 a2=78 a3=c0002531b8 items=0 ppid=4391 pid=4415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:33:30.672000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638393239363639353836613239653861626431653030373765393761
Oct  2 21:33:30.699000 audit: BPF prog-id=157 op=UNLOAD
Oct  2 21:33:30.699000 audit: BPF prog-id=156 op=UNLOAD
Oct  2 21:33:30.699000 audit[4415]: AVC avc:  denied  { bpf } for  pid=4415 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:30.699000 audit[4415]: AVC avc:  denied  { bpf } for  pid=4415 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:30.699000 audit[4415]: AVC avc:  denied  { bpf } for  pid=4415 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:30.699000 audit[4415]: AVC avc:  denied  { perfmon } for  pid=4415 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:30.699000 audit[4415]: AVC avc:  denied  { perfmon } for  pid=4415 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:30.699000 audit[4415]: AVC avc:  denied  { perfmon } for  pid=4415 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:30.699000 audit[4415]: AVC avc:  denied  { perfmon } for  pid=4415 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:30.699000 audit[4415]: AVC avc:  denied  { perfmon } for  pid=4415 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:30.699000 audit[4415]: AVC avc:  denied  { bpf } for  pid=4415 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:30.699000 audit[4402]: AVC avc:  denied  { bpf } for  pid=4402 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:30.699000 audit: BPF prog-id=158 op=LOAD
Oct  2 21:33:30.699000 audit[4402]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c00024ad98 items=0 ppid=4379 pid=4402 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:33:30.699000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830653631646665343038336635323236643934633637346266366239
Oct  2 21:33:30.699000 audit[4415]: AVC avc:  denied  { bpf } for  pid=4415 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:30.699000 audit: BPF prog-id=159 op=LOAD
Oct  2 21:33:30.699000 audit[4415]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001c5c30 a2=78 a3=c0002535c8 items=0 ppid=4391 pid=4415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:33:30.699000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638393239363639353836613239653861626431653030373765393761
Oct  2 21:33:30.717863 env[1455]: time="2023-10-02T21:33:30.717838512Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-7p5tc,Uid:08a61aaa-2cf9-4b33-86ce-8de9f79ca724,Namespace:kube-system,Attempt:1,} returns sandbox id \"f8929669586a29e8abd1e0077e97a3a691b7cced59fa55772320a22d344c7769\""
Oct  2 21:33:30.719073 env[1455]: time="2023-10-02T21:33:30.719059275Z" level=info msg="CreateContainer within sandbox \"f8929669586a29e8abd1e0077e97a3a691b7cced59fa55772320a22d344c7769\" for container &ContainerMetadata{Name:coredns,Attempt:0,}"
Oct  2 21:33:30.723280 env[1455]: time="2023-10-02T21:33:30.723234829Z" level=info msg="CreateContainer within sandbox \"f8929669586a29e8abd1e0077e97a3a691b7cced59fa55772320a22d344c7769\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"b202c97c098df16df78791ba807b6c2c10aea1b51e7beb6319a1d3eff7984287\""
Oct  2 21:33:30.723504 env[1455]: time="2023-10-02T21:33:30.723462762Z" level=info msg="StartContainer for \"b202c97c098df16df78791ba807b6c2c10aea1b51e7beb6319a1d3eff7984287\""
Oct  2 21:33:30.730143 env[1455]: time="2023-10-02T21:33:30.730116659Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-qkf4n,Uid:109a1c21-ae79-4281-81b4-7b2bcab3876b,Namespace:kube-system,Attempt:1,} returns sandbox id \"80e61dfe4083f5226d94c674bf6b923d0e75e6dd0a59400e2b6fbb80451328a0\""
Oct  2 21:33:30.731062 systemd[1]: Started cri-containerd-b202c97c098df16df78791ba807b6c2c10aea1b51e7beb6319a1d3eff7984287.scope.
Oct  2 21:33:30.731526 env[1455]: time="2023-10-02T21:33:30.731510596Z" level=info msg="CreateContainer within sandbox \"80e61dfe4083f5226d94c674bf6b923d0e75e6dd0a59400e2b6fbb80451328a0\" for container &ContainerMetadata{Name:coredns,Attempt:0,}"
Oct  2 21:33:30.735576 env[1455]: time="2023-10-02T21:33:30.735522808Z" level=info msg="CreateContainer within sandbox \"80e61dfe4083f5226d94c674bf6b923d0e75e6dd0a59400e2b6fbb80451328a0\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"865550e520724856467b76f01be4febec5ba2f5b10e6ff7c113834761583dc1d\""
Oct  2 21:33:30.735853 env[1455]: time="2023-10-02T21:33:30.735835207Z" level=info msg="StartContainer for \"865550e520724856467b76f01be4febec5ba2f5b10e6ff7c113834761583dc1d\""
Oct  2 21:33:30.736000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:30.736000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:30.736000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:30.736000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:30.736000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:30.736000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:30.736000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:30.736000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:30.736000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:30.736000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:30.736000 audit: BPF prog-id=160 op=LOAD
Oct  2 21:33:30.736000 audit[4467]: AVC avc:  denied  { bpf } for  pid=4467 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:30.736000 audit[4467]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4391 pid=4467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:33:30.736000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232303263393763303938646631366466373837393162613830376236
Oct  2 21:33:30.736000 audit[4467]: AVC avc:  denied  { perfmon } for  pid=4467 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:30.736000 audit[4467]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4391 pid=4467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:33:30.736000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232303263393763303938646631366466373837393162613830376236
Oct  2 21:33:30.736000 audit[4467]: AVC avc:  denied  { bpf } for  pid=4467 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:30.736000 audit[4467]: AVC avc:  denied  { bpf } for  pid=4467 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:30.736000 audit[4467]: AVC avc:  denied  { bpf } for  pid=4467 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:30.736000 audit[4467]: AVC avc:  denied  { perfmon } for  pid=4467 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:30.736000 audit[4467]: AVC avc:  denied  { perfmon } for  pid=4467 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:30.736000 audit[4467]: AVC avc:  denied  { perfmon } for  pid=4467 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:30.736000 audit[4467]: AVC avc:  denied  { perfmon } for  pid=4467 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:30.736000 audit[4467]: AVC avc:  denied  { perfmon } for  pid=4467 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:30.736000 audit[4467]: AVC avc:  denied  { bpf } for  pid=4467 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:30.736000 audit[4467]: AVC avc:  denied  { bpf } for  pid=4467 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:30.736000 audit: BPF prog-id=161 op=LOAD
Oct  2 21:33:30.736000 audit[4467]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0002fe950 items=0 ppid=4391 pid=4467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:33:30.736000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232303263393763303938646631366466373837393162613830376236
Oct  2 21:33:30.736000 audit[4467]: AVC avc:  denied  { bpf } for  pid=4467 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:30.736000 audit[4467]: AVC avc:  denied  { bpf } for  pid=4467 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:30.736000 audit[4467]: AVC avc:  denied  { perfmon } for  pid=4467 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:30.736000 audit[4467]: AVC avc:  denied  { perfmon } for  pid=4467 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:30.736000 audit[4467]: AVC avc:  denied  { perfmon } for  pid=4467 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:30.736000 audit[4467]: AVC avc:  denied  { perfmon } for  pid=4467 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:30.736000 audit[4467]: AVC avc:  denied  { perfmon } for  pid=4467 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:30.736000 audit[4467]: AVC avc:  denied  { bpf } for  pid=4467 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:30.736000 audit[4467]: AVC avc:  denied  { bpf } for  pid=4467 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:30.736000 audit: BPF prog-id=162 op=LOAD
Oct  2 21:33:30.736000 audit[4467]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0002fe998 items=0 ppid=4391 pid=4467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:33:30.736000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232303263393763303938646631366466373837393162613830376236
Oct  2 21:33:30.736000 audit: BPF prog-id=162 op=UNLOAD
Oct  2 21:33:30.736000 audit: BPF prog-id=161 op=UNLOAD
Oct  2 21:33:30.736000 audit[4467]: AVC avc:  denied  { bpf } for  pid=4467 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:30.736000 audit[4467]: AVC avc:  denied  { bpf } for  pid=4467 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:30.736000 audit[4467]: AVC avc:  denied  { bpf } for  pid=4467 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:30.736000 audit[4467]: AVC avc:  denied  { perfmon } for  pid=4467 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:30.736000 audit[4467]: AVC avc:  denied  { perfmon } for  pid=4467 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:30.736000 audit[4467]: AVC avc:  denied  { perfmon } for  pid=4467 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:30.736000 audit[4467]: AVC avc:  denied  { perfmon } for  pid=4467 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:30.736000 audit[4467]: AVC avc:  denied  { perfmon } for  pid=4467 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:30.736000 audit[4467]: AVC avc:  denied  { bpf } for  pid=4467 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:30.736000 audit[4467]: AVC avc:  denied  { bpf } for  pid=4467 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:30.736000 audit: BPF prog-id=163 op=LOAD
Oct  2 21:33:30.736000 audit[4467]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0002feda8 items=0 ppid=4391 pid=4467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:33:30.736000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232303263393763303938646631366466373837393162613830376236
Oct  2 21:33:30.755554 systemd[1]: Started cri-containerd-865550e520724856467b76f01be4febec5ba2f5b10e6ff7c113834761583dc1d.scope.
Oct  2 21:33:30.757312 env[1455]: time="2023-10-02T21:33:30.757291384Z" level=info msg="StartContainer for \"b202c97c098df16df78791ba807b6c2c10aea1b51e7beb6319a1d3eff7984287\" returns successfully"
Oct  2 21:33:30.760000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:30.760000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:30.760000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:30.760000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:30.760000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:30.760000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:30.760000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:30.760000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:30.760000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:30.760000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:30.760000 audit: BPF prog-id=164 op=LOAD
Oct  2 21:33:30.761000 audit[4490]: AVC avc:  denied  { bpf } for  pid=4490 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:30.761000 audit[4490]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=4379 pid=4490 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:33:30.761000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836353535306535323037323438353634363762373666303162653466
Oct  2 21:33:30.761000 audit[4490]: AVC avc:  denied  { perfmon } for  pid=4490 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:30.761000 audit[4490]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=c items=0 ppid=4379 pid=4490 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:33:30.761000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836353535306535323037323438353634363762373666303162653466
Oct  2 21:33:30.761000 audit[4490]: AVC avc:  denied  { bpf } for  pid=4490 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:30.761000 audit[4490]: AVC avc:  denied  { bpf } for  pid=4490 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:30.761000 audit[4490]: AVC avc:  denied  { bpf } for  pid=4490 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:30.761000 audit[4490]: AVC avc:  denied  { perfmon } for  pid=4490 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:30.761000 audit[4490]: AVC avc:  denied  { perfmon } for  pid=4490 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:30.761000 audit[4490]: AVC avc:  denied  { perfmon } for  pid=4490 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:30.761000 audit[4490]: AVC avc:  denied  { perfmon } for  pid=4490 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:30.761000 audit[4490]: AVC avc:  denied  { perfmon } for  pid=4490 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:30.761000 audit[4490]: AVC avc:  denied  { bpf } for  pid=4490 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:30.761000 audit[4490]: AVC avc:  denied  { bpf } for  pid=4490 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:30.761000 audit: BPF prog-id=165 op=LOAD
Oct  2 21:33:30.761000 audit[4490]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c0001e0e30 items=0 ppid=4379 pid=4490 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:33:30.761000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836353535306535323037323438353634363762373666303162653466
Oct  2 21:33:30.761000 audit[4490]: AVC avc:  denied  { bpf } for  pid=4490 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:30.761000 audit[4490]: AVC avc:  denied  { bpf } for  pid=4490 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:30.761000 audit[4490]: AVC avc:  denied  { perfmon } for  pid=4490 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:30.761000 audit[4490]: AVC avc:  denied  { perfmon } for  pid=4490 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:30.761000 audit[4490]: AVC avc:  denied  { perfmon } for  pid=4490 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:30.761000 audit[4490]: AVC avc:  denied  { perfmon } for  pid=4490 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:30.761000 audit[4490]: AVC avc:  denied  { perfmon } for  pid=4490 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:30.761000 audit[4490]: AVC avc:  denied  { bpf } for  pid=4490 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:30.761000 audit[4490]: AVC avc:  denied  { bpf } for  pid=4490 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:30.761000 audit: BPF prog-id=166 op=LOAD
Oct  2 21:33:30.761000 audit[4490]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c0001e0e78 items=0 ppid=4379 pid=4490 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:33:30.761000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836353535306535323037323438353634363762373666303162653466
Oct  2 21:33:30.761000 audit: BPF prog-id=166 op=UNLOAD
Oct  2 21:33:30.761000 audit: BPF prog-id=165 op=UNLOAD
Oct  2 21:33:30.761000 audit[4490]: AVC avc:  denied  { bpf } for  pid=4490 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:30.761000 audit[4490]: AVC avc:  denied  { bpf } for  pid=4490 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:30.761000 audit[4490]: AVC avc:  denied  { bpf } for  pid=4490 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:30.761000 audit[4490]: AVC avc:  denied  { perfmon } for  pid=4490 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:30.761000 audit[4490]: AVC avc:  denied  { perfmon } for  pid=4490 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:30.761000 audit[4490]: AVC avc:  denied  { perfmon } for  pid=4490 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:30.761000 audit[4490]: AVC avc:  denied  { perfmon } for  pid=4490 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:30.761000 audit[4490]: AVC avc:  denied  { perfmon } for  pid=4490 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:30.761000 audit[4490]: AVC avc:  denied  { bpf } for  pid=4490 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:30.761000 audit[4490]: AVC avc:  denied  { bpf } for  pid=4490 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:30.761000 audit: BPF prog-id=167 op=LOAD
Oct  2 21:33:30.761000 audit[4490]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c0001e1288 items=0 ppid=4379 pid=4490 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:33:30.761000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836353535306535323037323438353634363762373666303162653466
Oct  2 21:33:30.768733 env[1455]: time="2023-10-02T21:33:30.768684419Z" level=info msg="StartContainer for \"865550e520724856467b76f01be4febec5ba2f5b10e6ff7c113834761583dc1d\" returns successfully"
Oct  2 21:33:30.976311 kubelet[2553]: I1002 21:33:30.976146    2553 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-5dd5756b68-7p5tc" podStartSLOduration=32.976012061 podCreationTimestamp="2023-10-02 21:32:58 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 21:33:30.975418949 +0000 UTC m=+47.238035874" watchObservedRunningTime="2023-10-02 21:33:30.976012061 +0000 UTC m=+47.238629041"
Oct  2 21:33:30.999897 kubelet[2553]: I1002 21:33:30.999831    2553 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-5dd5756b68-qkf4n" podStartSLOduration=32.999742765 podCreationTimestamp="2023-10-02 21:32:58 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2023-10-02 21:33:30.998736054 +0000 UTC m=+47.261353006" watchObservedRunningTime="2023-10-02 21:33:30.999742765 +0000 UTC m=+47.262359670"
Oct  2 21:33:30.999000 audit[4547]: NETFILTER_CFG table=filter:102 family=2 entries=14 op=nft_register_rule pid=4547 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Oct  2 21:33:30.999000 audit[4547]: SYSCALL arch=c000003e syscall=46 success=yes exit=4956 a0=3 a1=7ffc576e6f50 a2=0 a3=7ffc576e6f3c items=0 ppid=2801 pid=4547 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:33:30.999000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Oct  2 21:33:31.000000 audit[4547]: NETFILTER_CFG table=nat:103 family=2 entries=14 op=nft_register_rule pid=4547 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Oct  2 21:33:31.000000 audit[4547]: SYSCALL arch=c000003e syscall=46 success=yes exit=3300 a0=3 a1=7ffc576e6f50 a2=0 a3=31030 items=0 ppid=2801 pid=4547 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:33:31.000000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Oct  2 21:33:31.023000 audit[4549]: NETFILTER_CFG table=filter:104 family=2 entries=11 op=nft_register_rule pid=4549 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Oct  2 21:33:31.023000 audit[4549]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7fff065d0740 a2=0 a3=7fff065d072c items=0 ppid=2801 pid=4549 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:33:31.023000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Oct  2 21:33:31.026000 audit[4549]: NETFILTER_CFG table=nat:105 family=2 entries=35 op=nft_register_chain pid=4549 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Oct  2 21:33:31.026000 audit[4549]: SYSCALL arch=c000003e syscall=46 success=yes exit=13788 a0=3 a1=7fff065d0740 a2=0 a3=7fff065d072c items=0 ppid=2801 pid=4549 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:33:31.026000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Oct  2 21:33:31.353746 systemd-networkd[1301]: cali7f20f82f84e: Gained IPv6LL
Oct  2 21:33:31.417830 systemd-networkd[1301]: calic84721f7a90: Gained IPv6LL
Oct  2 21:33:31.791776 env[1455]: time="2023-10-02T21:33:31.791694238Z" level=info msg="StopPodSandbox for \"828466ccfe00090816a76a7752a8aface1c9d36ab42a7898dcfdbf5504380056\""
Oct  2 21:33:31.887664 env[1455]: 2023-10-02 21:33:31.857 [INFO][4569] k8s.go 576: Cleaning up netns ContainerID="828466ccfe00090816a76a7752a8aface1c9d36ab42a7898dcfdbf5504380056"
Oct  2 21:33:31.887664 env[1455]: 2023-10-02 21:33:31.857 [INFO][4569] dataplane_linux.go 524: Deleting workload's device in netns. ContainerID="828466ccfe00090816a76a7752a8aface1c9d36ab42a7898dcfdbf5504380056" iface="eth0" netns="/var/run/netns/cni-81750e4f-4a85-c225-5e7d-9b6687131d2c"
Oct  2 21:33:31.887664 env[1455]: 2023-10-02 21:33:31.858 [INFO][4569] dataplane_linux.go 535: Entered netns, deleting veth. ContainerID="828466ccfe00090816a76a7752a8aface1c9d36ab42a7898dcfdbf5504380056" iface="eth0" netns="/var/run/netns/cni-81750e4f-4a85-c225-5e7d-9b6687131d2c"
Oct  2 21:33:31.887664 env[1455]: 2023-10-02 21:33:31.858 [INFO][4569] dataplane_linux.go 562: Workload's veth was already gone.  Nothing to do. ContainerID="828466ccfe00090816a76a7752a8aface1c9d36ab42a7898dcfdbf5504380056" iface="eth0" netns="/var/run/netns/cni-81750e4f-4a85-c225-5e7d-9b6687131d2c"
Oct  2 21:33:31.887664 env[1455]: 2023-10-02 21:33:31.858 [INFO][4569] k8s.go 583: Releasing IP address(es) ContainerID="828466ccfe00090816a76a7752a8aface1c9d36ab42a7898dcfdbf5504380056"
Oct  2 21:33:31.887664 env[1455]: 2023-10-02 21:33:31.858 [INFO][4569] utils.go 196: Calico CNI releasing IP address ContainerID="828466ccfe00090816a76a7752a8aface1c9d36ab42a7898dcfdbf5504380056"
Oct  2 21:33:31.887664 env[1455]: 2023-10-02 21:33:31.876 [INFO][4583] ipam_plugin.go 416: Releasing address using handleID ContainerID="828466ccfe00090816a76a7752a8aface1c9d36ab42a7898dcfdbf5504380056" HandleID="k8s-pod-network.828466ccfe00090816a76a7752a8aface1c9d36ab42a7898dcfdbf5504380056" Workload="ci--3510.3.0--a--a1bcd9ea1c-k8s-calico--kube--controllers--74b9887bb6--48chr-eth0"
Oct  2 21:33:31.887664 env[1455]: time="2023-10-02T21:33:31Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357"
Oct  2 21:33:31.887664 env[1455]: time="2023-10-02T21:33:31Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372"
Oct  2 21:33:31.887664 env[1455]: 2023-10-02 21:33:31.884 [WARNING][4583] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="828466ccfe00090816a76a7752a8aface1c9d36ab42a7898dcfdbf5504380056" HandleID="k8s-pod-network.828466ccfe00090816a76a7752a8aface1c9d36ab42a7898dcfdbf5504380056" Workload="ci--3510.3.0--a--a1bcd9ea1c-k8s-calico--kube--controllers--74b9887bb6--48chr-eth0"
Oct  2 21:33:31.887664 env[1455]: 2023-10-02 21:33:31.884 [INFO][4583] ipam_plugin.go 444: Releasing address using workloadID ContainerID="828466ccfe00090816a76a7752a8aface1c9d36ab42a7898dcfdbf5504380056" HandleID="k8s-pod-network.828466ccfe00090816a76a7752a8aface1c9d36ab42a7898dcfdbf5504380056" Workload="ci--3510.3.0--a--a1bcd9ea1c-k8s-calico--kube--controllers--74b9887bb6--48chr-eth0"
Oct  2 21:33:31.887664 env[1455]: time="2023-10-02T21:33:31Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378"
Oct  2 21:33:31.887664 env[1455]: 2023-10-02 21:33:31.886 [INFO][4569] k8s.go 589: Teardown processing complete. ContainerID="828466ccfe00090816a76a7752a8aface1c9d36ab42a7898dcfdbf5504380056"
Oct  2 21:33:31.888207 env[1455]: time="2023-10-02T21:33:31.887784612Z" level=info msg="TearDown network for sandbox \"828466ccfe00090816a76a7752a8aface1c9d36ab42a7898dcfdbf5504380056\" successfully"
Oct  2 21:33:31.888207 env[1455]: time="2023-10-02T21:33:31.887820321Z" level=info msg="StopPodSandbox for \"828466ccfe00090816a76a7752a8aface1c9d36ab42a7898dcfdbf5504380056\" returns successfully"
Oct  2 21:33:31.888383 env[1455]: time="2023-10-02T21:33:31.888358982Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-74b9887bb6-48chr,Uid:de6c269b-507a-4781-82d6-2e325f82e757,Namespace:calico-system,Attempt:1,}"
Oct  2 21:33:31.890785 systemd[1]: run-netns-cni\x2d81750e4f\x2d4a85\x2dc225\x2d5e7d\x2d9b6687131d2c.mount: Deactivated successfully.
Oct  2 21:33:32.056000 audit[4638]: NETFILTER_CFG table=filter:106 family=2 entries=8 op=nft_register_rule pid=4638 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Oct  2 21:33:32.056000 audit[4638]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffe5f29b810 a2=0 a3=7ffe5f29b7fc items=0 ppid=2801 pid=4638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:33:32.056000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Oct  2 21:33:32.082405 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready
Oct  2 21:33:32.082437 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali067854a7a9f: link becomes ready
Oct  2 21:33:32.100990 systemd-networkd[1301]: cali067854a7a9f: Link UP
Oct  2 21:33:32.100993 systemd-networkd[1301]: cali067854a7a9f: Gained carrier
Oct  2 21:33:32.102000 audit[4638]: NETFILTER_CFG table=nat:107 family=2 entries=56 op=nft_register_chain pid=4638 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Oct  2 21:33:32.102000 audit[4638]: SYSCALL arch=c000003e syscall=46 success=yes exit=19452 a0=3 a1=7ffe5f29b810 a2=0 a3=7ffe5f29b7fc items=0 ppid=2801 pid=4638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:33:32.102000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Oct  2 21:33:32.106191 env[1455]: 2023-10-02 21:33:31.966 [INFO][4599] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.0--a--a1bcd9ea1c-k8s-calico--kube--controllers--74b9887bb6--48chr-eth0 calico-kube-controllers-74b9887bb6- calico-system  de6c269b-507a-4781-82d6-2e325f82e757 725 0 2023-10-02 21:33:04 +0000 UTC <nil> <nil> map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:74b9887bb6 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] []  []} {k8s  ci-3510.3.0-a-a1bcd9ea1c  calico-kube-controllers-74b9887bb6-48chr eth0 calico-kube-controllers [] []   [kns.calico-system ksa.calico-system.calico-kube-controllers] cali067854a7a9f  [] []}} ContainerID="e092866d0f6c1935add6968abddfb8252d5fe6fa89c4424fdf812d622bef8502" Namespace="calico-system" Pod="calico-kube-controllers-74b9887bb6-48chr" WorkloadEndpoint="ci--3510.3.0--a--a1bcd9ea1c-k8s-calico--kube--controllers--74b9887bb6--48chr-"
Oct  2 21:33:32.106191 env[1455]: 2023-10-02 21:33:31.966 [INFO][4599] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="e092866d0f6c1935add6968abddfb8252d5fe6fa89c4424fdf812d622bef8502" Namespace="calico-system" Pod="calico-kube-controllers-74b9887bb6-48chr" WorkloadEndpoint="ci--3510.3.0--a--a1bcd9ea1c-k8s-calico--kube--controllers--74b9887bb6--48chr-eth0"
Oct  2 21:33:32.106191 env[1455]: 2023-10-02 21:33:32.001 [INFO][4621] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="e092866d0f6c1935add6968abddfb8252d5fe6fa89c4424fdf812d622bef8502" HandleID="k8s-pod-network.e092866d0f6c1935add6968abddfb8252d5fe6fa89c4424fdf812d622bef8502" Workload="ci--3510.3.0--a--a1bcd9ea1c-k8s-calico--kube--controllers--74b9887bb6--48chr-eth0"
Oct  2 21:33:32.106191 env[1455]: 2023-10-02 21:33:32.008 [INFO][4621] ipam_plugin.go 269: Auto assigning IP ContainerID="e092866d0f6c1935add6968abddfb8252d5fe6fa89c4424fdf812d622bef8502" HandleID="k8s-pod-network.e092866d0f6c1935add6968abddfb8252d5fe6fa89c4424fdf812d622bef8502" Workload="ci--3510.3.0--a--a1bcd9ea1c-k8s-calico--kube--controllers--74b9887bb6--48chr-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00004d8e0), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.0-a-a1bcd9ea1c", "pod":"calico-kube-controllers-74b9887bb6-48chr", "timestamp":"2023-10-02 21:33:32.001304881 +0000 UTC"}, Hostname:"ci-3510.3.0-a-a1bcd9ea1c", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"}
Oct  2 21:33:32.106191 env[1455]: time="2023-10-02T21:33:32Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357"
Oct  2 21:33:32.106191 env[1455]: time="2023-10-02T21:33:32Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372"
Oct  2 21:33:32.106191 env[1455]: 2023-10-02 21:33:32.008 [INFO][4621] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.0-a-a1bcd9ea1c'
Oct  2 21:33:32.106191 env[1455]: 2023-10-02 21:33:32.010 [INFO][4621] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.e092866d0f6c1935add6968abddfb8252d5fe6fa89c4424fdf812d622bef8502" host="ci-3510.3.0-a-a1bcd9ea1c"
Oct  2 21:33:32.106191 env[1455]: 2023-10-02 21:33:32.013 [INFO][4621] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.0-a-a1bcd9ea1c"
Oct  2 21:33:32.106191 env[1455]: 2023-10-02 21:33:32.017 [INFO][4621] ipam.go 489: Trying affinity for 192.168.32.64/26 host="ci-3510.3.0-a-a1bcd9ea1c"
Oct  2 21:33:32.106191 env[1455]: 2023-10-02 21:33:32.018 [INFO][4621] ipam.go 155: Attempting to load block cidr=192.168.32.64/26 host="ci-3510.3.0-a-a1bcd9ea1c"
Oct  2 21:33:32.106191 env[1455]: 2023-10-02 21:33:32.020 [INFO][4621] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.32.64/26 host="ci-3510.3.0-a-a1bcd9ea1c"
Oct  2 21:33:32.106191 env[1455]: 2023-10-02 21:33:32.020 [INFO][4621] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.32.64/26 handle="k8s-pod-network.e092866d0f6c1935add6968abddfb8252d5fe6fa89c4424fdf812d622bef8502" host="ci-3510.3.0-a-a1bcd9ea1c"
Oct  2 21:33:32.106191 env[1455]: 2023-10-02 21:33:32.021 [INFO][4621] ipam.go 1682: Creating new handle: k8s-pod-network.e092866d0f6c1935add6968abddfb8252d5fe6fa89c4424fdf812d622bef8502
Oct  2 21:33:32.106191 env[1455]: 2023-10-02 21:33:32.023 [INFO][4621] ipam.go 1203: Writing block in order to claim IPs block=192.168.32.64/26 handle="k8s-pod-network.e092866d0f6c1935add6968abddfb8252d5fe6fa89c4424fdf812d622bef8502" host="ci-3510.3.0-a-a1bcd9ea1c"
Oct  2 21:33:32.106191 env[1455]: 2023-10-02 21:33:32.027 [INFO][4621] ipam.go 1216: Successfully claimed IPs: [192.168.32.67/26] block=192.168.32.64/26 handle="k8s-pod-network.e092866d0f6c1935add6968abddfb8252d5fe6fa89c4424fdf812d622bef8502" host="ci-3510.3.0-a-a1bcd9ea1c"
Oct  2 21:33:32.106191 env[1455]: 2023-10-02 21:33:32.027 [INFO][4621] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.32.67/26] handle="k8s-pod-network.e092866d0f6c1935add6968abddfb8252d5fe6fa89c4424fdf812d622bef8502" host="ci-3510.3.0-a-a1bcd9ea1c"
Oct  2 21:33:32.106191 env[1455]: time="2023-10-02T21:33:32Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378"
Oct  2 21:33:32.106191 env[1455]: 2023-10-02 21:33:32.027 [INFO][4621] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.32.67/26] IPv6=[] ContainerID="e092866d0f6c1935add6968abddfb8252d5fe6fa89c4424fdf812d622bef8502" HandleID="k8s-pod-network.e092866d0f6c1935add6968abddfb8252d5fe6fa89c4424fdf812d622bef8502" Workload="ci--3510.3.0--a--a1bcd9ea1c-k8s-calico--kube--controllers--74b9887bb6--48chr-eth0"
Oct  2 21:33:32.106635 env[1455]: 2023-10-02 21:33:32.028 [INFO][4599] k8s.go 383: Populated endpoint ContainerID="e092866d0f6c1935add6968abddfb8252d5fe6fa89c4424fdf812d622bef8502" Namespace="calico-system" Pod="calico-kube-controllers-74b9887bb6-48chr" WorkloadEndpoint="ci--3510.3.0--a--a1bcd9ea1c-k8s-calico--kube--controllers--74b9887bb6--48chr-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--a1bcd9ea1c-k8s-calico--kube--controllers--74b9887bb6--48chr-eth0", GenerateName:"calico-kube-controllers-74b9887bb6-", Namespace:"calico-system", SelfLink:"", UID:"de6c269b-507a-4781-82d6-2e325f82e757", ResourceVersion:"725", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 21, 33, 4, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"74b9887bb6", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-a1bcd9ea1c", ContainerID:"", Pod:"calico-kube-controllers-74b9887bb6-48chr", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.32.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali067854a7a9f", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}}
Oct  2 21:33:32.106635 env[1455]: 2023-10-02 21:33:32.028 [INFO][4599] k8s.go 384: Calico CNI using IPs: [192.168.32.67/32] ContainerID="e092866d0f6c1935add6968abddfb8252d5fe6fa89c4424fdf812d622bef8502" Namespace="calico-system" Pod="calico-kube-controllers-74b9887bb6-48chr" WorkloadEndpoint="ci--3510.3.0--a--a1bcd9ea1c-k8s-calico--kube--controllers--74b9887bb6--48chr-eth0"
Oct  2 21:33:32.106635 env[1455]: 2023-10-02 21:33:32.028 [INFO][4599] dataplane_linux.go 68: Setting the host side veth name to cali067854a7a9f ContainerID="e092866d0f6c1935add6968abddfb8252d5fe6fa89c4424fdf812d622bef8502" Namespace="calico-system" Pod="calico-kube-controllers-74b9887bb6-48chr" WorkloadEndpoint="ci--3510.3.0--a--a1bcd9ea1c-k8s-calico--kube--controllers--74b9887bb6--48chr-eth0"
Oct  2 21:33:32.106635 env[1455]: 2023-10-02 21:33:32.082 [INFO][4599] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="e092866d0f6c1935add6968abddfb8252d5fe6fa89c4424fdf812d622bef8502" Namespace="calico-system" Pod="calico-kube-controllers-74b9887bb6-48chr" WorkloadEndpoint="ci--3510.3.0--a--a1bcd9ea1c-k8s-calico--kube--controllers--74b9887bb6--48chr-eth0"
Oct  2 21:33:32.106635 env[1455]: 2023-10-02 21:33:32.100 [INFO][4599] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="e092866d0f6c1935add6968abddfb8252d5fe6fa89c4424fdf812d622bef8502" Namespace="calico-system" Pod="calico-kube-controllers-74b9887bb6-48chr" WorkloadEndpoint="ci--3510.3.0--a--a1bcd9ea1c-k8s-calico--kube--controllers--74b9887bb6--48chr-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--a1bcd9ea1c-k8s-calico--kube--controllers--74b9887bb6--48chr-eth0", GenerateName:"calico-kube-controllers-74b9887bb6-", Namespace:"calico-system", SelfLink:"", UID:"de6c269b-507a-4781-82d6-2e325f82e757", ResourceVersion:"725", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 21, 33, 4, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"74b9887bb6", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-a1bcd9ea1c", ContainerID:"e092866d0f6c1935add6968abddfb8252d5fe6fa89c4424fdf812d622bef8502", Pod:"calico-kube-controllers-74b9887bb6-48chr", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.32.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali067854a7a9f", MAC:"aa:d3:c2:c2:8e:c4", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}}
Oct  2 21:33:32.106635 env[1455]: 2023-10-02 21:33:32.105 [INFO][4599] k8s.go 489: Wrote updated endpoint to datastore ContainerID="e092866d0f6c1935add6968abddfb8252d5fe6fa89c4424fdf812d622bef8502" Namespace="calico-system" Pod="calico-kube-controllers-74b9887bb6-48chr" WorkloadEndpoint="ci--3510.3.0--a--a1bcd9ea1c-k8s-calico--kube--controllers--74b9887bb6--48chr-eth0"
Oct  2 21:33:32.111943 env[1455]: time="2023-10-02T21:33:32.111908297Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1
Oct  2 21:33:32.111943 env[1455]: time="2023-10-02T21:33:32.111929517Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1
Oct  2 21:33:32.111943 env[1455]: time="2023-10-02T21:33:32.111936677Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1
Oct  2 21:33:32.112065 env[1455]: time="2023-10-02T21:33:32.112042939Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e092866d0f6c1935add6968abddfb8252d5fe6fa89c4424fdf812d622bef8502 pid=4660 runtime=io.containerd.runc.v2
Oct  2 21:33:32.115000 audit[4675]: NETFILTER_CFG table=filter:108 family=2 entries=44 op=nft_register_chain pid=4675 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re"
Oct  2 21:33:32.115000 audit[4675]: SYSCALL arch=c000003e syscall=46 success=yes exit=22284 a0=3 a1=7ffc13bb8600 a2=0 a3=7ffc13bb85ec items=0 ppid=3906 pid=4675 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:33:32.115000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030
Oct  2 21:33:32.131431 systemd[1]: Started cri-containerd-e092866d0f6c1935add6968abddfb8252d5fe6fa89c4424fdf812d622bef8502.scope.
Oct  2 21:33:32.134000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:32.134000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:32.134000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:32.134000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:32.134000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:32.134000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:32.134000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:32.134000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:32.134000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:32.134000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:32.134000 audit: BPF prog-id=168 op=LOAD
Oct  2 21:33:32.135000 audit[4670]: AVC avc:  denied  { bpf } for  pid=4670 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:32.135000 audit[4670]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=4660 pid=4670 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:33:32.135000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530393238363664306636633139333561646436393638616264646662
Oct  2 21:33:32.135000 audit[4670]: AVC avc:  denied  { perfmon } for  pid=4670 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:32.135000 audit[4670]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=4660 pid=4670 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:33:32.135000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530393238363664306636633139333561646436393638616264646662
Oct  2 21:33:32.135000 audit[4670]: AVC avc:  denied  { bpf } for  pid=4670 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:32.135000 audit[4670]: AVC avc:  denied  { bpf } for  pid=4670 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:32.135000 audit[4670]: AVC avc:  denied  { bpf } for  pid=4670 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:32.135000 audit[4670]: AVC avc:  denied  { perfmon } for  pid=4670 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:32.135000 audit[4670]: AVC avc:  denied  { perfmon } for  pid=4670 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:32.135000 audit[4670]: AVC avc:  denied  { perfmon } for  pid=4670 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:32.135000 audit[4670]: AVC avc:  denied  { perfmon } for  pid=4670 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:32.135000 audit[4670]: AVC avc:  denied  { perfmon } for  pid=4670 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:32.135000 audit[4670]: AVC avc:  denied  { bpf } for  pid=4670 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:32.135000 audit[4670]: AVC avc:  denied  { bpf } for  pid=4670 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:32.135000 audit: BPF prog-id=169 op=LOAD
Oct  2 21:33:32.135000 audit[4670]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000210fc0 items=0 ppid=4660 pid=4670 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:33:32.135000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530393238363664306636633139333561646436393638616264646662
Oct  2 21:33:32.135000 audit[4670]: AVC avc:  denied  { bpf } for  pid=4670 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:32.135000 audit[4670]: AVC avc:  denied  { bpf } for  pid=4670 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:32.135000 audit[4670]: AVC avc:  denied  { perfmon } for  pid=4670 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:32.135000 audit[4670]: AVC avc:  denied  { perfmon } for  pid=4670 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:32.135000 audit[4670]: AVC avc:  denied  { perfmon } for  pid=4670 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:32.135000 audit[4670]: AVC avc:  denied  { perfmon } for  pid=4670 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:32.135000 audit[4670]: AVC avc:  denied  { perfmon } for  pid=4670 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:32.135000 audit[4670]: AVC avc:  denied  { bpf } for  pid=4670 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:32.135000 audit[4670]: AVC avc:  denied  { bpf } for  pid=4670 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:32.135000 audit: BPF prog-id=170 op=LOAD
Oct  2 21:33:32.135000 audit[4670]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000211008 items=0 ppid=4660 pid=4670 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:33:32.135000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530393238363664306636633139333561646436393638616264646662
Oct  2 21:33:32.135000 audit: BPF prog-id=170 op=UNLOAD
Oct  2 21:33:32.135000 audit: BPF prog-id=169 op=UNLOAD
Oct  2 21:33:32.135000 audit[4670]: AVC avc:  denied  { bpf } for  pid=4670 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:32.135000 audit[4670]: AVC avc:  denied  { bpf } for  pid=4670 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:32.135000 audit[4670]: AVC avc:  denied  { bpf } for  pid=4670 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:32.135000 audit[4670]: AVC avc:  denied  { perfmon } for  pid=4670 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:32.135000 audit[4670]: AVC avc:  denied  { perfmon } for  pid=4670 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:32.135000 audit[4670]: AVC avc:  denied  { perfmon } for  pid=4670 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:32.135000 audit[4670]: AVC avc:  denied  { perfmon } for  pid=4670 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:32.135000 audit[4670]: AVC avc:  denied  { perfmon } for  pid=4670 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:32.135000 audit[4670]: AVC avc:  denied  { bpf } for  pid=4670 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:32.135000 audit[4670]: AVC avc:  denied  { bpf } for  pid=4670 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:32.135000 audit: BPF prog-id=171 op=LOAD
Oct  2 21:33:32.135000 audit[4670]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000211418 items=0 ppid=4660 pid=4670 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:33:32.135000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530393238363664306636633139333561646436393638616264646662
Oct  2 21:33:32.168396 env[1455]: time="2023-10-02T21:33:32.168368030Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-74b9887bb6-48chr,Uid:de6c269b-507a-4781-82d6-2e325f82e757,Namespace:calico-system,Attempt:1,} returns sandbox id \"e092866d0f6c1935add6968abddfb8252d5fe6fa89c4424fdf812d622bef8502\""
Oct  2 21:33:32.169254 env[1455]: time="2023-10-02T21:33:32.169238187Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.25.0\""
Oct  2 21:33:33.792760 env[1455]: time="2023-10-02T21:33:33.792648005Z" level=info msg="StopPodSandbox for \"8b449774db8e54805f256bb2768d44630cb0c1b60dc7b2afede34aa38d463a50\""
Oct  2 21:33:33.916181 env[1455]: 2023-10-02 21:33:33.887 [INFO][4714] k8s.go 576: Cleaning up netns ContainerID="8b449774db8e54805f256bb2768d44630cb0c1b60dc7b2afede34aa38d463a50"
Oct  2 21:33:33.916181 env[1455]: 2023-10-02 21:33:33.887 [INFO][4714] dataplane_linux.go 524: Deleting workload's device in netns. ContainerID="8b449774db8e54805f256bb2768d44630cb0c1b60dc7b2afede34aa38d463a50" iface="eth0" netns="/var/run/netns/cni-cd72d1dd-0981-76b4-ffa3-7e71bd3f0f47"
Oct  2 21:33:33.916181 env[1455]: 2023-10-02 21:33:33.888 [INFO][4714] dataplane_linux.go 535: Entered netns, deleting veth. ContainerID="8b449774db8e54805f256bb2768d44630cb0c1b60dc7b2afede34aa38d463a50" iface="eth0" netns="/var/run/netns/cni-cd72d1dd-0981-76b4-ffa3-7e71bd3f0f47"
Oct  2 21:33:33.916181 env[1455]: 2023-10-02 21:33:33.888 [INFO][4714] dataplane_linux.go 562: Workload's veth was already gone.  Nothing to do. ContainerID="8b449774db8e54805f256bb2768d44630cb0c1b60dc7b2afede34aa38d463a50" iface="eth0" netns="/var/run/netns/cni-cd72d1dd-0981-76b4-ffa3-7e71bd3f0f47"
Oct  2 21:33:33.916181 env[1455]: 2023-10-02 21:33:33.888 [INFO][4714] k8s.go 583: Releasing IP address(es) ContainerID="8b449774db8e54805f256bb2768d44630cb0c1b60dc7b2afede34aa38d463a50"
Oct  2 21:33:33.916181 env[1455]: 2023-10-02 21:33:33.888 [INFO][4714] utils.go 196: Calico CNI releasing IP address ContainerID="8b449774db8e54805f256bb2768d44630cb0c1b60dc7b2afede34aa38d463a50"
Oct  2 21:33:33.916181 env[1455]: 2023-10-02 21:33:33.907 [INFO][4729] ipam_plugin.go 416: Releasing address using handleID ContainerID="8b449774db8e54805f256bb2768d44630cb0c1b60dc7b2afede34aa38d463a50" HandleID="k8s-pod-network.8b449774db8e54805f256bb2768d44630cb0c1b60dc7b2afede34aa38d463a50" Workload="ci--3510.3.0--a--a1bcd9ea1c-k8s-csi--node--driver--7djgt-eth0"
Oct  2 21:33:33.916181 env[1455]: time="2023-10-02T21:33:33Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357"
Oct  2 21:33:33.916181 env[1455]: time="2023-10-02T21:33:33Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372"
Oct  2 21:33:33.916181 env[1455]: 2023-10-02 21:33:33.913 [WARNING][4729] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="8b449774db8e54805f256bb2768d44630cb0c1b60dc7b2afede34aa38d463a50" HandleID="k8s-pod-network.8b449774db8e54805f256bb2768d44630cb0c1b60dc7b2afede34aa38d463a50" Workload="ci--3510.3.0--a--a1bcd9ea1c-k8s-csi--node--driver--7djgt-eth0"
Oct  2 21:33:33.916181 env[1455]: 2023-10-02 21:33:33.913 [INFO][4729] ipam_plugin.go 444: Releasing address using workloadID ContainerID="8b449774db8e54805f256bb2768d44630cb0c1b60dc7b2afede34aa38d463a50" HandleID="k8s-pod-network.8b449774db8e54805f256bb2768d44630cb0c1b60dc7b2afede34aa38d463a50" Workload="ci--3510.3.0--a--a1bcd9ea1c-k8s-csi--node--driver--7djgt-eth0"
Oct  2 21:33:33.916181 env[1455]: time="2023-10-02T21:33:33Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378"
Oct  2 21:33:33.916181 env[1455]: 2023-10-02 21:33:33.915 [INFO][4714] k8s.go 589: Teardown processing complete. ContainerID="8b449774db8e54805f256bb2768d44630cb0c1b60dc7b2afede34aa38d463a50"
Oct  2 21:33:33.916590 env[1455]: time="2023-10-02T21:33:33.916251812Z" level=info msg="TearDown network for sandbox \"8b449774db8e54805f256bb2768d44630cb0c1b60dc7b2afede34aa38d463a50\" successfully"
Oct  2 21:33:33.916590 env[1455]: time="2023-10-02T21:33:33.916273535Z" level=info msg="StopPodSandbox for \"8b449774db8e54805f256bb2768d44630cb0c1b60dc7b2afede34aa38d463a50\" returns successfully"
Oct  2 21:33:33.916757 env[1455]: time="2023-10-02T21:33:33.916713781Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-7djgt,Uid:96f60c96-bc95-4de5-a016-9864623478a6,Namespace:calico-system,Attempt:1,}"
Oct  2 21:33:33.918299 systemd[1]: run-netns-cni\x2dcd72d1dd\x2d0981\x2d76b4\x2dffa3\x2d7e71bd3f0f47.mount: Deactivated successfully.
Oct  2 21:33:34.028084 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready
Oct  2 21:33:34.028145 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calif3ec2992a3c: link becomes ready
Oct  2 21:33:34.028119 systemd-networkd[1301]: cali067854a7a9f: Gained IPv6LL
Oct  2 21:33:34.043047 systemd-networkd[1301]: calif3ec2992a3c: Link UP
Oct  2 21:33:34.043052 systemd-networkd[1301]: calif3ec2992a3c: Gained carrier
Oct  2 21:33:34.048726 env[1455]: 2023-10-02 21:33:33.938 [INFO][4745] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.0--a--a1bcd9ea1c-k8s-csi--node--driver--7djgt-eth0 csi-node-driver- calico-system  96f60c96-bc95-4de5-a016-9864623478a6 741 0 2023-10-02 21:33:17 +0000 UTC <nil> <nil> map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:6b49688c47 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] []  []} {k8s  ci-3510.3.0-a-a1bcd9ea1c  csi-node-driver-7djgt eth0 default [] []   [kns.calico-system ksa.calico-system.default] calif3ec2992a3c  [] []}} ContainerID="e12d4dbff05762a7acf8a28b6855b181e86e08699fd50676c83c96876a5bb934" Namespace="calico-system" Pod="csi-node-driver-7djgt" WorkloadEndpoint="ci--3510.3.0--a--a1bcd9ea1c-k8s-csi--node--driver--7djgt-"
Oct  2 21:33:34.048726 env[1455]: 2023-10-02 21:33:33.938 [INFO][4745] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="e12d4dbff05762a7acf8a28b6855b181e86e08699fd50676c83c96876a5bb934" Namespace="calico-system" Pod="csi-node-driver-7djgt" WorkloadEndpoint="ci--3510.3.0--a--a1bcd9ea1c-k8s-csi--node--driver--7djgt-eth0"
Oct  2 21:33:34.048726 env[1455]: 2023-10-02 21:33:33.952 [INFO][4767] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="e12d4dbff05762a7acf8a28b6855b181e86e08699fd50676c83c96876a5bb934" HandleID="k8s-pod-network.e12d4dbff05762a7acf8a28b6855b181e86e08699fd50676c83c96876a5bb934" Workload="ci--3510.3.0--a--a1bcd9ea1c-k8s-csi--node--driver--7djgt-eth0"
Oct  2 21:33:34.048726 env[1455]: 2023-10-02 21:33:33.958 [INFO][4767] ipam_plugin.go 269: Auto assigning IP ContainerID="e12d4dbff05762a7acf8a28b6855b181e86e08699fd50676c83c96876a5bb934" HandleID="k8s-pod-network.e12d4dbff05762a7acf8a28b6855b181e86e08699fd50676c83c96876a5bb934" Workload="ci--3510.3.0--a--a1bcd9ea1c-k8s-csi--node--driver--7djgt-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00014b0d0), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.0-a-a1bcd9ea1c", "pod":"csi-node-driver-7djgt", "timestamp":"2023-10-02 21:33:33.952637719 +0000 UTC"}, Hostname:"ci-3510.3.0-a-a1bcd9ea1c", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"}
Oct  2 21:33:34.048726 env[1455]: time="2023-10-02T21:33:33Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357"
Oct  2 21:33:34.048726 env[1455]: time="2023-10-02T21:33:33Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372"
Oct  2 21:33:34.048726 env[1455]: 2023-10-02 21:33:33.959 [INFO][4767] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.0-a-a1bcd9ea1c'
Oct  2 21:33:34.048726 env[1455]: 2023-10-02 21:33:33.960 [INFO][4767] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.e12d4dbff05762a7acf8a28b6855b181e86e08699fd50676c83c96876a5bb934" host="ci-3510.3.0-a-a1bcd9ea1c"
Oct  2 21:33:34.048726 env[1455]: 2023-10-02 21:33:33.962 [INFO][4767] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.0-a-a1bcd9ea1c"
Oct  2 21:33:34.048726 env[1455]: 2023-10-02 21:33:33.965 [INFO][4767] ipam.go 489: Trying affinity for 192.168.32.64/26 host="ci-3510.3.0-a-a1bcd9ea1c"
Oct  2 21:33:34.048726 env[1455]: 2023-10-02 21:33:33.966 [INFO][4767] ipam.go 155: Attempting to load block cidr=192.168.32.64/26 host="ci-3510.3.0-a-a1bcd9ea1c"
Oct  2 21:33:34.048726 env[1455]: 2023-10-02 21:33:33.968 [INFO][4767] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.32.64/26 host="ci-3510.3.0-a-a1bcd9ea1c"
Oct  2 21:33:34.048726 env[1455]: 2023-10-02 21:33:33.968 [INFO][4767] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.32.64/26 handle="k8s-pod-network.e12d4dbff05762a7acf8a28b6855b181e86e08699fd50676c83c96876a5bb934" host="ci-3510.3.0-a-a1bcd9ea1c"
Oct  2 21:33:34.048726 env[1455]: 2023-10-02 21:33:33.969 [INFO][4767] ipam.go 1682: Creating new handle: k8s-pod-network.e12d4dbff05762a7acf8a28b6855b181e86e08699fd50676c83c96876a5bb934
Oct  2 21:33:34.048726 env[1455]: 2023-10-02 21:33:33.971 [INFO][4767] ipam.go 1203: Writing block in order to claim IPs block=192.168.32.64/26 handle="k8s-pod-network.e12d4dbff05762a7acf8a28b6855b181e86e08699fd50676c83c96876a5bb934" host="ci-3510.3.0-a-a1bcd9ea1c"
Oct  2 21:33:34.048726 env[1455]: 2023-10-02 21:33:33.974 [INFO][4767] ipam.go 1216: Successfully claimed IPs: [192.168.32.68/26] block=192.168.32.64/26 handle="k8s-pod-network.e12d4dbff05762a7acf8a28b6855b181e86e08699fd50676c83c96876a5bb934" host="ci-3510.3.0-a-a1bcd9ea1c"
Oct  2 21:33:34.048726 env[1455]: 2023-10-02 21:33:33.974 [INFO][4767] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.32.68/26] handle="k8s-pod-network.e12d4dbff05762a7acf8a28b6855b181e86e08699fd50676c83c96876a5bb934" host="ci-3510.3.0-a-a1bcd9ea1c"
Oct  2 21:33:34.048726 env[1455]: time="2023-10-02T21:33:33Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378"
Oct  2 21:33:34.048726 env[1455]: 2023-10-02 21:33:33.974 [INFO][4767] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.32.68/26] IPv6=[] ContainerID="e12d4dbff05762a7acf8a28b6855b181e86e08699fd50676c83c96876a5bb934" HandleID="k8s-pod-network.e12d4dbff05762a7acf8a28b6855b181e86e08699fd50676c83c96876a5bb934" Workload="ci--3510.3.0--a--a1bcd9ea1c-k8s-csi--node--driver--7djgt-eth0"
Oct  2 21:33:34.049285 env[1455]: 2023-10-02 21:33:33.975 [INFO][4745] k8s.go 383: Populated endpoint ContainerID="e12d4dbff05762a7acf8a28b6855b181e86e08699fd50676c83c96876a5bb934" Namespace="calico-system" Pod="csi-node-driver-7djgt" WorkloadEndpoint="ci--3510.3.0--a--a1bcd9ea1c-k8s-csi--node--driver--7djgt-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--a1bcd9ea1c-k8s-csi--node--driver--7djgt-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"96f60c96-bc95-4de5-a016-9864623478a6", ResourceVersion:"741", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 21, 33, 17, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"6b49688c47", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-a1bcd9ea1c", ContainerID:"", Pod:"csi-node-driver-7djgt", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.32.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calif3ec2992a3c", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}}
Oct  2 21:33:34.049285 env[1455]: 2023-10-02 21:33:33.975 [INFO][4745] k8s.go 384: Calico CNI using IPs: [192.168.32.68/32] ContainerID="e12d4dbff05762a7acf8a28b6855b181e86e08699fd50676c83c96876a5bb934" Namespace="calico-system" Pod="csi-node-driver-7djgt" WorkloadEndpoint="ci--3510.3.0--a--a1bcd9ea1c-k8s-csi--node--driver--7djgt-eth0"
Oct  2 21:33:34.049285 env[1455]: 2023-10-02 21:33:33.975 [INFO][4745] dataplane_linux.go 68: Setting the host side veth name to calif3ec2992a3c ContainerID="e12d4dbff05762a7acf8a28b6855b181e86e08699fd50676c83c96876a5bb934" Namespace="calico-system" Pod="csi-node-driver-7djgt" WorkloadEndpoint="ci--3510.3.0--a--a1bcd9ea1c-k8s-csi--node--driver--7djgt-eth0"
Oct  2 21:33:34.049285 env[1455]: 2023-10-02 21:33:34.028 [INFO][4745] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="e12d4dbff05762a7acf8a28b6855b181e86e08699fd50676c83c96876a5bb934" Namespace="calico-system" Pod="csi-node-driver-7djgt" WorkloadEndpoint="ci--3510.3.0--a--a1bcd9ea1c-k8s-csi--node--driver--7djgt-eth0"
Oct  2 21:33:34.049285 env[1455]: 2023-10-02 21:33:34.042 [INFO][4745] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="e12d4dbff05762a7acf8a28b6855b181e86e08699fd50676c83c96876a5bb934" Namespace="calico-system" Pod="csi-node-driver-7djgt" WorkloadEndpoint="ci--3510.3.0--a--a1bcd9ea1c-k8s-csi--node--driver--7djgt-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--a1bcd9ea1c-k8s-csi--node--driver--7djgt-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"96f60c96-bc95-4de5-a016-9864623478a6", ResourceVersion:"741", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 21, 33, 17, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"6b49688c47", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-a1bcd9ea1c", ContainerID:"e12d4dbff05762a7acf8a28b6855b181e86e08699fd50676c83c96876a5bb934", Pod:"csi-node-driver-7djgt", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.32.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calif3ec2992a3c", MAC:"5e:01:d5:dd:9f:a7", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}}
Oct  2 21:33:34.049285 env[1455]: 2023-10-02 21:33:34.047 [INFO][4745] k8s.go 489: Wrote updated endpoint to datastore ContainerID="e12d4dbff05762a7acf8a28b6855b181e86e08699fd50676c83c96876a5bb934" Namespace="calico-system" Pod="csi-node-driver-7djgt" WorkloadEndpoint="ci--3510.3.0--a--a1bcd9ea1c-k8s-csi--node--driver--7djgt-eth0"
Oct  2 21:33:34.053971 env[1455]: time="2023-10-02T21:33:34.053940168Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1
Oct  2 21:33:34.053971 env[1455]: time="2023-10-02T21:33:34.053960621Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1
Oct  2 21:33:34.053971 env[1455]: time="2023-10-02T21:33:34.053967326Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1
Oct  2 21:33:34.054077 env[1455]: time="2023-10-02T21:33:34.054030167Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e12d4dbff05762a7acf8a28b6855b181e86e08699fd50676c83c96876a5bb934 pid=4803 runtime=io.containerd.runc.v2
Oct  2 21:33:34.054000 audit[4808]: NETFILTER_CFG table=filter:109 family=2 entries=42 op=nft_register_chain pid=4808 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re"
Oct  2 21:33:34.054000 audit[4808]: SYSCALL arch=c000003e syscall=46 success=yes exit=20696 a0=3 a1=7ffce6dadfb0 a2=0 a3=7ffce6dadf9c items=0 ppid=3906 pid=4808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:33:34.054000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030
Oct  2 21:33:34.071202 systemd[1]: Started cri-containerd-e12d4dbff05762a7acf8a28b6855b181e86e08699fd50676c83c96876a5bb934.scope.
Oct  2 21:33:34.076000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:34.076000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:34.076000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:34.076000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:34.076000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:34.076000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:34.076000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:34.076000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:34.076000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:34.076000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:34.076000 audit: BPF prog-id=172 op=LOAD
Oct  2 21:33:34.076000 audit[4813]: AVC avc:  denied  { bpf } for  pid=4813 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:34.076000 audit[4813]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000199c48 a2=10 a3=1c items=0 ppid=4803 pid=4813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:33:34.076000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531326434646266663035373632613761636638613238623638353562
Oct  2 21:33:34.076000 audit[4813]: AVC avc:  denied  { perfmon } for  pid=4813 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:34.076000 audit[4813]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001996b0 a2=3c a3=c items=0 ppid=4803 pid=4813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:33:34.076000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531326434646266663035373632613761636638613238623638353562
Oct  2 21:33:34.076000 audit[4813]: AVC avc:  denied  { bpf } for  pid=4813 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:34.076000 audit[4813]: AVC avc:  denied  { bpf } for  pid=4813 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:34.076000 audit[4813]: AVC avc:  denied  { bpf } for  pid=4813 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:34.076000 audit[4813]: AVC avc:  denied  { perfmon } for  pid=4813 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:34.076000 audit[4813]: AVC avc:  denied  { perfmon } for  pid=4813 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:34.076000 audit[4813]: AVC avc:  denied  { perfmon } for  pid=4813 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:34.076000 audit[4813]: AVC avc:  denied  { perfmon } for  pid=4813 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:34.076000 audit[4813]: AVC avc:  denied  { perfmon } for  pid=4813 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:34.076000 audit[4813]: AVC avc:  denied  { bpf } for  pid=4813 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:34.076000 audit[4813]: AVC avc:  denied  { bpf } for  pid=4813 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:34.076000 audit: BPF prog-id=173 op=LOAD
Oct  2 21:33:34.076000 audit[4813]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001999d8 a2=78 a3=c0002170e0 items=0 ppid=4803 pid=4813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:33:34.076000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531326434646266663035373632613761636638613238623638353562
Oct  2 21:33:34.076000 audit[4813]: AVC avc:  denied  { bpf } for  pid=4813 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:34.076000 audit[4813]: AVC avc:  denied  { bpf } for  pid=4813 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:34.076000 audit[4813]: AVC avc:  denied  { perfmon } for  pid=4813 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:34.076000 audit[4813]: AVC avc:  denied  { perfmon } for  pid=4813 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:34.076000 audit[4813]: AVC avc:  denied  { perfmon } for  pid=4813 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:34.076000 audit[4813]: AVC avc:  denied  { perfmon } for  pid=4813 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:34.076000 audit[4813]: AVC avc:  denied  { perfmon } for  pid=4813 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:34.076000 audit[4813]: AVC avc:  denied  { bpf } for  pid=4813 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:34.076000 audit[4813]: AVC avc:  denied  { bpf } for  pid=4813 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:34.076000 audit: BPF prog-id=174 op=LOAD
Oct  2 21:33:34.076000 audit[4813]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000199770 a2=78 a3=c000217128 items=0 ppid=4803 pid=4813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:33:34.076000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531326434646266663035373632613761636638613238623638353562
Oct  2 21:33:34.076000 audit: BPF prog-id=174 op=UNLOAD
Oct  2 21:33:34.076000 audit: BPF prog-id=173 op=UNLOAD
Oct  2 21:33:34.076000 audit[4813]: AVC avc:  denied  { bpf } for  pid=4813 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:34.076000 audit[4813]: AVC avc:  denied  { bpf } for  pid=4813 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:34.076000 audit[4813]: AVC avc:  denied  { bpf } for  pid=4813 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:34.076000 audit[4813]: AVC avc:  denied  { perfmon } for  pid=4813 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:34.076000 audit[4813]: AVC avc:  denied  { perfmon } for  pid=4813 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:34.076000 audit[4813]: AVC avc:  denied  { perfmon } for  pid=4813 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:34.076000 audit[4813]: AVC avc:  denied  { perfmon } for  pid=4813 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:34.076000 audit[4813]: AVC avc:  denied  { perfmon } for  pid=4813 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:34.076000 audit[4813]: AVC avc:  denied  { bpf } for  pid=4813 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:34.076000 audit[4813]: AVC avc:  denied  { bpf } for  pid=4813 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:34.076000 audit: BPF prog-id=175 op=LOAD
Oct  2 21:33:34.076000 audit[4813]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000199c30 a2=78 a3=c000217538 items=0 ppid=4803 pid=4813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:33:34.076000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531326434646266663035373632613761636638613238623638353562
Oct  2 21:33:34.094675 env[1455]: time="2023-10-02T21:33:34.094652353Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-7djgt,Uid:96f60c96-bc95-4de5-a016-9864623478a6,Namespace:calico-system,Attempt:1,} returns sandbox id \"e12d4dbff05762a7acf8a28b6855b181e86e08699fd50676c83c96876a5bb934\""
Oct  2 21:33:35.204455 env[1455]: time="2023-10-02T21:33:35.204387970Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 21:33:35.204994 env[1455]: time="2023-10-02T21:33:35.204955364Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5e785d005ccc1ab22527a783835cf2741f6f5f385a8956144c661f8c23ae9d78,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 21:33:35.206158 env[1455]: time="2023-10-02T21:33:35.206117211Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 21:33:35.206903 env[1455]: time="2023-10-02T21:33:35.206862673Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:b764feb1777655aabce5988324b69b412d23e087436ee2414dff893a158fcdef,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Oct  2 21:33:35.207325 env[1455]: time="2023-10-02T21:33:35.207283028Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.25.0\" returns image reference \"sha256:5e785d005ccc1ab22527a783835cf2741f6f5f385a8956144c661f8c23ae9d78\""
Oct  2 21:33:35.207848 env[1455]: time="2023-10-02T21:33:35.207833914Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\""
Oct  2 21:33:35.208653 env[1455]: time="2023-10-02T21:33:35.208638023Z" level=info msg="CreateContainer within sandbox \"e092866d0f6c1935add6968abddfb8252d5fe6fa89c4424fdf812d622bef8502\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}"
Oct  2 21:33:35.213039 env[1455]: time="2023-10-02T21:33:35.212994200Z" level=info msg="CreateContainer within sandbox \"e092866d0f6c1935add6968abddfb8252d5fe6fa89c4424fdf812d622bef8502\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"c47baecde35b1f402b8f4db4c42553216a3a42835e9879a6a329593aef7c5a00\""
Oct  2 21:33:35.213380 env[1455]: time="2023-10-02T21:33:35.213336810Z" level=info msg="StartContainer for \"c47baecde35b1f402b8f4db4c42553216a3a42835e9879a6a329593aef7c5a00\""
Oct  2 21:33:35.234029 systemd[1]: Started cri-containerd-c47baecde35b1f402b8f4db4c42553216a3a42835e9879a6a329593aef7c5a00.scope.
Oct  2 21:33:35.240000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:35.265322 kernel: kauditd_printk_skb: 363 callbacks suppressed
Oct  2 21:33:35.265385 kernel: audit: type=1400 audit(1696282415.240:1288): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:35.240000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:35.382156 kernel: audit: type=1400 audit(1696282415.240:1289): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:35.382192 kernel: audit: type=1400 audit(1696282415.240:1290): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:35.240000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:35.436495 env[1455]: time="2023-10-02T21:33:35.436466661Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io
Oct  2 21:33:35.436867 env[1455]: time="2023-10-02T21:33:35.436824454Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden"
Oct  2 21:33:35.436977 kubelet[2553]: E1002 21:33:35.436967    2553 remote_image.go:180] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0"
Oct  2 21:33:35.437129 kubelet[2553]: E1002 21:33:35.436992    2553 kuberuntime_image.go:53] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0"
Oct  2 21:33:35.437159 kubelet[2553]: E1002 21:33:35.437056    2553 kuberuntime_manager.go:1209] container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.25.0,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:etccalico,ReadOnly:false,MountPath:/etc/calico,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,},VolumeMount{Name:kube-api-access-4j7vd,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-7djgt_calico-system(96f60c96-bc95-4de5-a016-9864623478a6): ErrImagePull: failed to pull and unpack image "ghcr.io/flatcar/calico/csi:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/csi:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden
Oct  2 21:33:35.437423 env[1455]: time="2023-10-02T21:33:35.437409456Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\""
Oct  2 21:33:35.440529 kernel: audit: type=1400 audit(1696282415.240:1291): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:35.240000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:35.499381 kernel: audit: type=1400 audit(1696282415.240:1292): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:35.240000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:35.558116 kernel: audit: type=1400 audit(1696282415.240:1293): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:35.240000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:35.577587 systemd-networkd[1301]: calif3ec2992a3c: Gained IPv6LL
Oct  2 21:33:35.616912 kernel: audit: type=1400 audit(1696282415.240:1294): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:35.240000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:35.675634 kernel: audit: type=1400 audit(1696282415.240:1295): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:35.240000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:35.702024 env[1455]: time="2023-10-02T21:33:35.701999716Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io
Oct  2 21:33:35.702426 env[1455]: time="2023-10-02T21:33:35.702384076Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden"
Oct  2 21:33:35.702537 kubelet[2553]: E1002 21:33:35.702501    2553 remote_image.go:180] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0"
Oct  2 21:33:35.702537 kubelet[2553]: E1002 21:33:35.702525    2553 kuberuntime_image.go:53] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0"
Oct  2 21:33:35.702600 kubelet[2553]: E1002 21:33:35.702579    2553 kuberuntime_manager.go:1209] container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-4j7vd,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-7djgt_calico-system(96f60c96-bc95-4de5-a016-9864623478a6): ErrImagePull: failed to pull and unpack image "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden
Oct  2 21:33:35.702663 kubelet[2553]: E1002 21:33:35.702614    2553 pod_workers.go:1300] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/csi-node-driver-7djgt" podUID="96f60c96-bc95-4de5-a016-9864623478a6"
Oct  2 21:33:35.734331 kernel: audit: type=1400 audit(1696282415.240:1296): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:35.240000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:35.323000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:35.851376 kernel: audit: type=1400 audit(1696282415.323:1297): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:35.323000 audit: BPF prog-id=176 op=LOAD
Oct  2 21:33:35.323000 audit[4881]: AVC avc:  denied  { bpf } for  pid=4881 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:35.323000 audit[4881]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=4660 pid=4881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:33:35.323000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6334376261656364653335623166343032623866346462346334323535
Oct  2 21:33:35.323000 audit[4881]: AVC avc:  denied  { perfmon } for  pid=4881 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:35.323000 audit[4881]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=4660 pid=4881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:33:35.323000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6334376261656364653335623166343032623866346462346334323535
Oct  2 21:33:35.323000 audit[4881]: AVC avc:  denied  { bpf } for  pid=4881 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:35.323000 audit[4881]: AVC avc:  denied  { bpf } for  pid=4881 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:35.323000 audit[4881]: AVC avc:  denied  { bpf } for  pid=4881 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:35.323000 audit[4881]: AVC avc:  denied  { perfmon } for  pid=4881 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:35.323000 audit[4881]: AVC avc:  denied  { perfmon } for  pid=4881 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:35.323000 audit[4881]: AVC avc:  denied  { perfmon } for  pid=4881 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:35.323000 audit[4881]: AVC avc:  denied  { perfmon } for  pid=4881 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:35.323000 audit[4881]: AVC avc:  denied  { perfmon } for  pid=4881 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:35.323000 audit[4881]: AVC avc:  denied  { bpf } for  pid=4881 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:35.323000 audit[4881]: AVC avc:  denied  { bpf } for  pid=4881 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:35.323000 audit: BPF prog-id=177 op=LOAD
Oct  2 21:33:35.323000 audit[4881]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0001a4c70 items=0 ppid=4660 pid=4881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:33:35.323000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6334376261656364653335623166343032623866346462346334323535
Oct  2 21:33:35.440000 audit[4881]: AVC avc:  denied  { bpf } for  pid=4881 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:35.440000 audit[4881]: AVC avc:  denied  { bpf } for  pid=4881 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:35.440000 audit[4881]: AVC avc:  denied  { perfmon } for  pid=4881 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:35.440000 audit[4881]: AVC avc:  denied  { perfmon } for  pid=4881 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:35.440000 audit[4881]: AVC avc:  denied  { perfmon } for  pid=4881 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:35.440000 audit[4881]: AVC avc:  denied  { perfmon } for  pid=4881 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:35.440000 audit[4881]: AVC avc:  denied  { perfmon } for  pid=4881 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:35.440000 audit[4881]: AVC avc:  denied  { bpf } for  pid=4881 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:35.440000 audit[4881]: AVC avc:  denied  { bpf } for  pid=4881 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:35.440000 audit: BPF prog-id=178 op=LOAD
Oct  2 21:33:35.440000 audit[4881]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0001a4cb8 items=0 ppid=4660 pid=4881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:33:35.440000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6334376261656364653335623166343032623866346462346334323535
Oct  2 21:33:35.557000 audit: BPF prog-id=178 op=UNLOAD
Oct  2 21:33:35.557000 audit: BPF prog-id=177 op=UNLOAD
Oct  2 21:33:35.557000 audit[4881]: AVC avc:  denied  { bpf } for  pid=4881 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:35.557000 audit[4881]: AVC avc:  denied  { bpf } for  pid=4881 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:35.557000 audit[4881]: AVC avc:  denied  { bpf } for  pid=4881 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:35.557000 audit[4881]: AVC avc:  denied  { perfmon } for  pid=4881 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:35.557000 audit[4881]: AVC avc:  denied  { perfmon } for  pid=4881 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:35.557000 audit[4881]: AVC avc:  denied  { perfmon } for  pid=4881 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:35.557000 audit[4881]: AVC avc:  denied  { perfmon } for  pid=4881 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:35.557000 audit[4881]: AVC avc:  denied  { perfmon } for  pid=4881 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:35.557000 audit[4881]: AVC avc:  denied  { bpf } for  pid=4881 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:35.557000 audit[4881]: AVC avc:  denied  { bpf } for  pid=4881 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:35.557000 audit: BPF prog-id=179 op=LOAD
Oct  2 21:33:35.557000 audit[4881]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0001a50c8 items=0 ppid=4660 pid=4881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:33:35.557000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6334376261656364653335623166343032623866346462346334323535
Oct  2 21:33:35.869487 env[1455]: time="2023-10-02T21:33:35.869460407Z" level=info msg="StartContainer for \"c47baecde35b1f402b8f4db4c42553216a3a42835e9879a6a329593aef7c5a00\" returns successfully"
Oct  2 21:33:35.972346 kubelet[2553]: E1002 21:33:35.972322    2553 pod_workers.go:1300] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-7djgt" podUID="96f60c96-bc95-4de5-a016-9864623478a6"
Oct  2 21:33:35.980294 kubelet[2553]: I1002 21:33:35.980255    2553 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-74b9887bb6-48chr" podStartSLOduration=28.941617268 podCreationTimestamp="2023-10-02 21:33:04 +0000 UTC" firstStartedPulling="2023-10-02 21:33:32.169039919 +0000 UTC m=+48.431656774" lastFinishedPulling="2023-10-02 21:33:35.207624304 +0000 UTC m=+51.470241155" observedRunningTime="2023-10-02 21:33:35.97964919 +0000 UTC m=+52.242266068" watchObservedRunningTime="2023-10-02 21:33:35.980201649 +0000 UTC m=+52.242818510"
Oct  2 21:33:38.650311 kubelet[2553]: I1002 21:33:38.650266    2553 topology_manager.go:215] "Topology Admit Handler" podUID="10aa136e-fcbb-47e7-b373-1b69bde373de" podNamespace="calico-apiserver" podName="calico-apiserver-7dbcfbfd9-ts2w6"
Oct  2 21:33:38.652000 audit[4967]: NETFILTER_CFG table=filter:110 family=2 entries=9 op=nft_register_rule pid=4967 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Oct  2 21:33:38.652000 audit[4967]: SYSCALL arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7fff7ae936a0 a2=0 a3=7fff7ae9368c items=0 ppid=2801 pid=4967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:33:38.652000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Oct  2 21:33:38.654640 kubelet[2553]: I1002 21:33:38.654612    2553 topology_manager.go:215] "Topology Admit Handler" podUID="904b4100-985a-4f84-ae75-ae86d43ecf6f" podNamespace="calico-apiserver" podName="calico-apiserver-7dbcfbfd9-4j6ds"
Oct  2 21:33:38.657793 systemd[1]: Created slice kubepods-besteffort-pod10aa136e_fcbb_47e7_b373_1b69bde373de.slice.
Oct  2 21:33:38.663067 systemd[1]: Created slice kubepods-besteffort-pod904b4100_985a_4f84_ae75_ae86d43ecf6f.slice.
Oct  2 21:33:38.654000 audit[4967]: NETFILTER_CFG table=nat:111 family=2 entries=20 op=nft_register_rule pid=4967 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Oct  2 21:33:38.654000 audit[4967]: SYSCALL arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7fff7ae936a0 a2=0 a3=7fff7ae9368c items=0 ppid=2801 pid=4967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:33:38.654000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Oct  2 21:33:38.669000 audit[4969]: NETFILTER_CFG table=filter:112 family=2 entries=10 op=nft_register_rule pid=4969 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Oct  2 21:33:38.669000 audit[4969]: SYSCALL arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7fff59ff87a0 a2=0 a3=7fff59ff878c items=0 ppid=2801 pid=4969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:33:38.669000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Oct  2 21:33:38.673000 audit[4969]: NETFILTER_CFG table=nat:113 family=2 entries=20 op=nft_register_rule pid=4969 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Oct  2 21:33:38.673000 audit[4969]: SYSCALL arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7fff59ff87a0 a2=0 a3=7fff59ff878c items=0 ppid=2801 pid=4969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:33:38.673000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Oct  2 21:33:38.831221 kubelet[2553]: I1002 21:33:38.831155    2553 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-trf7h\" (UniqueName: \"kubernetes.io/projected/904b4100-985a-4f84-ae75-ae86d43ecf6f-kube-api-access-trf7h\") pod \"calico-apiserver-7dbcfbfd9-4j6ds\" (UID: \"904b4100-985a-4f84-ae75-ae86d43ecf6f\") " pod="calico-apiserver/calico-apiserver-7dbcfbfd9-4j6ds"
Oct  2 21:33:38.831588 kubelet[2553]: I1002 21:33:38.831415    2553 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/10aa136e-fcbb-47e7-b373-1b69bde373de-calico-apiserver-certs\") pod \"calico-apiserver-7dbcfbfd9-ts2w6\" (UID: \"10aa136e-fcbb-47e7-b373-1b69bde373de\") " pod="calico-apiserver/calico-apiserver-7dbcfbfd9-ts2w6"
Oct  2 21:33:38.831588 kubelet[2553]: I1002 21:33:38.831587    2553 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-cwxlk\" (UniqueName: \"kubernetes.io/projected/10aa136e-fcbb-47e7-b373-1b69bde373de-kube-api-access-cwxlk\") pod \"calico-apiserver-7dbcfbfd9-ts2w6\" (UID: \"10aa136e-fcbb-47e7-b373-1b69bde373de\") " pod="calico-apiserver/calico-apiserver-7dbcfbfd9-ts2w6"
Oct  2 21:33:38.831914 kubelet[2553]: I1002 21:33:38.831710    2553 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/904b4100-985a-4f84-ae75-ae86d43ecf6f-calico-apiserver-certs\") pod \"calico-apiserver-7dbcfbfd9-4j6ds\" (UID: \"904b4100-985a-4f84-ae75-ae86d43ecf6f\") " pod="calico-apiserver/calico-apiserver-7dbcfbfd9-4j6ds"
Oct  2 21:33:38.962942 env[1455]: time="2023-10-02T21:33:38.962725173Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7dbcfbfd9-ts2w6,Uid:10aa136e-fcbb-47e7-b373-1b69bde373de,Namespace:calico-apiserver,Attempt:0,}"
Oct  2 21:33:38.966203 env[1455]: time="2023-10-02T21:33:38.966059137Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7dbcfbfd9-4j6ds,Uid:904b4100-985a-4f84-ae75-ae86d43ecf6f,Namespace:calico-apiserver,Attempt:0,}"
Oct  2 21:33:39.108376 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready
Oct  2 21:33:39.108647 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calic99dc000129: link becomes ready
Oct  2 21:33:39.119890 systemd-networkd[1301]: calic99dc000129: Link UP
Oct  2 21:33:39.119895 systemd-networkd[1301]: calic99dc000129: Gained carrier
Oct  2 21:33:39.146453 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali291d22c7c0b: link becomes ready
Oct  2 21:33:39.150962 env[1455]: 2023-10-02 21:33:39.017 [INFO][4975] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.0--a--a1bcd9ea1c-k8s-calico--apiserver--7dbcfbfd9--ts2w6-eth0 calico-apiserver-7dbcfbfd9- calico-apiserver  10aa136e-fcbb-47e7-b373-1b69bde373de 821 0 2023-10-02 21:33:38 +0000 UTC <nil> <nil> map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:7dbcfbfd9 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] []  []} {k8s  ci-3510.3.0-a-a1bcd9ea1c  calico-apiserver-7dbcfbfd9-ts2w6 eth0 calico-apiserver [] []   [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calic99dc000129  [] []}} ContainerID="b3de240d0bbd2d473914047fa580ff5fbaa405f59f4ec0de1f415dc873e92d93" Namespace="calico-apiserver" Pod="calico-apiserver-7dbcfbfd9-ts2w6" WorkloadEndpoint="ci--3510.3.0--a--a1bcd9ea1c-k8s-calico--apiserver--7dbcfbfd9--ts2w6-"
Oct  2 21:33:39.150962 env[1455]: 2023-10-02 21:33:39.017 [INFO][4975] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="b3de240d0bbd2d473914047fa580ff5fbaa405f59f4ec0de1f415dc873e92d93" Namespace="calico-apiserver" Pod="calico-apiserver-7dbcfbfd9-ts2w6" WorkloadEndpoint="ci--3510.3.0--a--a1bcd9ea1c-k8s-calico--apiserver--7dbcfbfd9--ts2w6-eth0"
Oct  2 21:33:39.150962 env[1455]: 2023-10-02 21:33:39.034 [INFO][5023] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="b3de240d0bbd2d473914047fa580ff5fbaa405f59f4ec0de1f415dc873e92d93" HandleID="k8s-pod-network.b3de240d0bbd2d473914047fa580ff5fbaa405f59f4ec0de1f415dc873e92d93" Workload="ci--3510.3.0--a--a1bcd9ea1c-k8s-calico--apiserver--7dbcfbfd9--ts2w6-eth0"
Oct  2 21:33:39.150962 env[1455]: 2023-10-02 21:33:39.039 [INFO][5023] ipam_plugin.go 269: Auto assigning IP ContainerID="b3de240d0bbd2d473914047fa580ff5fbaa405f59f4ec0de1f415dc873e92d93" HandleID="k8s-pod-network.b3de240d0bbd2d473914047fa580ff5fbaa405f59f4ec0de1f415dc873e92d93" Workload="ci--3510.3.0--a--a1bcd9ea1c-k8s-calico--apiserver--7dbcfbfd9--ts2w6-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002e2ae0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510.3.0-a-a1bcd9ea1c", "pod":"calico-apiserver-7dbcfbfd9-ts2w6", "timestamp":"2023-10-02 21:33:39.034409029 +0000 UTC"}, Hostname:"ci-3510.3.0-a-a1bcd9ea1c", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"}
Oct  2 21:33:39.150962 env[1455]: time="2023-10-02T21:33:39Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357"
Oct  2 21:33:39.150962 env[1455]: time="2023-10-02T21:33:39Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372"
Oct  2 21:33:39.150962 env[1455]: 2023-10-02 21:33:39.040 [INFO][5023] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.0-a-a1bcd9ea1c'
Oct  2 21:33:39.150962 env[1455]: 2023-10-02 21:33:39.041 [INFO][5023] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.b3de240d0bbd2d473914047fa580ff5fbaa405f59f4ec0de1f415dc873e92d93" host="ci-3510.3.0-a-a1bcd9ea1c"
Oct  2 21:33:39.150962 env[1455]: 2023-10-02 21:33:39.043 [INFO][5023] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.0-a-a1bcd9ea1c"
Oct  2 21:33:39.150962 env[1455]: 2023-10-02 21:33:39.046 [INFO][5023] ipam.go 489: Trying affinity for 192.168.32.64/26 host="ci-3510.3.0-a-a1bcd9ea1c"
Oct  2 21:33:39.150962 env[1455]: 2023-10-02 21:33:39.047 [INFO][5023] ipam.go 155: Attempting to load block cidr=192.168.32.64/26 host="ci-3510.3.0-a-a1bcd9ea1c"
Oct  2 21:33:39.150962 env[1455]: 2023-10-02 21:33:39.048 [INFO][5023] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.32.64/26 host="ci-3510.3.0-a-a1bcd9ea1c"
Oct  2 21:33:39.150962 env[1455]: 2023-10-02 21:33:39.049 [INFO][5023] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.32.64/26 handle="k8s-pod-network.b3de240d0bbd2d473914047fa580ff5fbaa405f59f4ec0de1f415dc873e92d93" host="ci-3510.3.0-a-a1bcd9ea1c"
Oct  2 21:33:39.150962 env[1455]: 2023-10-02 21:33:39.050 [INFO][5023] ipam.go 1682: Creating new handle: k8s-pod-network.b3de240d0bbd2d473914047fa580ff5fbaa405f59f4ec0de1f415dc873e92d93
Oct  2 21:33:39.150962 env[1455]: 2023-10-02 21:33:39.052 [INFO][5023] ipam.go 1203: Writing block in order to claim IPs block=192.168.32.64/26 handle="k8s-pod-network.b3de240d0bbd2d473914047fa580ff5fbaa405f59f4ec0de1f415dc873e92d93" host="ci-3510.3.0-a-a1bcd9ea1c"
Oct  2 21:33:39.150962 env[1455]: 2023-10-02 21:33:39.055 [INFO][5023] ipam.go 1216: Successfully claimed IPs: [192.168.32.69/26] block=192.168.32.64/26 handle="k8s-pod-network.b3de240d0bbd2d473914047fa580ff5fbaa405f59f4ec0de1f415dc873e92d93" host="ci-3510.3.0-a-a1bcd9ea1c"
Oct  2 21:33:39.150962 env[1455]: 2023-10-02 21:33:39.055 [INFO][5023] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.32.69/26] handle="k8s-pod-network.b3de240d0bbd2d473914047fa580ff5fbaa405f59f4ec0de1f415dc873e92d93" host="ci-3510.3.0-a-a1bcd9ea1c"
Oct  2 21:33:39.150962 env[1455]: time="2023-10-02T21:33:39Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378"
Oct  2 21:33:39.150962 env[1455]: 2023-10-02 21:33:39.055 [INFO][5023] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.32.69/26] IPv6=[] ContainerID="b3de240d0bbd2d473914047fa580ff5fbaa405f59f4ec0de1f415dc873e92d93" HandleID="k8s-pod-network.b3de240d0bbd2d473914047fa580ff5fbaa405f59f4ec0de1f415dc873e92d93" Workload="ci--3510.3.0--a--a1bcd9ea1c-k8s-calico--apiserver--7dbcfbfd9--ts2w6-eth0"
Oct  2 21:33:39.151535 env[1455]: 2023-10-02 21:33:39.055 [INFO][4975] k8s.go 383: Populated endpoint ContainerID="b3de240d0bbd2d473914047fa580ff5fbaa405f59f4ec0de1f415dc873e92d93" Namespace="calico-apiserver" Pod="calico-apiserver-7dbcfbfd9-ts2w6" WorkloadEndpoint="ci--3510.3.0--a--a1bcd9ea1c-k8s-calico--apiserver--7dbcfbfd9--ts2w6-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--a1bcd9ea1c-k8s-calico--apiserver--7dbcfbfd9--ts2w6-eth0", GenerateName:"calico-apiserver-7dbcfbfd9-", Namespace:"calico-apiserver", SelfLink:"", UID:"10aa136e-fcbb-47e7-b373-1b69bde373de", ResourceVersion:"821", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 21, 33, 38, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7dbcfbfd9", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-a1bcd9ea1c", ContainerID:"", Pod:"calico-apiserver-7dbcfbfd9-ts2w6", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.32.69/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calic99dc000129", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}}
Oct  2 21:33:39.151535 env[1455]: 2023-10-02 21:33:39.055 [INFO][4975] k8s.go 384: Calico CNI using IPs: [192.168.32.69/32] ContainerID="b3de240d0bbd2d473914047fa580ff5fbaa405f59f4ec0de1f415dc873e92d93" Namespace="calico-apiserver" Pod="calico-apiserver-7dbcfbfd9-ts2w6" WorkloadEndpoint="ci--3510.3.0--a--a1bcd9ea1c-k8s-calico--apiserver--7dbcfbfd9--ts2w6-eth0"
Oct  2 21:33:39.151535 env[1455]: 2023-10-02 21:33:39.056 [INFO][4975] dataplane_linux.go 68: Setting the host side veth name to calic99dc000129 ContainerID="b3de240d0bbd2d473914047fa580ff5fbaa405f59f4ec0de1f415dc873e92d93" Namespace="calico-apiserver" Pod="calico-apiserver-7dbcfbfd9-ts2w6" WorkloadEndpoint="ci--3510.3.0--a--a1bcd9ea1c-k8s-calico--apiserver--7dbcfbfd9--ts2w6-eth0"
Oct  2 21:33:39.151535 env[1455]: 2023-10-02 21:33:39.108 [INFO][4975] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="b3de240d0bbd2d473914047fa580ff5fbaa405f59f4ec0de1f415dc873e92d93" Namespace="calico-apiserver" Pod="calico-apiserver-7dbcfbfd9-ts2w6" WorkloadEndpoint="ci--3510.3.0--a--a1bcd9ea1c-k8s-calico--apiserver--7dbcfbfd9--ts2w6-eth0"
Oct  2 21:33:39.151535 env[1455]: 2023-10-02 21:33:39.146 [INFO][4975] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="b3de240d0bbd2d473914047fa580ff5fbaa405f59f4ec0de1f415dc873e92d93" Namespace="calico-apiserver" Pod="calico-apiserver-7dbcfbfd9-ts2w6" WorkloadEndpoint="ci--3510.3.0--a--a1bcd9ea1c-k8s-calico--apiserver--7dbcfbfd9--ts2w6-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--a1bcd9ea1c-k8s-calico--apiserver--7dbcfbfd9--ts2w6-eth0", GenerateName:"calico-apiserver-7dbcfbfd9-", Namespace:"calico-apiserver", SelfLink:"", UID:"10aa136e-fcbb-47e7-b373-1b69bde373de", ResourceVersion:"821", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 21, 33, 38, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7dbcfbfd9", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-a1bcd9ea1c", ContainerID:"b3de240d0bbd2d473914047fa580ff5fbaa405f59f4ec0de1f415dc873e92d93", Pod:"calico-apiserver-7dbcfbfd9-ts2w6", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.32.69/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calic99dc000129", MAC:"96:4d:cd:78:c5:6a", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}}
Oct  2 21:33:39.151535 env[1455]: 2023-10-02 21:33:39.150 [INFO][4975] k8s.go 489: Wrote updated endpoint to datastore ContainerID="b3de240d0bbd2d473914047fa580ff5fbaa405f59f4ec0de1f415dc873e92d93" Namespace="calico-apiserver" Pod="calico-apiserver-7dbcfbfd9-ts2w6" WorkloadEndpoint="ci--3510.3.0--a--a1bcd9ea1c-k8s-calico--apiserver--7dbcfbfd9--ts2w6-eth0"
Oct  2 21:33:39.157202 env[1455]: time="2023-10-02T21:33:39.157166161Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1
Oct  2 21:33:39.157202 env[1455]: time="2023-10-02T21:33:39.157188433Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1
Oct  2 21:33:39.157202 env[1455]: time="2023-10-02T21:33:39.157195495Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1
Oct  2 21:33:39.157338 env[1455]: time="2023-10-02T21:33:39.157265338Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b3de240d0bbd2d473914047fa580ff5fbaa405f59f4ec0de1f415dc873e92d93 pid=5078 runtime=io.containerd.runc.v2
Oct  2 21:33:39.159876 systemd-networkd[1301]: cali291d22c7c0b: Link UP
Oct  2 21:33:39.159884 systemd-networkd[1301]: cali291d22c7c0b: Gained carrier
Oct  2 21:33:39.160000 audit[5094]: NETFILTER_CFG table=filter:114 family=2 entries=65 op=nft_register_chain pid=5094 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re"
Oct  2 21:33:39.160000 audit[5094]: SYSCALL arch=c000003e syscall=46 success=yes exit=32144 a0=3 a1=7ffce72345d0 a2=0 a3=7ffce72345bc items=0 ppid=3906 pid=5094 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:33:39.160000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030
Oct  2 21:33:39.165118 env[1455]: 2023-10-02 21:33:39.019 [INFO][4984] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.0--a--a1bcd9ea1c-k8s-calico--apiserver--7dbcfbfd9--4j6ds-eth0 calico-apiserver-7dbcfbfd9- calico-apiserver  904b4100-985a-4f84-ae75-ae86d43ecf6f 824 0 2023-10-02 21:33:38 +0000 UTC <nil> <nil> map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:7dbcfbfd9 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] []  []} {k8s  ci-3510.3.0-a-a1bcd9ea1c  calico-apiserver-7dbcfbfd9-4j6ds eth0 calico-apiserver [] []   [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali291d22c7c0b  [] []}} ContainerID="10ff34158aa6b2de97c11d304b64d53489e6462c05810815cc584f77e33309f4" Namespace="calico-apiserver" Pod="calico-apiserver-7dbcfbfd9-4j6ds" WorkloadEndpoint="ci--3510.3.0--a--a1bcd9ea1c-k8s-calico--apiserver--7dbcfbfd9--4j6ds-"
Oct  2 21:33:39.165118 env[1455]: 2023-10-02 21:33:39.019 [INFO][4984] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="10ff34158aa6b2de97c11d304b64d53489e6462c05810815cc584f77e33309f4" Namespace="calico-apiserver" Pod="calico-apiserver-7dbcfbfd9-4j6ds" WorkloadEndpoint="ci--3510.3.0--a--a1bcd9ea1c-k8s-calico--apiserver--7dbcfbfd9--4j6ds-eth0"
Oct  2 21:33:39.165118 env[1455]: 2023-10-02 21:33:39.034 [INFO][5028] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="10ff34158aa6b2de97c11d304b64d53489e6462c05810815cc584f77e33309f4" HandleID="k8s-pod-network.10ff34158aa6b2de97c11d304b64d53489e6462c05810815cc584f77e33309f4" Workload="ci--3510.3.0--a--a1bcd9ea1c-k8s-calico--apiserver--7dbcfbfd9--4j6ds-eth0"
Oct  2 21:33:39.165118 env[1455]: 2023-10-02 21:33:39.041 [INFO][5028] ipam_plugin.go 269: Auto assigning IP ContainerID="10ff34158aa6b2de97c11d304b64d53489e6462c05810815cc584f77e33309f4" HandleID="k8s-pod-network.10ff34158aa6b2de97c11d304b64d53489e6462c05810815cc584f77e33309f4" Workload="ci--3510.3.0--a--a1bcd9ea1c-k8s-calico--apiserver--7dbcfbfd9--4j6ds-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00044abf0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510.3.0-a-a1bcd9ea1c", "pod":"calico-apiserver-7dbcfbfd9-4j6ds", "timestamp":"2023-10-02 21:33:39.034684067 +0000 UTC"}, Hostname:"ci-3510.3.0-a-a1bcd9ea1c", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"}
Oct  2 21:33:39.165118 env[1455]: time="2023-10-02T21:33:39Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357"
Oct  2 21:33:39.165118 env[1455]: time="2023-10-02T21:33:39Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372"
Oct  2 21:33:39.165118 env[1455]: 2023-10-02 21:33:39.055 [INFO][5028] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.0-a-a1bcd9ea1c'
Oct  2 21:33:39.165118 env[1455]: 2023-10-02 21:33:39.056 [INFO][5028] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.10ff34158aa6b2de97c11d304b64d53489e6462c05810815cc584f77e33309f4" host="ci-3510.3.0-a-a1bcd9ea1c"
Oct  2 21:33:39.165118 env[1455]: 2023-10-02 21:33:39.058 [INFO][5028] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.0-a-a1bcd9ea1c"
Oct  2 21:33:39.165118 env[1455]: 2023-10-02 21:33:39.061 [INFO][5028] ipam.go 489: Trying affinity for 192.168.32.64/26 host="ci-3510.3.0-a-a1bcd9ea1c"
Oct  2 21:33:39.165118 env[1455]: 2023-10-02 21:33:39.062 [INFO][5028] ipam.go 155: Attempting to load block cidr=192.168.32.64/26 host="ci-3510.3.0-a-a1bcd9ea1c"
Oct  2 21:33:39.165118 env[1455]: 2023-10-02 21:33:39.063 [INFO][5028] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.32.64/26 host="ci-3510.3.0-a-a1bcd9ea1c"
Oct  2 21:33:39.165118 env[1455]: 2023-10-02 21:33:39.063 [INFO][5028] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.32.64/26 handle="k8s-pod-network.10ff34158aa6b2de97c11d304b64d53489e6462c05810815cc584f77e33309f4" host="ci-3510.3.0-a-a1bcd9ea1c"
Oct  2 21:33:39.165118 env[1455]: 2023-10-02 21:33:39.064 [INFO][5028] ipam.go 1682: Creating new handle: k8s-pod-network.10ff34158aa6b2de97c11d304b64d53489e6462c05810815cc584f77e33309f4
Oct  2 21:33:39.165118 env[1455]: 2023-10-02 21:33:39.067 [INFO][5028] ipam.go 1203: Writing block in order to claim IPs block=192.168.32.64/26 handle="k8s-pod-network.10ff34158aa6b2de97c11d304b64d53489e6462c05810815cc584f77e33309f4" host="ci-3510.3.0-a-a1bcd9ea1c"
Oct  2 21:33:39.165118 env[1455]: 2023-10-02 21:33:39.069 [INFO][5028] ipam.go 1216: Successfully claimed IPs: [192.168.32.70/26] block=192.168.32.64/26 handle="k8s-pod-network.10ff34158aa6b2de97c11d304b64d53489e6462c05810815cc584f77e33309f4" host="ci-3510.3.0-a-a1bcd9ea1c"
Oct  2 21:33:39.165118 env[1455]: 2023-10-02 21:33:39.069 [INFO][5028] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.32.70/26] handle="k8s-pod-network.10ff34158aa6b2de97c11d304b64d53489e6462c05810815cc584f77e33309f4" host="ci-3510.3.0-a-a1bcd9ea1c"
Oct  2 21:33:39.165118 env[1455]: time="2023-10-02T21:33:39Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378"
Oct  2 21:33:39.165118 env[1455]: 2023-10-02 21:33:39.069 [INFO][5028] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.32.70/26] IPv6=[] ContainerID="10ff34158aa6b2de97c11d304b64d53489e6462c05810815cc584f77e33309f4" HandleID="k8s-pod-network.10ff34158aa6b2de97c11d304b64d53489e6462c05810815cc584f77e33309f4" Workload="ci--3510.3.0--a--a1bcd9ea1c-k8s-calico--apiserver--7dbcfbfd9--4j6ds-eth0"
Oct  2 21:33:39.165604 env[1455]: 2023-10-02 21:33:39.070 [INFO][4984] k8s.go 383: Populated endpoint ContainerID="10ff34158aa6b2de97c11d304b64d53489e6462c05810815cc584f77e33309f4" Namespace="calico-apiserver" Pod="calico-apiserver-7dbcfbfd9-4j6ds" WorkloadEndpoint="ci--3510.3.0--a--a1bcd9ea1c-k8s-calico--apiserver--7dbcfbfd9--4j6ds-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--a1bcd9ea1c-k8s-calico--apiserver--7dbcfbfd9--4j6ds-eth0", GenerateName:"calico-apiserver-7dbcfbfd9-", Namespace:"calico-apiserver", SelfLink:"", UID:"904b4100-985a-4f84-ae75-ae86d43ecf6f", ResourceVersion:"824", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 21, 33, 38, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7dbcfbfd9", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-a1bcd9ea1c", ContainerID:"", Pod:"calico-apiserver-7dbcfbfd9-4j6ds", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.32.70/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali291d22c7c0b", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}}
Oct  2 21:33:39.165604 env[1455]: 2023-10-02 21:33:39.070 [INFO][4984] k8s.go 384: Calico CNI using IPs: [192.168.32.70/32] ContainerID="10ff34158aa6b2de97c11d304b64d53489e6462c05810815cc584f77e33309f4" Namespace="calico-apiserver" Pod="calico-apiserver-7dbcfbfd9-4j6ds" WorkloadEndpoint="ci--3510.3.0--a--a1bcd9ea1c-k8s-calico--apiserver--7dbcfbfd9--4j6ds-eth0"
Oct  2 21:33:39.165604 env[1455]: 2023-10-02 21:33:39.070 [INFO][4984] dataplane_linux.go 68: Setting the host side veth name to cali291d22c7c0b ContainerID="10ff34158aa6b2de97c11d304b64d53489e6462c05810815cc584f77e33309f4" Namespace="calico-apiserver" Pod="calico-apiserver-7dbcfbfd9-4j6ds" WorkloadEndpoint="ci--3510.3.0--a--a1bcd9ea1c-k8s-calico--apiserver--7dbcfbfd9--4j6ds-eth0"
Oct  2 21:33:39.165604 env[1455]: 2023-10-02 21:33:39.119 [INFO][4984] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="10ff34158aa6b2de97c11d304b64d53489e6462c05810815cc584f77e33309f4" Namespace="calico-apiserver" Pod="calico-apiserver-7dbcfbfd9-4j6ds" WorkloadEndpoint="ci--3510.3.0--a--a1bcd9ea1c-k8s-calico--apiserver--7dbcfbfd9--4j6ds-eth0"
Oct  2 21:33:39.165604 env[1455]: 2023-10-02 21:33:39.159 [INFO][4984] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="10ff34158aa6b2de97c11d304b64d53489e6462c05810815cc584f77e33309f4" Namespace="calico-apiserver" Pod="calico-apiserver-7dbcfbfd9-4j6ds" WorkloadEndpoint="ci--3510.3.0--a--a1bcd9ea1c-k8s-calico--apiserver--7dbcfbfd9--4j6ds-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--a1bcd9ea1c-k8s-calico--apiserver--7dbcfbfd9--4j6ds-eth0", GenerateName:"calico-apiserver-7dbcfbfd9-", Namespace:"calico-apiserver", SelfLink:"", UID:"904b4100-985a-4f84-ae75-ae86d43ecf6f", ResourceVersion:"824", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 21, 33, 38, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7dbcfbfd9", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-a1bcd9ea1c", ContainerID:"10ff34158aa6b2de97c11d304b64d53489e6462c05810815cc584f77e33309f4", Pod:"calico-apiserver-7dbcfbfd9-4j6ds", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.32.70/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali291d22c7c0b", MAC:"9a:9d:19:b3:40:e8", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}}
Oct  2 21:33:39.165604 env[1455]: 2023-10-02 21:33:39.163 [INFO][4984] k8s.go 489: Wrote updated endpoint to datastore ContainerID="10ff34158aa6b2de97c11d304b64d53489e6462c05810815cc584f77e33309f4" Namespace="calico-apiserver" Pod="calico-apiserver-7dbcfbfd9-4j6ds" WorkloadEndpoint="ci--3510.3.0--a--a1bcd9ea1c-k8s-calico--apiserver--7dbcfbfd9--4j6ds-eth0"
Oct  2 21:33:39.170961 env[1455]: time="2023-10-02T21:33:39.170896579Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1
Oct  2 21:33:39.170961 env[1455]: time="2023-10-02T21:33:39.170917434Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1
Oct  2 21:33:39.170961 env[1455]: time="2023-10-02T21:33:39.170924184Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1
Oct  2 21:33:39.171081 env[1455]: time="2023-10-02T21:33:39.171019845Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/10ff34158aa6b2de97c11d304b64d53489e6462c05810815cc584f77e33309f4 pid=5117 runtime=io.containerd.runc.v2
Oct  2 21:33:39.171000 audit[5122]: NETFILTER_CFG table=filter:115 family=2 entries=46 op=nft_register_chain pid=5122 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re"
Oct  2 21:33:39.171000 audit[5122]: SYSCALL arch=c000003e syscall=46 success=yes exit=23292 a0=3 a1=7ffc749366b0 a2=0 a3=7ffc7493669c items=0 ppid=3906 pid=5122 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:33:39.171000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030
Oct  2 21:33:39.177073 systemd[1]: Started cri-containerd-b3de240d0bbd2d473914047fa580ff5fbaa405f59f4ec0de1f415dc873e92d93.scope.
Oct  2 21:33:39.181000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:39.181000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:39.181000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:39.181000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:39.181000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:39.181000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:39.181000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:39.181000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:39.181000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:39.181000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:39.181000 audit: BPF prog-id=180 op=LOAD
Oct  2 21:33:39.181000 audit[5088]: AVC avc:  denied  { bpf } for  pid=5088 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:39.181000 audit[5088]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=5078 pid=5088 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:33:39.181000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233646532343064306262643264343733393134303437666135383066
Oct  2 21:33:39.181000 audit[5088]: AVC avc:  denied  { perfmon } for  pid=5088 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:39.181000 audit[5088]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=5078 pid=5088 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:33:39.181000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233646532343064306262643264343733393134303437666135383066
Oct  2 21:33:39.181000 audit[5088]: AVC avc:  denied  { bpf } for  pid=5088 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:39.181000 audit[5088]: AVC avc:  denied  { bpf } for  pid=5088 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:39.181000 audit[5088]: AVC avc:  denied  { bpf } for  pid=5088 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:39.181000 audit[5088]: AVC avc:  denied  { perfmon } for  pid=5088 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:39.181000 audit[5088]: AVC avc:  denied  { perfmon } for  pid=5088 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:39.181000 audit[5088]: AVC avc:  denied  { perfmon } for  pid=5088 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:39.181000 audit[5088]: AVC avc:  denied  { perfmon } for  pid=5088 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:39.181000 audit[5088]: AVC avc:  denied  { perfmon } for  pid=5088 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:39.181000 audit[5088]: AVC avc:  denied  { bpf } for  pid=5088 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:39.181000 audit[5088]: AVC avc:  denied  { bpf } for  pid=5088 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:39.181000 audit: BPF prog-id=181 op=LOAD
Oct  2 21:33:39.181000 audit[5088]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000024a30 items=0 ppid=5078 pid=5088 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:33:39.181000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233646532343064306262643264343733393134303437666135383066
Oct  2 21:33:39.182000 audit[5088]: AVC avc:  denied  { bpf } for  pid=5088 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:39.182000 audit[5088]: AVC avc:  denied  { bpf } for  pid=5088 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:39.182000 audit[5088]: AVC avc:  denied  { perfmon } for  pid=5088 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:39.182000 audit[5088]: AVC avc:  denied  { perfmon } for  pid=5088 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:39.182000 audit[5088]: AVC avc:  denied  { perfmon } for  pid=5088 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:39.182000 audit[5088]: AVC avc:  denied  { perfmon } for  pid=5088 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:39.182000 audit[5088]: AVC avc:  denied  { perfmon } for  pid=5088 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:39.182000 audit[5088]: AVC avc:  denied  { bpf } for  pid=5088 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:39.182000 audit[5088]: AVC avc:  denied  { bpf } for  pid=5088 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:39.182000 audit: BPF prog-id=182 op=LOAD
Oct  2 21:33:39.182000 audit[5088]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000024a78 items=0 ppid=5078 pid=5088 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:33:39.182000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233646532343064306262643264343733393134303437666135383066
Oct  2 21:33:39.182000 audit: BPF prog-id=182 op=UNLOAD
Oct  2 21:33:39.182000 audit: BPF prog-id=181 op=UNLOAD
Oct  2 21:33:39.182000 audit[5088]: AVC avc:  denied  { bpf } for  pid=5088 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:39.182000 audit[5088]: AVC avc:  denied  { bpf } for  pid=5088 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:39.182000 audit[5088]: AVC avc:  denied  { bpf } for  pid=5088 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:39.182000 audit[5088]: AVC avc:  denied  { perfmon } for  pid=5088 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:39.182000 audit[5088]: AVC avc:  denied  { perfmon } for  pid=5088 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:39.182000 audit[5088]: AVC avc:  denied  { perfmon } for  pid=5088 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:39.182000 audit[5088]: AVC avc:  denied  { perfmon } for  pid=5088 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:39.182000 audit[5088]: AVC avc:  denied  { perfmon } for  pid=5088 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:39.182000 audit[5088]: AVC avc:  denied  { bpf } for  pid=5088 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:39.182000 audit[5088]: AVC avc:  denied  { bpf } for  pid=5088 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:39.182000 audit: BPF prog-id=183 op=LOAD
Oct  2 21:33:39.182000 audit[5088]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000024e88 items=0 ppid=5078 pid=5088 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:33:39.182000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233646532343064306262643264343733393134303437666135383066
Oct  2 21:33:39.190287 systemd[1]: Started cri-containerd-10ff34158aa6b2de97c11d304b64d53489e6462c05810815cc584f77e33309f4.scope.
Oct  2 21:33:39.194000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:39.194000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:39.194000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:39.194000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:39.194000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:39.194000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:39.194000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:39.194000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:39.194000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:39.194000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:39.194000 audit: BPF prog-id=184 op=LOAD
Oct  2 21:33:39.194000 audit[5128]: AVC avc:  denied  { bpf } for  pid=5128 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:39.194000 audit[5128]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=5117 pid=5128 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:33:39.194000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130666633343135386161366232646539376331316433303462363464
Oct  2 21:33:39.194000 audit[5128]: AVC avc:  denied  { perfmon } for  pid=5128 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:39.194000 audit[5128]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=5117 pid=5128 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:33:39.194000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130666633343135386161366232646539376331316433303462363464
Oct  2 21:33:39.194000 audit[5128]: AVC avc:  denied  { bpf } for  pid=5128 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:39.194000 audit[5128]: AVC avc:  denied  { bpf } for  pid=5128 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:39.194000 audit[5128]: AVC avc:  denied  { bpf } for  pid=5128 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:39.194000 audit[5128]: AVC avc:  denied  { perfmon } for  pid=5128 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:39.194000 audit[5128]: AVC avc:  denied  { perfmon } for  pid=5128 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:39.194000 audit[5128]: AVC avc:  denied  { perfmon } for  pid=5128 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:39.194000 audit[5128]: AVC avc:  denied  { perfmon } for  pid=5128 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:39.194000 audit[5128]: AVC avc:  denied  { perfmon } for  pid=5128 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:39.194000 audit[5128]: AVC avc:  denied  { bpf } for  pid=5128 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:39.194000 audit[5128]: AVC avc:  denied  { bpf } for  pid=5128 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:39.194000 audit: BPF prog-id=185 op=LOAD
Oct  2 21:33:39.194000 audit[5128]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000280f70 items=0 ppid=5117 pid=5128 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:33:39.194000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130666633343135386161366232646539376331316433303462363464
Oct  2 21:33:39.195000 audit[5128]: AVC avc:  denied  { bpf } for  pid=5128 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:39.195000 audit[5128]: AVC avc:  denied  { bpf } for  pid=5128 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:39.195000 audit[5128]: AVC avc:  denied  { perfmon } for  pid=5128 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:39.195000 audit[5128]: AVC avc:  denied  { perfmon } for  pid=5128 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:39.195000 audit[5128]: AVC avc:  denied  { perfmon } for  pid=5128 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:39.195000 audit[5128]: AVC avc:  denied  { perfmon } for  pid=5128 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:39.195000 audit[5128]: AVC avc:  denied  { perfmon } for  pid=5128 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:39.195000 audit[5128]: AVC avc:  denied  { bpf } for  pid=5128 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:39.195000 audit[5128]: AVC avc:  denied  { bpf } for  pid=5128 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:39.195000 audit: BPF prog-id=186 op=LOAD
Oct  2 21:33:39.195000 audit[5128]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c000280fb8 items=0 ppid=5117 pid=5128 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:33:39.195000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130666633343135386161366232646539376331316433303462363464
Oct  2 21:33:39.195000 audit: BPF prog-id=186 op=UNLOAD
Oct  2 21:33:39.195000 audit: BPF prog-id=185 op=UNLOAD
Oct  2 21:33:39.195000 audit[5128]: AVC avc:  denied  { bpf } for  pid=5128 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:39.195000 audit[5128]: AVC avc:  denied  { bpf } for  pid=5128 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:39.195000 audit[5128]: AVC avc:  denied  { bpf } for  pid=5128 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:39.195000 audit[5128]: AVC avc:  denied  { perfmon } for  pid=5128 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:39.195000 audit[5128]: AVC avc:  denied  { perfmon } for  pid=5128 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:39.195000 audit[5128]: AVC avc:  denied  { perfmon } for  pid=5128 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:39.195000 audit[5128]: AVC avc:  denied  { perfmon } for  pid=5128 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:39.195000 audit[5128]: AVC avc:  denied  { perfmon } for  pid=5128 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:39.195000 audit[5128]: AVC avc:  denied  { bpf } for  pid=5128 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:39.195000 audit[5128]: AVC avc:  denied  { bpf } for  pid=5128 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Oct  2 21:33:39.195000 audit: BPF prog-id=187 op=LOAD
Oct  2 21:33:39.195000 audit[5128]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0002813c8 items=0 ppid=5117 pid=5128 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:33:39.195000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130666633343135386161366232646539376331316433303462363464
Oct  2 21:33:39.213172 env[1455]: time="2023-10-02T21:33:39.213108267Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7dbcfbfd9-ts2w6,Uid:10aa136e-fcbb-47e7-b373-1b69bde373de,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"b3de240d0bbd2d473914047fa580ff5fbaa405f59f4ec0de1f415dc873e92d93\""
Oct  2 21:33:39.213885 env[1455]: time="2023-10-02T21:33:39.213872295Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\""
Oct  2 21:33:39.225255 env[1455]: time="2023-10-02T21:33:39.225231464Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7dbcfbfd9-4j6ds,Uid:904b4100-985a-4f84-ae75-ae86d43ecf6f,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"10ff34158aa6b2de97c11d304b64d53489e6462c05810815cc584f77e33309f4\""
Oct  2 21:33:39.453275 env[1455]: time="2023-10-02T21:33:39.453100681Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io
Oct  2 21:33:39.454697 env[1455]: time="2023-10-02T21:33:39.454569061Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden"
Oct  2 21:33:39.455164 kubelet[2553]: E1002 21:33:39.455078    2553 remote_image.go:180] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0"
Oct  2 21:33:39.455164 kubelet[2553]: E1002 21:33:39.455167    2553 kuberuntime_image.go:53] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0"
Oct  2 21:33:39.455675 kubelet[2553]: E1002 21:33:39.455582    2553 kuberuntime_manager.go:1209] container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.25.0,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-cwxlk,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/version,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:90,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/code/filecheck],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:5,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:5,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*false,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod calico-apiserver-7dbcfbfd9-ts2w6_calico-apiserver(10aa136e-fcbb-47e7-b373-1b69bde373de): ErrImagePull: failed to pull and unpack image "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden
Oct  2 21:33:39.456118 kubelet[2553]: E1002 21:33:39.455711    2553 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-apiserver/calico-apiserver-7dbcfbfd9-ts2w6" podUID="10aa136e-fcbb-47e7-b373-1b69bde373de"
Oct  2 21:33:39.456325 env[1455]: time="2023-10-02T21:33:39.455938985Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\""
Oct  2 21:33:39.712923 env[1455]: time="2023-10-02T21:33:39.712771383Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io
Oct  2 21:33:39.713790 env[1455]: time="2023-10-02T21:33:39.713659021Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden"
Oct  2 21:33:39.714271 kubelet[2553]: E1002 21:33:39.714181    2553 remote_image.go:180] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0"
Oct  2 21:33:39.714271 kubelet[2553]: E1002 21:33:39.714271    2553 kuberuntime_image.go:53] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0"
Oct  2 21:33:39.715144 kubelet[2553]: E1002 21:33:39.714548    2553 kuberuntime_manager.go:1209] container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.25.0,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-trf7h,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/version,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:90,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/code/filecheck],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:5,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:5,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*false,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod calico-apiserver-7dbcfbfd9-4j6ds_calico-apiserver(904b4100-985a-4f84-ae75-ae86d43ecf6f): ErrImagePull: failed to pull and unpack image "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden
Oct  2 21:33:39.715144 kubelet[2553]: E1002 21:33:39.714656    2553 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-apiserver/calico-apiserver-7dbcfbfd9-4j6ds" podUID="904b4100-985a-4f84-ae75-ae86d43ecf6f"
Oct  2 21:33:39.988686 kubelet[2553]: E1002 21:33:39.988589    2553 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-7dbcfbfd9-4j6ds" podUID="904b4100-985a-4f84-ae75-ae86d43ecf6f"
Oct  2 21:33:39.990947 kubelet[2553]: E1002 21:33:39.990853    2553 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-7dbcfbfd9-ts2w6" podUID="10aa136e-fcbb-47e7-b373-1b69bde373de"
Oct  2 21:33:40.032000 audit[5168]: NETFILTER_CFG table=filter:116 family=2 entries=10 op=nft_register_rule pid=5168 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Oct  2 21:33:40.032000 audit[5168]: SYSCALL arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7ffc74b72700 a2=0 a3=7ffc74b726ec items=0 ppid=2801 pid=5168 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:33:40.032000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Oct  2 21:33:40.034000 audit[5168]: NETFILTER_CFG table=nat:117 family=2 entries=20 op=nft_register_rule pid=5168 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Oct  2 21:33:40.034000 audit[5168]: SYSCALL arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7ffc74b72700 a2=0 a3=7ffc74b726ec items=0 ppid=2801 pid=5168 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:33:40.034000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Oct  2 21:33:40.136000 audit[2376]: AVC avc:  denied  { watch } for  pid=2376 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c698,c859 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 21:33:40.136000 audit[2376]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00187a720 a2=fc6 a3=0 items=0 ppid=2239 pid=2376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c698,c859 key=(null)
Oct  2 21:33:40.136000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 21:33:40.136000 audit[2376]: AVC avc:  denied  { watch } for  pid=2376 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c698,c859 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 21:33:40.136000 audit[2376]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000ea7420 a2=fc6 a3=0 items=0 ppid=2239 pid=2376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c698,c859 key=(null)
Oct  2 21:33:40.136000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 21:33:40.313752 systemd-networkd[1301]: cali291d22c7c0b: Gained IPv6LL
Oct  2 21:33:40.374000 audit[2377]: AVC avc:  denied  { watch } for  pid=2377 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c411,c438 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 21:33:40.415389 kernel: kauditd_printk_skb: 191 callbacks suppressed
Oct  2 21:33:40.415485 kernel: audit: type=1400 audit(1696282420.374:1352): avc:  denied  { watch } for  pid=2377 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c411,c438 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 21:33:40.374000 audit[2377]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=68 a1=c00baabbe0 a2=fc6 a3=0 items=0 ppid=2211 pid=2377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c411,c438 key=(null)
Oct  2 21:33:40.499505 kernel: audit: type=1300 audit(1696282420.374:1352): arch=c000003e syscall=254 success=no exit=-13 a0=68 a1=c00baabbe0 a2=fc6 a3=0 items=0 ppid=2211 pid=2377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c411,c438 key=(null)
Oct  2 21:33:40.569586 systemd-networkd[1301]: calic99dc000129: Gained IPv6LL
Oct  2 21:33:40.374000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E3439002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75
Oct  2 21:33:40.677936 kernel: audit: type=1327 audit(1696282420.374:1352): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E3439002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75
Oct  2 21:33:40.677962 kernel: audit: type=1400 audit(1696282420.374:1353): avc:  denied  { watch } for  pid=2377 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=520974 scontext=system_u:system_r:svirt_lxc_net_t:s0:c411,c438 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 21:33:40.374000 audit[2377]: AVC avc:  denied  { watch } for  pid=2377 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=520974 scontext=system_u:system_r:svirt_lxc_net_t:s0:c411,c438 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 21:33:40.761853 kernel: audit: type=1300 audit(1696282420.374:1353): arch=c000003e syscall=254 success=no exit=-13 a0=69 a1=c0104c65d0 a2=fc6 a3=0 items=0 ppid=2211 pid=2377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c411,c438 key=(null)
Oct  2 21:33:40.374000 audit[2377]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=69 a1=c0104c65d0 a2=fc6 a3=0 items=0 ppid=2211 pid=2377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c411,c438 key=(null)
Oct  2 21:33:40.854522 kernel: audit: type=1327 audit(1696282420.374:1353): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E3439002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75
Oct  2 21:33:40.374000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E3439002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75
Oct  2 21:33:40.374000 audit[2377]: AVC avc:  denied  { watch } for  pid=2377 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c411,c438 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 21:33:40.990251 kubelet[2553]: E1002 21:33:40.990238    2553 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-7dbcfbfd9-ts2w6" podUID="10aa136e-fcbb-47e7-b373-1b69bde373de"
Oct  2 21:33:40.990468 kubelet[2553]: E1002 21:33:40.990291    2553 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-7dbcfbfd9-4j6ds" podUID="904b4100-985a-4f84-ae75-ae86d43ecf6f"
Oct  2 21:33:41.028397 kernel: audit: type=1400 audit(1696282420.374:1354): avc:  denied  { watch } for  pid=2377 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c411,c438 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 21:33:41.028463 kernel: audit: type=1300 audit(1696282420.374:1354): arch=c000003e syscall=254 success=no exit=-13 a0=68 a1=c0105f7440 a2=fc6 a3=0 items=0 ppid=2211 pid=2377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c411,c438 key=(null)
Oct  2 21:33:40.374000 audit[2377]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=68 a1=c0105f7440 a2=fc6 a3=0 items=0 ppid=2211 pid=2377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c411,c438 key=(null)
Oct  2 21:33:41.124783 kernel: audit: type=1327 audit(1696282420.374:1354): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E3439002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75
Oct  2 21:33:40.374000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E3439002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75
Oct  2 21:33:40.383000 audit[2377]: AVC avc:  denied  { watch } for  pid=2377 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=520980 scontext=system_u:system_r:svirt_lxc_net_t:s0:c411,c438 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 21:33:41.306105 kernel: audit: type=1400 audit(1696282420.383:1355): avc:  denied  { watch } for  pid=2377 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=520980 scontext=system_u:system_r:svirt_lxc_net_t:s0:c411,c438 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 21:33:40.383000 audit[2377]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=68 a1=c001267890 a2=fc6 a3=0 items=0 ppid=2211 pid=2377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c411,c438 key=(null)
Oct  2 21:33:40.383000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E3439002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75
Oct  2 21:33:40.384000 audit[2377]: AVC avc:  denied  { watch } for  pid=2377 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c411,c438 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 21:33:40.384000 audit[2377]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=68 a1=c00ca32c40 a2=fc6 a3=0 items=0 ppid=2211 pid=2377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c411,c438 key=(null)
Oct  2 21:33:40.384000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E3439002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75
Oct  2 21:33:40.384000 audit[2377]: AVC avc:  denied  { watch } for  pid=2377 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c411,c438 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 21:33:40.384000 audit[2377]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=68 a1=c0077c6510 a2=fc6 a3=0 items=0 ppid=2211 pid=2377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c411,c438 key=(null)
Oct  2 21:33:40.384000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E3439002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75
Oct  2 21:33:41.047000 audit[5172]: NETFILTER_CFG table=filter:118 family=2 entries=10 op=nft_register_rule pid=5172 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Oct  2 21:33:41.047000 audit[5172]: SYSCALL arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7ffc3841fa60 a2=0 a3=7ffc3841fa4c items=0 ppid=2801 pid=5172 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:33:41.047000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Oct  2 21:33:41.048000 audit[5172]: NETFILTER_CFG table=nat:119 family=2 entries=20 op=nft_register_rule pid=5172 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Oct  2 21:33:41.048000 audit[5172]: SYSCALL arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7ffc3841fa60 a2=0 a3=7ffc3841fa4c items=0 ppid=2801 pid=5172 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:33:41.048000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Oct  2 21:33:43.788390 env[1455]: time="2023-10-02T21:33:43.788296191Z" level=info msg="StopPodSandbox for \"fc1f2b39cec18d0737c2ebd9e4b62ab912d3224915559a5a84367a29f4d9ddd3\""
Oct  2 21:33:43.882114 env[1455]: 2023-10-02 21:33:43.849 [WARNING][5202] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="fc1f2b39cec18d0737c2ebd9e4b62ab912d3224915559a5a84367a29f4d9ddd3" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--a1bcd9ea1c-k8s-coredns--5dd5756b68--7p5tc-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"08a61aaa-2cf9-4b33-86ce-8de9f79ca724", ResourceVersion:"727", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 21, 32, 58, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-a1bcd9ea1c", ContainerID:"f8929669586a29e8abd1e0077e97a3a691b7cced59fa55772320a22d344c7769", Pod:"coredns-5dd5756b68-7p5tc", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.32.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali7f20f82f84e", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}}
Oct  2 21:33:43.882114 env[1455]: 2023-10-02 21:33:43.850 [INFO][5202] k8s.go 576: Cleaning up netns ContainerID="fc1f2b39cec18d0737c2ebd9e4b62ab912d3224915559a5a84367a29f4d9ddd3"
Oct  2 21:33:43.882114 env[1455]: 2023-10-02 21:33:43.850 [INFO][5202] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="fc1f2b39cec18d0737c2ebd9e4b62ab912d3224915559a5a84367a29f4d9ddd3" iface="eth0" netns=""
Oct  2 21:33:43.882114 env[1455]: 2023-10-02 21:33:43.850 [INFO][5202] k8s.go 583: Releasing IP address(es) ContainerID="fc1f2b39cec18d0737c2ebd9e4b62ab912d3224915559a5a84367a29f4d9ddd3"
Oct  2 21:33:43.882114 env[1455]: 2023-10-02 21:33:43.850 [INFO][5202] utils.go 196: Calico CNI releasing IP address ContainerID="fc1f2b39cec18d0737c2ebd9e4b62ab912d3224915559a5a84367a29f4d9ddd3"
Oct  2 21:33:43.882114 env[1455]: 2023-10-02 21:33:43.868 [INFO][5221] ipam_plugin.go 416: Releasing address using handleID ContainerID="fc1f2b39cec18d0737c2ebd9e4b62ab912d3224915559a5a84367a29f4d9ddd3" HandleID="k8s-pod-network.fc1f2b39cec18d0737c2ebd9e4b62ab912d3224915559a5a84367a29f4d9ddd3" Workload="ci--3510.3.0--a--a1bcd9ea1c-k8s-coredns--5dd5756b68--7p5tc-eth0"
Oct  2 21:33:43.882114 env[1455]: time="2023-10-02T21:33:43Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357"
Oct  2 21:33:43.882114 env[1455]: time="2023-10-02T21:33:43Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372"
Oct  2 21:33:43.882114 env[1455]: 2023-10-02 21:33:43.874 [WARNING][5221] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="fc1f2b39cec18d0737c2ebd9e4b62ab912d3224915559a5a84367a29f4d9ddd3" HandleID="k8s-pod-network.fc1f2b39cec18d0737c2ebd9e4b62ab912d3224915559a5a84367a29f4d9ddd3" Workload="ci--3510.3.0--a--a1bcd9ea1c-k8s-coredns--5dd5756b68--7p5tc-eth0"
Oct  2 21:33:43.882114 env[1455]: 2023-10-02 21:33:43.874 [INFO][5221] ipam_plugin.go 444: Releasing address using workloadID ContainerID="fc1f2b39cec18d0737c2ebd9e4b62ab912d3224915559a5a84367a29f4d9ddd3" HandleID="k8s-pod-network.fc1f2b39cec18d0737c2ebd9e4b62ab912d3224915559a5a84367a29f4d9ddd3" Workload="ci--3510.3.0--a--a1bcd9ea1c-k8s-coredns--5dd5756b68--7p5tc-eth0"
Oct  2 21:33:43.882114 env[1455]: time="2023-10-02T21:33:43Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378"
Oct  2 21:33:43.882114 env[1455]: 2023-10-02 21:33:43.879 [INFO][5202] k8s.go 589: Teardown processing complete. ContainerID="fc1f2b39cec18d0737c2ebd9e4b62ab912d3224915559a5a84367a29f4d9ddd3"
Oct  2 21:33:43.884042 env[1455]: time="2023-10-02T21:33:43.882162671Z" level=info msg="TearDown network for sandbox \"fc1f2b39cec18d0737c2ebd9e4b62ab912d3224915559a5a84367a29f4d9ddd3\" successfully"
Oct  2 21:33:43.884042 env[1455]: time="2023-10-02T21:33:43.882230559Z" level=info msg="StopPodSandbox for \"fc1f2b39cec18d0737c2ebd9e4b62ab912d3224915559a5a84367a29f4d9ddd3\" returns successfully"
Oct  2 21:33:43.884042 env[1455]: time="2023-10-02T21:33:43.883392966Z" level=info msg="RemovePodSandbox for \"fc1f2b39cec18d0737c2ebd9e4b62ab912d3224915559a5a84367a29f4d9ddd3\""
Oct  2 21:33:43.884042 env[1455]: time="2023-10-02T21:33:43.883499627Z" level=info msg="Forcibly stopping sandbox \"fc1f2b39cec18d0737c2ebd9e4b62ab912d3224915559a5a84367a29f4d9ddd3\""
Oct  2 21:33:43.972131 env[1455]: 2023-10-02 21:33:43.937 [WARNING][5250] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="fc1f2b39cec18d0737c2ebd9e4b62ab912d3224915559a5a84367a29f4d9ddd3" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--a1bcd9ea1c-k8s-coredns--5dd5756b68--7p5tc-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"08a61aaa-2cf9-4b33-86ce-8de9f79ca724", ResourceVersion:"727", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 21, 32, 58, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-a1bcd9ea1c", ContainerID:"f8929669586a29e8abd1e0077e97a3a691b7cced59fa55772320a22d344c7769", Pod:"coredns-5dd5756b68-7p5tc", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.32.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali7f20f82f84e", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}}
Oct  2 21:33:43.972131 env[1455]: 2023-10-02 21:33:43.938 [INFO][5250] k8s.go 576: Cleaning up netns ContainerID="fc1f2b39cec18d0737c2ebd9e4b62ab912d3224915559a5a84367a29f4d9ddd3"
Oct  2 21:33:43.972131 env[1455]: 2023-10-02 21:33:43.938 [INFO][5250] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="fc1f2b39cec18d0737c2ebd9e4b62ab912d3224915559a5a84367a29f4d9ddd3" iface="eth0" netns=""
Oct  2 21:33:43.972131 env[1455]: 2023-10-02 21:33:43.938 [INFO][5250] k8s.go 583: Releasing IP address(es) ContainerID="fc1f2b39cec18d0737c2ebd9e4b62ab912d3224915559a5a84367a29f4d9ddd3"
Oct  2 21:33:43.972131 env[1455]: 2023-10-02 21:33:43.938 [INFO][5250] utils.go 196: Calico CNI releasing IP address ContainerID="fc1f2b39cec18d0737c2ebd9e4b62ab912d3224915559a5a84367a29f4d9ddd3"
Oct  2 21:33:43.972131 env[1455]: 2023-10-02 21:33:43.960 [INFO][5265] ipam_plugin.go 416: Releasing address using handleID ContainerID="fc1f2b39cec18d0737c2ebd9e4b62ab912d3224915559a5a84367a29f4d9ddd3" HandleID="k8s-pod-network.fc1f2b39cec18d0737c2ebd9e4b62ab912d3224915559a5a84367a29f4d9ddd3" Workload="ci--3510.3.0--a--a1bcd9ea1c-k8s-coredns--5dd5756b68--7p5tc-eth0"
Oct  2 21:33:43.972131 env[1455]: time="2023-10-02T21:33:43Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357"
Oct  2 21:33:43.972131 env[1455]: time="2023-10-02T21:33:43Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372"
Oct  2 21:33:43.972131 env[1455]: 2023-10-02 21:33:43.967 [WARNING][5265] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="fc1f2b39cec18d0737c2ebd9e4b62ab912d3224915559a5a84367a29f4d9ddd3" HandleID="k8s-pod-network.fc1f2b39cec18d0737c2ebd9e4b62ab912d3224915559a5a84367a29f4d9ddd3" Workload="ci--3510.3.0--a--a1bcd9ea1c-k8s-coredns--5dd5756b68--7p5tc-eth0"
Oct  2 21:33:43.972131 env[1455]: 2023-10-02 21:33:43.967 [INFO][5265] ipam_plugin.go 444: Releasing address using workloadID ContainerID="fc1f2b39cec18d0737c2ebd9e4b62ab912d3224915559a5a84367a29f4d9ddd3" HandleID="k8s-pod-network.fc1f2b39cec18d0737c2ebd9e4b62ab912d3224915559a5a84367a29f4d9ddd3" Workload="ci--3510.3.0--a--a1bcd9ea1c-k8s-coredns--5dd5756b68--7p5tc-eth0"
Oct  2 21:33:43.972131 env[1455]: time="2023-10-02T21:33:43Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378"
Oct  2 21:33:43.972131 env[1455]: 2023-10-02 21:33:43.971 [INFO][5250] k8s.go 589: Teardown processing complete. ContainerID="fc1f2b39cec18d0737c2ebd9e4b62ab912d3224915559a5a84367a29f4d9ddd3"
Oct  2 21:33:43.972888 env[1455]: time="2023-10-02T21:33:43.972156300Z" level=info msg="TearDown network for sandbox \"fc1f2b39cec18d0737c2ebd9e4b62ab912d3224915559a5a84367a29f4d9ddd3\" successfully"
Oct  2 21:33:43.974493 env[1455]: time="2023-10-02T21:33:43.974466115Z" level=info msg="RemovePodSandbox \"fc1f2b39cec18d0737c2ebd9e4b62ab912d3224915559a5a84367a29f4d9ddd3\" returns successfully"
Oct  2 21:33:43.974989 env[1455]: time="2023-10-02T21:33:43.974961616Z" level=info msg="StopPodSandbox for \"828466ccfe00090816a76a7752a8aface1c9d36ab42a7898dcfdbf5504380056\""
Oct  2 21:33:44.055520 env[1455]: 2023-10-02 21:33:44.017 [WARNING][5296] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="828466ccfe00090816a76a7752a8aface1c9d36ab42a7898dcfdbf5504380056" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--a1bcd9ea1c-k8s-calico--kube--controllers--74b9887bb6--48chr-eth0", GenerateName:"calico-kube-controllers-74b9887bb6-", Namespace:"calico-system", SelfLink:"", UID:"de6c269b-507a-4781-82d6-2e325f82e757", ResourceVersion:"773", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 21, 33, 4, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"74b9887bb6", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-a1bcd9ea1c", ContainerID:"e092866d0f6c1935add6968abddfb8252d5fe6fa89c4424fdf812d622bef8502", Pod:"calico-kube-controllers-74b9887bb6-48chr", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.32.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali067854a7a9f", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}}
Oct  2 21:33:44.055520 env[1455]: 2023-10-02 21:33:44.017 [INFO][5296] k8s.go 576: Cleaning up netns ContainerID="828466ccfe00090816a76a7752a8aface1c9d36ab42a7898dcfdbf5504380056"
Oct  2 21:33:44.055520 env[1455]: 2023-10-02 21:33:44.017 [INFO][5296] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="828466ccfe00090816a76a7752a8aface1c9d36ab42a7898dcfdbf5504380056" iface="eth0" netns=""
Oct  2 21:33:44.055520 env[1455]: 2023-10-02 21:33:44.017 [INFO][5296] k8s.go 583: Releasing IP address(es) ContainerID="828466ccfe00090816a76a7752a8aface1c9d36ab42a7898dcfdbf5504380056"
Oct  2 21:33:44.055520 env[1455]: 2023-10-02 21:33:44.017 [INFO][5296] utils.go 196: Calico CNI releasing IP address ContainerID="828466ccfe00090816a76a7752a8aface1c9d36ab42a7898dcfdbf5504380056"
Oct  2 21:33:44.055520 env[1455]: 2023-10-02 21:33:44.042 [INFO][5312] ipam_plugin.go 416: Releasing address using handleID ContainerID="828466ccfe00090816a76a7752a8aface1c9d36ab42a7898dcfdbf5504380056" HandleID="k8s-pod-network.828466ccfe00090816a76a7752a8aface1c9d36ab42a7898dcfdbf5504380056" Workload="ci--3510.3.0--a--a1bcd9ea1c-k8s-calico--kube--controllers--74b9887bb6--48chr-eth0"
Oct  2 21:33:44.055520 env[1455]: time="2023-10-02T21:33:44Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357"
Oct  2 21:33:44.055520 env[1455]: time="2023-10-02T21:33:44Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372"
Oct  2 21:33:44.055520 env[1455]: 2023-10-02 21:33:44.050 [WARNING][5312] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="828466ccfe00090816a76a7752a8aface1c9d36ab42a7898dcfdbf5504380056" HandleID="k8s-pod-network.828466ccfe00090816a76a7752a8aface1c9d36ab42a7898dcfdbf5504380056" Workload="ci--3510.3.0--a--a1bcd9ea1c-k8s-calico--kube--controllers--74b9887bb6--48chr-eth0"
Oct  2 21:33:44.055520 env[1455]: 2023-10-02 21:33:44.050 [INFO][5312] ipam_plugin.go 444: Releasing address using workloadID ContainerID="828466ccfe00090816a76a7752a8aface1c9d36ab42a7898dcfdbf5504380056" HandleID="k8s-pod-network.828466ccfe00090816a76a7752a8aface1c9d36ab42a7898dcfdbf5504380056" Workload="ci--3510.3.0--a--a1bcd9ea1c-k8s-calico--kube--controllers--74b9887bb6--48chr-eth0"
Oct  2 21:33:44.055520 env[1455]: time="2023-10-02T21:33:44Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378"
Oct  2 21:33:44.055520 env[1455]: 2023-10-02 21:33:44.054 [INFO][5296] k8s.go 589: Teardown processing complete. ContainerID="828466ccfe00090816a76a7752a8aface1c9d36ab42a7898dcfdbf5504380056"
Oct  2 21:33:44.055520 env[1455]: time="2023-10-02T21:33:44.055484105Z" level=info msg="TearDown network for sandbox \"828466ccfe00090816a76a7752a8aface1c9d36ab42a7898dcfdbf5504380056\" successfully"
Oct  2 21:33:44.056339 env[1455]: time="2023-10-02T21:33:44.055522211Z" level=info msg="StopPodSandbox for \"828466ccfe00090816a76a7752a8aface1c9d36ab42a7898dcfdbf5504380056\" returns successfully"
Oct  2 21:33:44.056339 env[1455]: time="2023-10-02T21:33:44.056089292Z" level=info msg="RemovePodSandbox for \"828466ccfe00090816a76a7752a8aface1c9d36ab42a7898dcfdbf5504380056\""
Oct  2 21:33:44.056339 env[1455]: time="2023-10-02T21:33:44.056147614Z" level=info msg="Forcibly stopping sandbox \"828466ccfe00090816a76a7752a8aface1c9d36ab42a7898dcfdbf5504380056\""
Oct  2 21:33:44.138517 env[1455]: 2023-10-02 21:33:44.099 [WARNING][5341] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="828466ccfe00090816a76a7752a8aface1c9d36ab42a7898dcfdbf5504380056" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--a1bcd9ea1c-k8s-calico--kube--controllers--74b9887bb6--48chr-eth0", GenerateName:"calico-kube-controllers-74b9887bb6-", Namespace:"calico-system", SelfLink:"", UID:"de6c269b-507a-4781-82d6-2e325f82e757", ResourceVersion:"773", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 21, 33, 4, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"74b9887bb6", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-a1bcd9ea1c", ContainerID:"e092866d0f6c1935add6968abddfb8252d5fe6fa89c4424fdf812d622bef8502", Pod:"calico-kube-controllers-74b9887bb6-48chr", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.32.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali067854a7a9f", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}}
Oct  2 21:33:44.138517 env[1455]: 2023-10-02 21:33:44.099 [INFO][5341] k8s.go 576: Cleaning up netns ContainerID="828466ccfe00090816a76a7752a8aface1c9d36ab42a7898dcfdbf5504380056"
Oct  2 21:33:44.138517 env[1455]: 2023-10-02 21:33:44.099 [INFO][5341] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="828466ccfe00090816a76a7752a8aface1c9d36ab42a7898dcfdbf5504380056" iface="eth0" netns=""
Oct  2 21:33:44.138517 env[1455]: 2023-10-02 21:33:44.099 [INFO][5341] k8s.go 583: Releasing IP address(es) ContainerID="828466ccfe00090816a76a7752a8aface1c9d36ab42a7898dcfdbf5504380056"
Oct  2 21:33:44.138517 env[1455]: 2023-10-02 21:33:44.100 [INFO][5341] utils.go 196: Calico CNI releasing IP address ContainerID="828466ccfe00090816a76a7752a8aface1c9d36ab42a7898dcfdbf5504380056"
Oct  2 21:33:44.138517 env[1455]: 2023-10-02 21:33:44.124 [INFO][5359] ipam_plugin.go 416: Releasing address using handleID ContainerID="828466ccfe00090816a76a7752a8aface1c9d36ab42a7898dcfdbf5504380056" HandleID="k8s-pod-network.828466ccfe00090816a76a7752a8aface1c9d36ab42a7898dcfdbf5504380056" Workload="ci--3510.3.0--a--a1bcd9ea1c-k8s-calico--kube--controllers--74b9887bb6--48chr-eth0"
Oct  2 21:33:44.138517 env[1455]: time="2023-10-02T21:33:44Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357"
Oct  2 21:33:44.138517 env[1455]: time="2023-10-02T21:33:44Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372"
Oct  2 21:33:44.138517 env[1455]: 2023-10-02 21:33:44.133 [WARNING][5359] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="828466ccfe00090816a76a7752a8aface1c9d36ab42a7898dcfdbf5504380056" HandleID="k8s-pod-network.828466ccfe00090816a76a7752a8aface1c9d36ab42a7898dcfdbf5504380056" Workload="ci--3510.3.0--a--a1bcd9ea1c-k8s-calico--kube--controllers--74b9887bb6--48chr-eth0"
Oct  2 21:33:44.138517 env[1455]: 2023-10-02 21:33:44.133 [INFO][5359] ipam_plugin.go 444: Releasing address using workloadID ContainerID="828466ccfe00090816a76a7752a8aface1c9d36ab42a7898dcfdbf5504380056" HandleID="k8s-pod-network.828466ccfe00090816a76a7752a8aface1c9d36ab42a7898dcfdbf5504380056" Workload="ci--3510.3.0--a--a1bcd9ea1c-k8s-calico--kube--controllers--74b9887bb6--48chr-eth0"
Oct  2 21:33:44.138517 env[1455]: time="2023-10-02T21:33:44Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378"
Oct  2 21:33:44.138517 env[1455]: 2023-10-02 21:33:44.137 [INFO][5341] k8s.go 589: Teardown processing complete. ContainerID="828466ccfe00090816a76a7752a8aface1c9d36ab42a7898dcfdbf5504380056"
Oct  2 21:33:44.139379 env[1455]: time="2023-10-02T21:33:44.138548066Z" level=info msg="TearDown network for sandbox \"828466ccfe00090816a76a7752a8aface1c9d36ab42a7898dcfdbf5504380056\" successfully"
Oct  2 21:33:44.141020 env[1455]: time="2023-10-02T21:33:44.140986669Z" level=info msg="RemovePodSandbox \"828466ccfe00090816a76a7752a8aface1c9d36ab42a7898dcfdbf5504380056\" returns successfully"
Oct  2 21:33:44.141528 env[1455]: time="2023-10-02T21:33:44.141498207Z" level=info msg="StopPodSandbox for \"930b2dc07e7b43c2105f81d278bf08f5407559ee860d9038dee07ff66696907a\""
Oct  2 21:33:44.214384 env[1455]: 2023-10-02 21:33:44.182 [WARNING][5389] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="930b2dc07e7b43c2105f81d278bf08f5407559ee860d9038dee07ff66696907a" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--a1bcd9ea1c-k8s-coredns--5dd5756b68--qkf4n-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"109a1c21-ae79-4281-81b4-7b2bcab3876b", ResourceVersion:"717", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 21, 32, 58, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-a1bcd9ea1c", ContainerID:"80e61dfe4083f5226d94c674bf6b923d0e75e6dd0a59400e2b6fbb80451328a0", Pod:"coredns-5dd5756b68-qkf4n", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.32.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calic84721f7a90", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}}
Oct  2 21:33:44.214384 env[1455]: 2023-10-02 21:33:44.182 [INFO][5389] k8s.go 576: Cleaning up netns ContainerID="930b2dc07e7b43c2105f81d278bf08f5407559ee860d9038dee07ff66696907a"
Oct  2 21:33:44.214384 env[1455]: 2023-10-02 21:33:44.182 [INFO][5389] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="930b2dc07e7b43c2105f81d278bf08f5407559ee860d9038dee07ff66696907a" iface="eth0" netns=""
Oct  2 21:33:44.214384 env[1455]: 2023-10-02 21:33:44.182 [INFO][5389] k8s.go 583: Releasing IP address(es) ContainerID="930b2dc07e7b43c2105f81d278bf08f5407559ee860d9038dee07ff66696907a"
Oct  2 21:33:44.214384 env[1455]: 2023-10-02 21:33:44.182 [INFO][5389] utils.go 196: Calico CNI releasing IP address ContainerID="930b2dc07e7b43c2105f81d278bf08f5407559ee860d9038dee07ff66696907a"
Oct  2 21:33:44.214384 env[1455]: 2023-10-02 21:33:44.203 [INFO][5404] ipam_plugin.go 416: Releasing address using handleID ContainerID="930b2dc07e7b43c2105f81d278bf08f5407559ee860d9038dee07ff66696907a" HandleID="k8s-pod-network.930b2dc07e7b43c2105f81d278bf08f5407559ee860d9038dee07ff66696907a" Workload="ci--3510.3.0--a--a1bcd9ea1c-k8s-coredns--5dd5756b68--qkf4n-eth0"
Oct  2 21:33:44.214384 env[1455]: time="2023-10-02T21:33:44Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357"
Oct  2 21:33:44.214384 env[1455]: time="2023-10-02T21:33:44Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372"
Oct  2 21:33:44.214384 env[1455]: 2023-10-02 21:33:44.210 [WARNING][5404] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="930b2dc07e7b43c2105f81d278bf08f5407559ee860d9038dee07ff66696907a" HandleID="k8s-pod-network.930b2dc07e7b43c2105f81d278bf08f5407559ee860d9038dee07ff66696907a" Workload="ci--3510.3.0--a--a1bcd9ea1c-k8s-coredns--5dd5756b68--qkf4n-eth0"
Oct  2 21:33:44.214384 env[1455]: 2023-10-02 21:33:44.210 [INFO][5404] ipam_plugin.go 444: Releasing address using workloadID ContainerID="930b2dc07e7b43c2105f81d278bf08f5407559ee860d9038dee07ff66696907a" HandleID="k8s-pod-network.930b2dc07e7b43c2105f81d278bf08f5407559ee860d9038dee07ff66696907a" Workload="ci--3510.3.0--a--a1bcd9ea1c-k8s-coredns--5dd5756b68--qkf4n-eth0"
Oct  2 21:33:44.214384 env[1455]: time="2023-10-02T21:33:44Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378"
Oct  2 21:33:44.214384 env[1455]: 2023-10-02 21:33:44.213 [INFO][5389] k8s.go 589: Teardown processing complete. ContainerID="930b2dc07e7b43c2105f81d278bf08f5407559ee860d9038dee07ff66696907a"
Oct  2 21:33:44.215035 env[1455]: time="2023-10-02T21:33:44.214416380Z" level=info msg="TearDown network for sandbox \"930b2dc07e7b43c2105f81d278bf08f5407559ee860d9038dee07ff66696907a\" successfully"
Oct  2 21:33:44.215035 env[1455]: time="2023-10-02T21:33:44.214457922Z" level=info msg="StopPodSandbox for \"930b2dc07e7b43c2105f81d278bf08f5407559ee860d9038dee07ff66696907a\" returns successfully"
Oct  2 21:33:44.215035 env[1455]: time="2023-10-02T21:33:44.214875646Z" level=info msg="RemovePodSandbox for \"930b2dc07e7b43c2105f81d278bf08f5407559ee860d9038dee07ff66696907a\""
Oct  2 21:33:44.215035 env[1455]: time="2023-10-02T21:33:44.214912682Z" level=info msg="Forcibly stopping sandbox \"930b2dc07e7b43c2105f81d278bf08f5407559ee860d9038dee07ff66696907a\""
Oct  2 21:33:44.281365 env[1455]: 2023-10-02 21:33:44.249 [WARNING][5434] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="930b2dc07e7b43c2105f81d278bf08f5407559ee860d9038dee07ff66696907a" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--a1bcd9ea1c-k8s-coredns--5dd5756b68--qkf4n-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"109a1c21-ae79-4281-81b4-7b2bcab3876b", ResourceVersion:"717", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 21, 32, 58, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-a1bcd9ea1c", ContainerID:"80e61dfe4083f5226d94c674bf6b923d0e75e6dd0a59400e2b6fbb80451328a0", Pod:"coredns-5dd5756b68-qkf4n", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.32.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calic84721f7a90", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}}
Oct  2 21:33:44.281365 env[1455]: 2023-10-02 21:33:44.250 [INFO][5434] k8s.go 576: Cleaning up netns ContainerID="930b2dc07e7b43c2105f81d278bf08f5407559ee860d9038dee07ff66696907a"
Oct  2 21:33:44.281365 env[1455]: 2023-10-02 21:33:44.250 [INFO][5434] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="930b2dc07e7b43c2105f81d278bf08f5407559ee860d9038dee07ff66696907a" iface="eth0" netns=""
Oct  2 21:33:44.281365 env[1455]: 2023-10-02 21:33:44.250 [INFO][5434] k8s.go 583: Releasing IP address(es) ContainerID="930b2dc07e7b43c2105f81d278bf08f5407559ee860d9038dee07ff66696907a"
Oct  2 21:33:44.281365 env[1455]: 2023-10-02 21:33:44.250 [INFO][5434] utils.go 196: Calico CNI releasing IP address ContainerID="930b2dc07e7b43c2105f81d278bf08f5407559ee860d9038dee07ff66696907a"
Oct  2 21:33:44.281365 env[1455]: 2023-10-02 21:33:44.270 [INFO][5452] ipam_plugin.go 416: Releasing address using handleID ContainerID="930b2dc07e7b43c2105f81d278bf08f5407559ee860d9038dee07ff66696907a" HandleID="k8s-pod-network.930b2dc07e7b43c2105f81d278bf08f5407559ee860d9038dee07ff66696907a" Workload="ci--3510.3.0--a--a1bcd9ea1c-k8s-coredns--5dd5756b68--qkf4n-eth0"
Oct  2 21:33:44.281365 env[1455]: time="2023-10-02T21:33:44Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357"
Oct  2 21:33:44.281365 env[1455]: time="2023-10-02T21:33:44Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372"
Oct  2 21:33:44.281365 env[1455]: 2023-10-02 21:33:44.277 [WARNING][5452] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="930b2dc07e7b43c2105f81d278bf08f5407559ee860d9038dee07ff66696907a" HandleID="k8s-pod-network.930b2dc07e7b43c2105f81d278bf08f5407559ee860d9038dee07ff66696907a" Workload="ci--3510.3.0--a--a1bcd9ea1c-k8s-coredns--5dd5756b68--qkf4n-eth0"
Oct  2 21:33:44.281365 env[1455]: 2023-10-02 21:33:44.277 [INFO][5452] ipam_plugin.go 444: Releasing address using workloadID ContainerID="930b2dc07e7b43c2105f81d278bf08f5407559ee860d9038dee07ff66696907a" HandleID="k8s-pod-network.930b2dc07e7b43c2105f81d278bf08f5407559ee860d9038dee07ff66696907a" Workload="ci--3510.3.0--a--a1bcd9ea1c-k8s-coredns--5dd5756b68--qkf4n-eth0"
Oct  2 21:33:44.281365 env[1455]: time="2023-10-02T21:33:44Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378"
Oct  2 21:33:44.281365 env[1455]: 2023-10-02 21:33:44.280 [INFO][5434] k8s.go 589: Teardown processing complete. ContainerID="930b2dc07e7b43c2105f81d278bf08f5407559ee860d9038dee07ff66696907a"
Oct  2 21:33:44.282000 env[1455]: time="2023-10-02T21:33:44.281392264Z" level=info msg="TearDown network for sandbox \"930b2dc07e7b43c2105f81d278bf08f5407559ee860d9038dee07ff66696907a\" successfully"
Oct  2 21:33:44.283687 env[1455]: time="2023-10-02T21:33:44.283633846Z" level=info msg="RemovePodSandbox \"930b2dc07e7b43c2105f81d278bf08f5407559ee860d9038dee07ff66696907a\" returns successfully"
Oct  2 21:33:44.284138 env[1455]: time="2023-10-02T21:33:44.284082500Z" level=info msg="StopPodSandbox for \"8b449774db8e54805f256bb2768d44630cb0c1b60dc7b2afede34aa38d463a50\""
Oct  2 21:33:44.350429 env[1455]: 2023-10-02 21:33:44.318 [WARNING][5481] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="8b449774db8e54805f256bb2768d44630cb0c1b60dc7b2afede34aa38d463a50" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--a1bcd9ea1c-k8s-csi--node--driver--7djgt-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"96f60c96-bc95-4de5-a016-9864623478a6", ResourceVersion:"772", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 21, 33, 17, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"6b49688c47", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-a1bcd9ea1c", ContainerID:"e12d4dbff05762a7acf8a28b6855b181e86e08699fd50676c83c96876a5bb934", Pod:"csi-node-driver-7djgt", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.32.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calif3ec2992a3c", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}}
Oct  2 21:33:44.350429 env[1455]: 2023-10-02 21:33:44.319 [INFO][5481] k8s.go 576: Cleaning up netns ContainerID="8b449774db8e54805f256bb2768d44630cb0c1b60dc7b2afede34aa38d463a50"
Oct  2 21:33:44.350429 env[1455]: 2023-10-02 21:33:44.319 [INFO][5481] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="8b449774db8e54805f256bb2768d44630cb0c1b60dc7b2afede34aa38d463a50" iface="eth0" netns=""
Oct  2 21:33:44.350429 env[1455]: 2023-10-02 21:33:44.319 [INFO][5481] k8s.go 583: Releasing IP address(es) ContainerID="8b449774db8e54805f256bb2768d44630cb0c1b60dc7b2afede34aa38d463a50"
Oct  2 21:33:44.350429 env[1455]: 2023-10-02 21:33:44.319 [INFO][5481] utils.go 196: Calico CNI releasing IP address ContainerID="8b449774db8e54805f256bb2768d44630cb0c1b60dc7b2afede34aa38d463a50"
Oct  2 21:33:44.350429 env[1455]: 2023-10-02 21:33:44.339 [INFO][5495] ipam_plugin.go 416: Releasing address using handleID ContainerID="8b449774db8e54805f256bb2768d44630cb0c1b60dc7b2afede34aa38d463a50" HandleID="k8s-pod-network.8b449774db8e54805f256bb2768d44630cb0c1b60dc7b2afede34aa38d463a50" Workload="ci--3510.3.0--a--a1bcd9ea1c-k8s-csi--node--driver--7djgt-eth0"
Oct  2 21:33:44.350429 env[1455]: time="2023-10-02T21:33:44Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357"
Oct  2 21:33:44.350429 env[1455]: time="2023-10-02T21:33:44Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372"
Oct  2 21:33:44.350429 env[1455]: 2023-10-02 21:33:44.346 [WARNING][5495] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="8b449774db8e54805f256bb2768d44630cb0c1b60dc7b2afede34aa38d463a50" HandleID="k8s-pod-network.8b449774db8e54805f256bb2768d44630cb0c1b60dc7b2afede34aa38d463a50" Workload="ci--3510.3.0--a--a1bcd9ea1c-k8s-csi--node--driver--7djgt-eth0"
Oct  2 21:33:44.350429 env[1455]: 2023-10-02 21:33:44.346 [INFO][5495] ipam_plugin.go 444: Releasing address using workloadID ContainerID="8b449774db8e54805f256bb2768d44630cb0c1b60dc7b2afede34aa38d463a50" HandleID="k8s-pod-network.8b449774db8e54805f256bb2768d44630cb0c1b60dc7b2afede34aa38d463a50" Workload="ci--3510.3.0--a--a1bcd9ea1c-k8s-csi--node--driver--7djgt-eth0"
Oct  2 21:33:44.350429 env[1455]: time="2023-10-02T21:33:44Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378"
Oct  2 21:33:44.350429 env[1455]: 2023-10-02 21:33:44.349 [INFO][5481] k8s.go 589: Teardown processing complete. ContainerID="8b449774db8e54805f256bb2768d44630cb0c1b60dc7b2afede34aa38d463a50"
Oct  2 21:33:44.350429 env[1455]: time="2023-10-02T21:33:44.350375468Z" level=info msg="TearDown network for sandbox \"8b449774db8e54805f256bb2768d44630cb0c1b60dc7b2afede34aa38d463a50\" successfully"
Oct  2 21:33:44.350429 env[1455]: time="2023-10-02T21:33:44.350408321Z" level=info msg="StopPodSandbox for \"8b449774db8e54805f256bb2768d44630cb0c1b60dc7b2afede34aa38d463a50\" returns successfully"
Oct  2 21:33:44.351119 env[1455]: time="2023-10-02T21:33:44.350865376Z" level=info msg="RemovePodSandbox for \"8b449774db8e54805f256bb2768d44630cb0c1b60dc7b2afede34aa38d463a50\""
Oct  2 21:33:44.351119 env[1455]: time="2023-10-02T21:33:44.350896213Z" level=info msg="Forcibly stopping sandbox \"8b449774db8e54805f256bb2768d44630cb0c1b60dc7b2afede34aa38d463a50\""
Oct  2 21:33:44.418447 env[1455]: 2023-10-02 21:33:44.385 [WARNING][5523] k8s.go 540: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="8b449774db8e54805f256bb2768d44630cb0c1b60dc7b2afede34aa38d463a50" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.0--a--a1bcd9ea1c-k8s-csi--node--driver--7djgt-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"96f60c96-bc95-4de5-a016-9864623478a6", ResourceVersion:"772", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 21, 33, 17, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"6b49688c47", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.0-a-a1bcd9ea1c", ContainerID:"e12d4dbff05762a7acf8a28b6855b181e86e08699fd50676c83c96876a5bb934", Pod:"csi-node-driver-7djgt", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.32.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calif3ec2992a3c", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}}
Oct  2 21:33:44.418447 env[1455]: 2023-10-02 21:33:44.386 [INFO][5523] k8s.go 576: Cleaning up netns ContainerID="8b449774db8e54805f256bb2768d44630cb0c1b60dc7b2afede34aa38d463a50"
Oct  2 21:33:44.418447 env[1455]: 2023-10-02 21:33:44.386 [INFO][5523] dataplane_linux.go 520: CleanUpNamespace called with no netns name, ignoring. ContainerID="8b449774db8e54805f256bb2768d44630cb0c1b60dc7b2afede34aa38d463a50" iface="eth0" netns=""
Oct  2 21:33:44.418447 env[1455]: 2023-10-02 21:33:44.386 [INFO][5523] k8s.go 583: Releasing IP address(es) ContainerID="8b449774db8e54805f256bb2768d44630cb0c1b60dc7b2afede34aa38d463a50"
Oct  2 21:33:44.418447 env[1455]: 2023-10-02 21:33:44.386 [INFO][5523] utils.go 196: Calico CNI releasing IP address ContainerID="8b449774db8e54805f256bb2768d44630cb0c1b60dc7b2afede34aa38d463a50"
Oct  2 21:33:44.418447 env[1455]: 2023-10-02 21:33:44.406 [INFO][5537] ipam_plugin.go 416: Releasing address using handleID ContainerID="8b449774db8e54805f256bb2768d44630cb0c1b60dc7b2afede34aa38d463a50" HandleID="k8s-pod-network.8b449774db8e54805f256bb2768d44630cb0c1b60dc7b2afede34aa38d463a50" Workload="ci--3510.3.0--a--a1bcd9ea1c-k8s-csi--node--driver--7djgt-eth0"
Oct  2 21:33:44.418447 env[1455]: time="2023-10-02T21:33:44Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357"
Oct  2 21:33:44.418447 env[1455]: time="2023-10-02T21:33:44Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372"
Oct  2 21:33:44.418447 env[1455]: 2023-10-02 21:33:44.413 [WARNING][5537] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID="8b449774db8e54805f256bb2768d44630cb0c1b60dc7b2afede34aa38d463a50" HandleID="k8s-pod-network.8b449774db8e54805f256bb2768d44630cb0c1b60dc7b2afede34aa38d463a50" Workload="ci--3510.3.0--a--a1bcd9ea1c-k8s-csi--node--driver--7djgt-eth0"
Oct  2 21:33:44.418447 env[1455]: 2023-10-02 21:33:44.414 [INFO][5537] ipam_plugin.go 444: Releasing address using workloadID ContainerID="8b449774db8e54805f256bb2768d44630cb0c1b60dc7b2afede34aa38d463a50" HandleID="k8s-pod-network.8b449774db8e54805f256bb2768d44630cb0c1b60dc7b2afede34aa38d463a50" Workload="ci--3510.3.0--a--a1bcd9ea1c-k8s-csi--node--driver--7djgt-eth0"
Oct  2 21:33:44.418447 env[1455]: time="2023-10-02T21:33:44Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378"
Oct  2 21:33:44.418447 env[1455]: 2023-10-02 21:33:44.417 [INFO][5523] k8s.go 589: Teardown processing complete. ContainerID="8b449774db8e54805f256bb2768d44630cb0c1b60dc7b2afede34aa38d463a50"
Oct  2 21:33:44.419169 env[1455]: time="2023-10-02T21:33:44.418477190Z" level=info msg="TearDown network for sandbox \"8b449774db8e54805f256bb2768d44630cb0c1b60dc7b2afede34aa38d463a50\" successfully"
Oct  2 21:33:44.420887 env[1455]: time="2023-10-02T21:33:44.420828881Z" level=info msg="RemovePodSandbox \"8b449774db8e54805f256bb2768d44630cb0c1b60dc7b2afede34aa38d463a50\" returns successfully"
Oct  2 21:33:50.791456 env[1455]: time="2023-10-02T21:33:50.791419666Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\""
Oct  2 21:33:51.032728 env[1455]: time="2023-10-02T21:33:51.032568197Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io
Oct  2 21:33:51.033612 env[1455]: time="2023-10-02T21:33:51.033414189Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden"
Oct  2 21:33:51.033897 kubelet[2553]: E1002 21:33:51.033854    2553 remote_image.go:180] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0"
Oct  2 21:33:51.034705 kubelet[2553]: E1002 21:33:51.033945    2553 kuberuntime_image.go:53] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0"
Oct  2 21:33:51.034705 kubelet[2553]: E1002 21:33:51.034148    2553 kuberuntime_manager.go:1209] container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.25.0,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:etccalico,ReadOnly:false,MountPath:/etc/calico,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,},VolumeMount{Name:kube-api-access-4j7vd,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-7djgt_calico-system(96f60c96-bc95-4de5-a016-9864623478a6): ErrImagePull: failed to pull and unpack image "ghcr.io/flatcar/calico/csi:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/csi:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden
Oct  2 21:33:51.035929 env[1455]: time="2023-10-02T21:33:51.035859903Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\""
Oct  2 21:33:51.292669 env[1455]: time="2023-10-02T21:33:51.292553582Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io
Oct  2 21:33:51.293802 env[1455]: time="2023-10-02T21:33:51.293700841Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden"
Oct  2 21:33:51.294213 kubelet[2553]: E1002 21:33:51.294165    2553 remote_image.go:180] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0"
Oct  2 21:33:51.294388 kubelet[2553]: E1002 21:33:51.294261    2553 kuberuntime_image.go:53] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0"
Oct  2 21:33:51.294548 kubelet[2553]: E1002 21:33:51.294478    2553 kuberuntime_manager.go:1209] container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-4j7vd,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-7djgt_calico-system(96f60c96-bc95-4de5-a016-9864623478a6): ErrImagePull: failed to pull and unpack image "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden
Oct  2 21:33:51.294894 kubelet[2553]: E1002 21:33:51.294617    2553 pod_workers.go:1300] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/csi-node-driver-7djgt" podUID="96f60c96-bc95-4de5-a016-9864623478a6"
Oct  2 21:33:52.793408 env[1455]: time="2023-10-02T21:33:52.793319280Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\""
Oct  2 21:33:53.040020 env[1455]: time="2023-10-02T21:33:53.039908156Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io
Oct  2 21:33:53.041088 env[1455]: time="2023-10-02T21:33:53.040941880Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden"
Oct  2 21:33:53.041436 kubelet[2553]: E1002 21:33:53.041388    2553 remote_image.go:180] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0"
Oct  2 21:33:53.042160 kubelet[2553]: E1002 21:33:53.041506    2553 kuberuntime_image.go:53] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0"
Oct  2 21:33:53.042160 kubelet[2553]: E1002 21:33:53.041722    2553 kuberuntime_manager.go:1209] container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.25.0,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-trf7h,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/version,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:90,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/code/filecheck],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:5,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:5,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*false,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod calico-apiserver-7dbcfbfd9-4j6ds_calico-apiserver(904b4100-985a-4f84-ae75-ae86d43ecf6f): ErrImagePull: failed to pull and unpack image "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden
Oct  2 21:33:53.042160 kubelet[2553]: E1002 21:33:53.041827    2553 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-apiserver/calico-apiserver-7dbcfbfd9-4j6ds" podUID="904b4100-985a-4f84-ae75-ae86d43ecf6f"
Oct  2 21:33:53.791460 env[1455]: time="2023-10-02T21:33:53.791403811Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\""
Oct  2 21:33:54.025057 env[1455]: time="2023-10-02T21:33:54.024898582Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io
Oct  2 21:33:54.026017 env[1455]: time="2023-10-02T21:33:54.025856593Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden"
Oct  2 21:33:54.026511 kubelet[2553]: E1002 21:33:54.026363    2553 remote_image.go:180] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0"
Oct  2 21:33:54.026724 kubelet[2553]: E1002 21:33:54.026543    2553 kuberuntime_image.go:53] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0"
Oct  2 21:33:54.026945 kubelet[2553]: E1002 21:33:54.026870    2553 kuberuntime_manager.go:1209] container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.25.0,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-cwxlk,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/version,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:90,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/code/filecheck],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:5,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:5,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*false,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod calico-apiserver-7dbcfbfd9-ts2w6_calico-apiserver(10aa136e-fcbb-47e7-b373-1b69bde373de): ErrImagePull: failed to pull and unpack image "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden
Oct  2 21:33:54.027390 kubelet[2553]: E1002 21:33:54.026976    2553 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-apiserver/calico-apiserver-7dbcfbfd9-ts2w6" podUID="10aa136e-fcbb-47e7-b373-1b69bde373de"
Oct  2 21:33:54.950000 audit[2376]: AVC avc:  denied  { watch } for  pid=2376 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c698,c859 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 21:33:54.992742 kernel: kauditd_printk_skb: 14 callbacks suppressed
Oct  2 21:33:54.992850 kernel: audit: type=1400 audit(1696282434.950:1360): avc:  denied  { watch } for  pid=2376 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c698,c859 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 21:33:54.950000 audit[2376]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00115f700 a2=fc6 a3=0 items=0 ppid=2239 pid=2376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c698,c859 key=(null)
Oct  2 21:33:55.200144 kernel: audit: type=1300 audit(1696282434.950:1360): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00115f700 a2=fc6 a3=0 items=0 ppid=2239 pid=2376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c698,c859 key=(null)
Oct  2 21:33:55.200176 kernel: audit: type=1327 audit(1696282434.950:1360): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 21:33:54.950000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 21:33:55.291873 kernel: audit: type=1400 audit(1696282434.953:1361): avc:  denied  { watch } for  pid=2376 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c698,c859 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 21:33:54.953000 audit[2376]: AVC avc:  denied  { watch } for  pid=2376 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c698,c859 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 21:33:55.379185 kernel: audit: type=1300 audit(1696282434.953:1361): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00115f720 a2=fc6 a3=0 items=0 ppid=2239 pid=2376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c698,c859 key=(null)
Oct  2 21:33:54.953000 audit[2376]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00115f720 a2=fc6 a3=0 items=0 ppid=2239 pid=2376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c698,c859 key=(null)
Oct  2 21:33:55.498827 kernel: audit: type=1327 audit(1696282434.953:1361): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 21:33:54.953000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 21:33:55.592230 kernel: audit: type=1400 audit(1696282434.955:1362): avc:  denied  { watch } for  pid=2376 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c698,c859 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 21:33:54.955000 audit[2376]: AVC avc:  denied  { watch } for  pid=2376 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c698,c859 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 21:33:55.682458 kernel: audit: type=1300 audit(1696282434.955:1362): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00115f740 a2=fc6 a3=0 items=0 ppid=2239 pid=2376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c698,c859 key=(null)
Oct  2 21:33:54.955000 audit[2376]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00115f740 a2=fc6 a3=0 items=0 ppid=2239 pid=2376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c698,c859 key=(null)
Oct  2 21:33:55.803047 kernel: audit: type=1327 audit(1696282434.955:1362): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 21:33:54.955000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 21:33:55.896379 kernel: audit: type=1400 audit(1696282434.955:1363): avc:  denied  { watch } for  pid=2376 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c698,c859 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 21:33:54.955000 audit[2376]: AVC avc:  denied  { watch } for  pid=2376 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c698,c859 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 21:33:54.955000 audit[2376]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000ff8da0 a2=fc6 a3=0 items=0 ppid=2239 pid=2376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c698,c859 key=(null)
Oct  2 21:33:54.955000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 21:34:06.793554 kubelet[2553]: E1002 21:34:06.793482    2553 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-7dbcfbfd9-4j6ds" podUID="904b4100-985a-4f84-ae75-ae86d43ecf6f"
Oct  2 21:34:06.794916 kubelet[2553]: E1002 21:34:06.793739    2553 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-7dbcfbfd9-ts2w6" podUID="10aa136e-fcbb-47e7-b373-1b69bde373de"
Oct  2 21:34:06.794916 kubelet[2553]: E1002 21:34:06.794358    2553 pod_workers.go:1300] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-7djgt" podUID="96f60c96-bc95-4de5-a016-9864623478a6"
Oct  2 21:34:20.793533 env[1455]: time="2023-10-02T21:34:20.793255078Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\""
Oct  2 21:34:21.072324 env[1455]: time="2023-10-02T21:34:21.072039975Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io
Oct  2 21:34:21.085641 env[1455]: time="2023-10-02T21:34:21.085499588Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden"
Oct  2 21:34:21.086108 kubelet[2553]: E1002 21:34:21.086018    2553 remote_image.go:180] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0"
Oct  2 21:34:21.086108 kubelet[2553]: E1002 21:34:21.086112    2553 kuberuntime_image.go:53] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0"
Oct  2 21:34:21.087057 kubelet[2553]: E1002 21:34:21.086582    2553 kuberuntime_manager.go:1209] container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.25.0,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-cwxlk,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/version,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:90,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/code/filecheck],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:5,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:5,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*false,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod calico-apiserver-7dbcfbfd9-ts2w6_calico-apiserver(10aa136e-fcbb-47e7-b373-1b69bde373de): ErrImagePull: failed to pull and unpack image "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden
Oct  2 21:34:21.087057 kubelet[2553]: E1002 21:34:21.086755    2553 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-apiserver/calico-apiserver-7dbcfbfd9-ts2w6" podUID="10aa136e-fcbb-47e7-b373-1b69bde373de"
Oct  2 21:34:21.087630 env[1455]: time="2023-10-02T21:34:21.086985220Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\""
Oct  2 21:34:21.361507 env[1455]: time="2023-10-02T21:34:21.361198316Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io
Oct  2 21:34:21.362504 env[1455]: time="2023-10-02T21:34:21.362336501Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden"
Oct  2 21:34:21.362891 kubelet[2553]: E1002 21:34:21.362820    2553 remote_image.go:180] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0"
Oct  2 21:34:21.363088 kubelet[2553]: E1002 21:34:21.362909    2553 kuberuntime_image.go:53] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0"
Oct  2 21:34:21.363220 kubelet[2553]: E1002 21:34:21.363121    2553 kuberuntime_manager.go:1209] container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.25.0,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-trf7h,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/version,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:90,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/code/filecheck],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:5,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:5,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*false,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod calico-apiserver-7dbcfbfd9-4j6ds_calico-apiserver(904b4100-985a-4f84-ae75-ae86d43ecf6f): ErrImagePull: failed to pull and unpack image "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden
Oct  2 21:34:21.363693 kubelet[2553]: E1002 21:34:21.363237    2553 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-apiserver/calico-apiserver-7dbcfbfd9-4j6ds" podUID="904b4100-985a-4f84-ae75-ae86d43ecf6f"
Oct  2 21:34:21.791619 env[1455]: time="2023-10-02T21:34:21.791557224Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\""
Oct  2 21:34:22.044353 env[1455]: time="2023-10-02T21:34:22.044079638Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io
Oct  2 21:34:22.045324 env[1455]: time="2023-10-02T21:34:22.045188085Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden"
Oct  2 21:34:22.045699 kubelet[2553]: E1002 21:34:22.045643    2553 remote_image.go:180] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0"
Oct  2 21:34:22.045884 kubelet[2553]: E1002 21:34:22.045748    2553 kuberuntime_image.go:53] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0"
Oct  2 21:34:22.046017 kubelet[2553]: E1002 21:34:22.045945    2553 kuberuntime_manager.go:1209] container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.25.0,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:etccalico,ReadOnly:false,MountPath:/etc/calico,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,},VolumeMount{Name:kube-api-access-4j7vd,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-7djgt_calico-system(96f60c96-bc95-4de5-a016-9864623478a6): ErrImagePull: failed to pull and unpack image "ghcr.io/flatcar/calico/csi:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/csi:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden
Oct  2 21:34:22.049120 env[1455]: time="2023-10-02T21:34:22.048981653Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\""
Oct  2 21:34:22.329739 env[1455]: time="2023-10-02T21:34:22.329430945Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io
Oct  2 21:34:22.330556 env[1455]: time="2023-10-02T21:34:22.330340831Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden"
Oct  2 21:34:22.330889 kubelet[2553]: E1002 21:34:22.330828    2553 remote_image.go:180] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0"
Oct  2 21:34:22.331665 kubelet[2553]: E1002 21:34:22.330914    2553 kuberuntime_image.go:53] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0"
Oct  2 21:34:22.331665 kubelet[2553]: E1002 21:34:22.331107    2553 kuberuntime_manager.go:1209] container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-4j7vd,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-7djgt_calico-system(96f60c96-bc95-4de5-a016-9864623478a6): ErrImagePull: failed to pull and unpack image "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden
Oct  2 21:34:22.331665 kubelet[2553]: E1002 21:34:22.331240    2553 pod_workers.go:1300] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/csi-node-driver-7djgt" podUID="96f60c96-bc95-4de5-a016-9864623478a6"
Oct  2 21:34:32.792095 kubelet[2553]: E1002 21:34:32.792075    2553 pod_workers.go:1300] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-7djgt" podUID="96f60c96-bc95-4de5-a016-9864623478a6"
Oct  2 21:34:34.791601 kubelet[2553]: E1002 21:34:34.791552    2553 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-7dbcfbfd9-4j6ds" podUID="904b4100-985a-4f84-ae75-ae86d43ecf6f"
Oct  2 21:34:35.793171 kubelet[2553]: E1002 21:34:35.793111    2553 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-7dbcfbfd9-ts2w6" podUID="10aa136e-fcbb-47e7-b373-1b69bde373de"
Oct  2 21:34:40.136000 audit[2376]: AVC avc:  denied  { watch } for  pid=2376 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c698,c859 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 21:34:40.165252 kernel: kauditd_printk_skb: 2 callbacks suppressed
Oct  2 21:34:40.165309 kernel: audit: type=1400 audit(1696282480.136:1364): avc:  denied  { watch } for  pid=2376 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c698,c859 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 21:34:40.257515 kernel: audit: type=1300 audit(1696282480.136:1364): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0019608d0 a2=fc6 a3=0 items=0 ppid=2239 pid=2376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c698,c859 key=(null)
Oct  2 21:34:40.136000 audit[2376]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0019608d0 a2=fc6 a3=0 items=0 ppid=2239 pid=2376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c698,c859 key=(null)
Oct  2 21:34:40.136000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 21:34:40.471278 kernel: audit: type=1327 audit(1696282480.136:1364): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 21:34:40.471310 kernel: audit: type=1400 audit(1696282480.136:1365): avc:  denied  { watch } for  pid=2376 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c698,c859 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 21:34:40.136000 audit[2376]: AVC avc:  denied  { watch } for  pid=2376 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c698,c859 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 21:34:40.562926 kernel: audit: type=1300 audit(1696282480.136:1365): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00084ea80 a2=fc6 a3=0 items=0 ppid=2239 pid=2376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c698,c859 key=(null)
Oct  2 21:34:40.136000 audit[2376]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00084ea80 a2=fc6 a3=0 items=0 ppid=2239 pid=2376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c698,c859 key=(null)
Oct  2 21:34:40.685514 kernel: audit: type=1327 audit(1696282480.136:1365): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 21:34:40.136000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 21:34:40.779073 kernel: audit: type=1400 audit(1696282480.374:1366): avc:  denied  { watch } for  pid=2377 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c411,c438 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 21:34:40.374000 audit[2377]: AVC avc:  denied  { watch } for  pid=2377 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c411,c438 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 21:34:40.872304 kernel: audit: type=1300 audit(1696282480.374:1366): arch=c000003e syscall=254 success=no exit=-13 a0=68 a1=c01092dc20 a2=fc6 a3=0 items=0 ppid=2211 pid=2377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c411,c438 key=(null)
Oct  2 21:34:40.374000 audit[2377]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=68 a1=c01092dc20 a2=fc6 a3=0 items=0 ppid=2211 pid=2377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c411,c438 key=(null)
Oct  2 21:34:40.970611 kernel: audit: type=1327 audit(1696282480.374:1366): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E3439002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75
Oct  2 21:34:40.374000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E3439002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75
Oct  2 21:34:41.063663 kernel: audit: type=1400 audit(1696282480.375:1367): avc:  denied  { watch } for  pid=2377 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c411,c438 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 21:34:40.375000 audit[2377]: AVC avc:  denied  { watch } for  pid=2377 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c411,c438 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 21:34:40.375000 audit[2377]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=68 a1=c013c9a6e0 a2=fc6 a3=0 items=0 ppid=2211 pid=2377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c411,c438 key=(null)
Oct  2 21:34:40.375000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E3439002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75
Oct  2 21:34:40.375000 audit[2377]: AVC avc:  denied  { watch } for  pid=2377 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=520974 scontext=system_u:system_r:svirt_lxc_net_t:s0:c411,c438 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 21:34:40.375000 audit[2377]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=68 a1=c012a7cab0 a2=fc6 a3=0 items=0 ppid=2211 pid=2377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c411,c438 key=(null)
Oct  2 21:34:40.375000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E3439002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75
Oct  2 21:34:40.383000 audit[2377]: AVC avc:  denied  { watch } for  pid=2377 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c411,c438 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 21:34:40.383000 audit[2377]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=68 a1=c013c9a7e0 a2=fc6 a3=0 items=0 ppid=2211 pid=2377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c411,c438 key=(null)
Oct  2 21:34:40.383000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E3439002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75
Oct  2 21:34:40.383000 audit[2377]: AVC avc:  denied  { watch } for  pid=2377 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=520980 scontext=system_u:system_r:svirt_lxc_net_t:s0:c411,c438 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 21:34:40.383000 audit[2377]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=68 a1=c012a7cae0 a2=fc6 a3=0 items=0 ppid=2211 pid=2377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c411,c438 key=(null)
Oct  2 21:34:40.383000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E3439002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75
Oct  2 21:34:40.383000 audit[2377]: AVC avc:  denied  { watch } for  pid=2377 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c411,c438 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 21:34:40.383000 audit[2377]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=68 a1=c00fda1aa0 a2=fc6 a3=0 items=0 ppid=2211 pid=2377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c411,c438 key=(null)
Oct  2 21:34:40.383000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E3439002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75
Oct  2 21:34:44.793783 kubelet[2553]: E1002 21:34:44.793692    2553 pod_workers.go:1300] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-7djgt" podUID="96f60c96-bc95-4de5-a016-9864623478a6"
Oct  2 21:34:46.792617 kubelet[2553]: E1002 21:34:46.792557    2553 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-7dbcfbfd9-ts2w6" podUID="10aa136e-fcbb-47e7-b373-1b69bde373de"
Oct  2 21:34:49.792287 kubelet[2553]: E1002 21:34:49.792215    2553 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-7dbcfbfd9-4j6ds" podUID="904b4100-985a-4f84-ae75-ae86d43ecf6f"
Oct  2 21:34:54.949000 audit[2376]: AVC avc:  denied  { watch } for  pid=2376 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c698,c859 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 21:34:54.995127 kernel: kauditd_printk_skb: 14 callbacks suppressed
Oct  2 21:34:54.995248 kernel: audit: type=1400 audit(1696282494.949:1372): avc:  denied  { watch } for  pid=2376 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c698,c859 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 21:34:54.949000 audit[2376]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001953360 a2=fc6 a3=0 items=0 ppid=2239 pid=2376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c698,c859 key=(null)
Oct  2 21:34:55.086518 kernel: audit: type=1300 audit(1696282494.949:1372): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001953360 a2=fc6 a3=0 items=0 ppid=2239 pid=2376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c698,c859 key=(null)
Oct  2 21:34:54.949000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 21:34:55.298836 kernel: audit: type=1327 audit(1696282494.949:1372): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 21:34:55.298873 kernel: audit: type=1400 audit(1696282494.953:1373): avc:  denied  { watch } for  pid=2376 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c698,c859 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 21:34:54.953000 audit[2376]: AVC avc:  denied  { watch } for  pid=2376 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c698,c859 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 21:34:55.388153 kernel: audit: type=1300 audit(1696282494.953:1373): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001953380 a2=fc6 a3=0 items=0 ppid=2239 pid=2376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c698,c859 key=(null)
Oct  2 21:34:54.953000 audit[2376]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001953380 a2=fc6 a3=0 items=0 ppid=2239 pid=2376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c698,c859 key=(null)
Oct  2 21:34:55.508579 kernel: audit: type=1327 audit(1696282494.953:1373): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 21:34:54.953000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 21:34:55.601923 kernel: audit: type=1400 audit(1696282494.955:1374): avc:  denied  { watch } for  pid=2376 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c698,c859 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 21:34:54.955000 audit[2376]: AVC avc:  denied  { watch } for  pid=2376 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c698,c859 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 21:34:55.692129 kernel: audit: type=1300 audit(1696282494.955:1374): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0014a40e0 a2=fc6 a3=0 items=0 ppid=2239 pid=2376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c698,c859 key=(null)
Oct  2 21:34:54.955000 audit[2376]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0014a40e0 a2=fc6 a3=0 items=0 ppid=2239 pid=2376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c698,c859 key=(null)
Oct  2 21:34:55.815121 kernel: audit: type=1327 audit(1696282494.955:1374): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 21:34:54.955000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 21:34:55.909128 kernel: audit: type=1400 audit(1696282494.955:1375): avc:  denied  { watch } for  pid=2376 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c698,c859 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 21:34:54.955000 audit[2376]: AVC avc:  denied  { watch } for  pid=2376 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c698,c859 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 21:34:54.955000 audit[2376]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000cc60e0 a2=fc6 a3=0 items=0 ppid=2239 pid=2376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c698,c859 key=(null)
Oct  2 21:34:54.955000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 21:34:57.791646 kubelet[2553]: E1002 21:34:57.791624    2553 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-7dbcfbfd9-ts2w6" podUID="10aa136e-fcbb-47e7-b373-1b69bde373de"
Oct  2 21:34:57.792021 kubelet[2553]: E1002 21:34:57.791881    2553 pod_workers.go:1300] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-7djgt" podUID="96f60c96-bc95-4de5-a016-9864623478a6"
Oct  2 21:35:04.793728 env[1455]: time="2023-10-02T21:35:04.793632277Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\""
Oct  2 21:35:05.058161 env[1455]: time="2023-10-02T21:35:05.057885064Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io
Oct  2 21:35:05.059172 env[1455]: time="2023-10-02T21:35:05.059037691Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden"
Oct  2 21:35:05.059645 kubelet[2553]: E1002 21:35:05.059545    2553 remote_image.go:180] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0"
Oct  2 21:35:05.059645 kubelet[2553]: E1002 21:35:05.059639    2553 kuberuntime_image.go:53] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0"
Oct  2 21:35:05.060597 kubelet[2553]: E1002 21:35:05.059857    2553 kuberuntime_manager.go:1209] container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.25.0,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-trf7h,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/version,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:90,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/code/filecheck],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:5,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:5,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*false,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod calico-apiserver-7dbcfbfd9-4j6ds_calico-apiserver(904b4100-985a-4f84-ae75-ae86d43ecf6f): ErrImagePull: failed to pull and unpack image "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden
Oct  2 21:35:05.060597 kubelet[2553]: E1002 21:35:05.059961    2553 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-apiserver/calico-apiserver-7dbcfbfd9-4j6ds" podUID="904b4100-985a-4f84-ae75-ae86d43ecf6f"
Oct  2 21:35:10.793578 env[1455]: time="2023-10-02T21:35:10.793354529Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\""
Oct  2 21:35:11.074415 env[1455]: time="2023-10-02T21:35:11.074130852Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io
Oct  2 21:35:11.075529 env[1455]: time="2023-10-02T21:35:11.075353383Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden"
Oct  2 21:35:11.075971 kubelet[2553]: E1002 21:35:11.075924    2553 remote_image.go:180] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0"
Oct  2 21:35:11.076889 kubelet[2553]: E1002 21:35:11.076013    2553 kuberuntime_image.go:53] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0"
Oct  2 21:35:11.076889 kubelet[2553]: E1002 21:35:11.076217    2553 kuberuntime_manager.go:1209] container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.25.0,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:etccalico,ReadOnly:false,MountPath:/etc/calico,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,},VolumeMount{Name:kube-api-access-4j7vd,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-7djgt_calico-system(96f60c96-bc95-4de5-a016-9864623478a6): ErrImagePull: failed to pull and unpack image "ghcr.io/flatcar/calico/csi:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/csi:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden
Oct  2 21:35:11.078082 env[1455]: time="2023-10-02T21:35:11.078006381Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\""
Oct  2 21:35:11.316816 env[1455]: time="2023-10-02T21:35:11.316660088Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io
Oct  2 21:35:11.317761 env[1455]: time="2023-10-02T21:35:11.317618962Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden"
Oct  2 21:35:11.318155 kubelet[2553]: E1002 21:35:11.318111    2553 remote_image.go:180] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0"
Oct  2 21:35:11.318354 kubelet[2553]: E1002 21:35:11.318200    2553 kuberuntime_image.go:53] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0"
Oct  2 21:35:11.318663 kubelet[2553]: E1002 21:35:11.318383    2553 kuberuntime_manager.go:1209] container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-4j7vd,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-7djgt_calico-system(96f60c96-bc95-4de5-a016-9864623478a6): ErrImagePull: failed to pull and unpack image "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden
Oct  2 21:35:11.318663 kubelet[2553]: E1002 21:35:11.318551    2553 pod_workers.go:1300] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/csi-node-driver-7djgt" podUID="96f60c96-bc95-4de5-a016-9864623478a6"
Oct  2 21:35:11.793802 env[1455]: time="2023-10-02T21:35:11.793658442Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\""
Oct  2 21:35:12.047393 env[1455]: time="2023-10-02T21:35:12.047115442Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io
Oct  2 21:35:12.048634 env[1455]: time="2023-10-02T21:35:12.048469682Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden"
Oct  2 21:35:12.049080 kubelet[2553]: E1002 21:35:12.048993    2553 remote_image.go:180] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0"
Oct  2 21:35:12.049080 kubelet[2553]: E1002 21:35:12.049086    2553 kuberuntime_image.go:53] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0"
Oct  2 21:35:12.049474 kubelet[2553]: E1002 21:35:12.049318    2553 kuberuntime_manager.go:1209] container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.25.0,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-cwxlk,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/version,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:90,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/code/filecheck],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:5,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:5,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*false,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod calico-apiserver-7dbcfbfd9-ts2w6_calico-apiserver(10aa136e-fcbb-47e7-b373-1b69bde373de): ErrImagePull: failed to pull and unpack image "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden
Oct  2 21:35:12.049474 kubelet[2553]: E1002 21:35:12.049419    2553 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-apiserver/calico-apiserver-7dbcfbfd9-ts2w6" podUID="10aa136e-fcbb-47e7-b373-1b69bde373de"
Oct  2 21:35:15.791392 kubelet[2553]: E1002 21:35:15.791343    2553 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-7dbcfbfd9-4j6ds" podUID="904b4100-985a-4f84-ae75-ae86d43ecf6f"
Oct  2 21:35:23.791743 kubelet[2553]: E1002 21:35:23.791718    2553 pod_workers.go:1300] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-7djgt" podUID="96f60c96-bc95-4de5-a016-9864623478a6"
Oct  2 21:35:23.792089 kubelet[2553]: E1002 21:35:23.791791    2553 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-7dbcfbfd9-ts2w6" podUID="10aa136e-fcbb-47e7-b373-1b69bde373de"
Oct  2 21:35:29.791262 kubelet[2553]: E1002 21:35:29.791207    2553 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-7dbcfbfd9-4j6ds" podUID="904b4100-985a-4f84-ae75-ae86d43ecf6f"
Oct  2 21:35:34.791399 kubelet[2553]: E1002 21:35:34.791346    2553 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-7dbcfbfd9-ts2w6" podUID="10aa136e-fcbb-47e7-b373-1b69bde373de"
Oct  2 21:35:38.793830 kubelet[2553]: E1002 21:35:38.793771    2553 pod_workers.go:1300] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-7djgt" podUID="96f60c96-bc95-4de5-a016-9864623478a6"
Oct  2 21:35:40.137000 audit[2376]: AVC avc:  denied  { watch } for  pid=2376 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c698,c859 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 21:35:40.182035 kernel: kauditd_printk_skb: 2 callbacks suppressed
Oct  2 21:35:40.182146 kernel: audit: type=1400 audit(1696282540.137:1376): avc:  denied  { watch } for  pid=2376 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c698,c859 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 21:35:40.137000 audit[2376]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000cc7820 a2=fc6 a3=0 items=0 ppid=2239 pid=2376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c698,c859 key=(null)
Oct  2 21:35:40.393256 kernel: audit: type=1300 audit(1696282540.137:1376): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000cc7820 a2=fc6 a3=0 items=0 ppid=2239 pid=2376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c698,c859 key=(null)
Oct  2 21:35:40.393361 kernel: audit: type=1327 audit(1696282540.137:1376): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 21:35:40.137000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 21:35:40.137000 audit[2376]: AVC avc:  denied  { watch } for  pid=2376 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c698,c859 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 21:35:40.578850 kernel: audit: type=1400 audit(1696282540.137:1377): avc:  denied  { watch } for  pid=2376 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c698,c859 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 21:35:40.137000 audit[2376]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0015c0ed0 a2=fc6 a3=0 items=0 ppid=2239 pid=2376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c698,c859 key=(null)
Oct  2 21:35:40.579516 kernel: audit: type=1300 audit(1696282540.137:1377): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0015c0ed0 a2=fc6 a3=0 items=0 ppid=2239 pid=2376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c698,c859 key=(null)
Oct  2 21:35:40.137000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 21:35:40.793733 kernel: audit: type=1327 audit(1696282540.137:1377): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 21:35:40.793774 kernel: audit: type=1400 audit(1696282540.375:1378): avc:  denied  { watch } for  pid=2377 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=520974 scontext=system_u:system_r:svirt_lxc_net_t:s0:c411,c438 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 21:35:40.375000 audit[2377]: AVC avc:  denied  { watch } for  pid=2377 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=520974 scontext=system_u:system_r:svirt_lxc_net_t:s0:c411,c438 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 21:35:40.375000 audit[2377]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5f a1=c00c5025d0 a2=fc6 a3=0 items=0 ppid=2211 pid=2377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c411,c438 key=(null)
Oct  2 21:35:40.884445 kernel: audit: type=1300 audit(1696282540.375:1378): arch=c000003e syscall=254 success=no exit=-13 a0=5f a1=c00c5025d0 a2=fc6 a3=0 items=0 ppid=2211 pid=2377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c411,c438 key=(null)
Oct  2 21:35:40.375000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E3439002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75
Oct  2 21:35:41.076224 kernel: audit: type=1327 audit(1696282540.375:1378): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E3439002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75
Oct  2 21:35:41.076296 kernel: audit: type=1400 audit(1696282540.375:1379): avc:  denied  { watch } for  pid=2377 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c411,c438 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 21:35:40.375000 audit[2377]: AVC avc:  denied  { watch } for  pid=2377 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c411,c438 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 21:35:40.375000 audit[2377]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c00c502600 a2=fc6 a3=0 items=0 ppid=2211 pid=2377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c411,c438 key=(null)
Oct  2 21:35:40.375000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E3439002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75
Oct  2 21:35:40.375000 audit[2377]: AVC avc:  denied  { watch } for  pid=2377 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c411,c438 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 21:35:40.375000 audit[2377]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5f a1=c012202b20 a2=fc6 a3=0 items=0 ppid=2211 pid=2377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c411,c438 key=(null)
Oct  2 21:35:40.375000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E3439002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75
Oct  2 21:35:40.384000 audit[2377]: AVC avc:  denied  { watch } for  pid=2377 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c411,c438 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 21:35:40.384000 audit[2377]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5f a1=c013a3e360 a2=fc6 a3=0 items=0 ppid=2211 pid=2377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c411,c438 key=(null)
Oct  2 21:35:40.384000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E3439002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75
Oct  2 21:35:40.384000 audit[2377]: AVC avc:  denied  { watch } for  pid=2377 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c411,c438 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 21:35:40.384000 audit[2377]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c00ef3e6c0 a2=fc6 a3=0 items=0 ppid=2211 pid=2377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c411,c438 key=(null)
Oct  2 21:35:40.384000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E3439002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75
Oct  2 21:35:40.384000 audit[2377]: AVC avc:  denied  { watch } for  pid=2377 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=520980 scontext=system_u:system_r:svirt_lxc_net_t:s0:c411,c438 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 21:35:40.384000 audit[2377]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5f a1=c0104c7da0 a2=fc6 a3=0 items=0 ppid=2211 pid=2377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c411,c438 key=(null)
Oct  2 21:35:40.384000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E3439002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75
Oct  2 21:35:41.791104 kubelet[2553]: E1002 21:35:41.791054    2553 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-7dbcfbfd9-4j6ds" podUID="904b4100-985a-4f84-ae75-ae86d43ecf6f"
Oct  2 21:35:48.790767 kubelet[2553]: E1002 21:35:48.790746    2553 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-7dbcfbfd9-ts2w6" podUID="10aa136e-fcbb-47e7-b373-1b69bde373de"
Oct  2 21:35:52.793056 kubelet[2553]: E1002 21:35:52.792918    2553 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-7dbcfbfd9-4j6ds" podUID="904b4100-985a-4f84-ae75-ae86d43ecf6f"
Oct  2 21:35:53.794309 kubelet[2553]: E1002 21:35:53.794254    2553 pod_workers.go:1300] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-7djgt" podUID="96f60c96-bc95-4de5-a016-9864623478a6"
Oct  2 21:35:54.950000 audit[2376]: AVC avc:  denied  { watch } for  pid=2376 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c698,c859 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 21:35:54.978453 kernel: kauditd_printk_skb: 14 callbacks suppressed
Oct  2 21:35:54.978493 kernel: audit: type=1400 audit(1696282554.950:1384): avc:  denied  { watch } for  pid=2376 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c698,c859 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 21:35:54.950000 audit[2376]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0002a56c0 a2=fc6 a3=0 items=0 ppid=2239 pid=2376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c698,c859 key=(null)
Oct  2 21:35:55.191033 kernel: audit: type=1300 audit(1696282554.950:1384): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0002a56c0 a2=fc6 a3=0 items=0 ppid=2239 pid=2376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c698,c859 key=(null)
Oct  2 21:35:55.191065 kernel: audit: type=1327 audit(1696282554.950:1384): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 21:35:54.950000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 21:35:55.284701 kernel: audit: type=1400 audit(1696282554.953:1385): avc:  denied  { watch } for  pid=2376 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c698,c859 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 21:35:54.953000 audit[2376]: AVC avc:  denied  { watch } for  pid=2376 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c698,c859 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 21:35:55.374095 kernel: audit: type=1300 audit(1696282554.953:1385): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000cc7f00 a2=fc6 a3=0 items=0 ppid=2239 pid=2376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c698,c859 key=(null)
Oct  2 21:35:54.953000 audit[2376]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000cc7f00 a2=fc6 a3=0 items=0 ppid=2239 pid=2376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c698,c859 key=(null)
Oct  2 21:35:55.494464 kernel: audit: type=1327 audit(1696282554.953:1385): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 21:35:54.953000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 21:35:55.587590 kernel: audit: type=1400 audit(1696282554.956:1386): avc:  denied  { watch } for  pid=2376 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c698,c859 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 21:35:54.956000 audit[2376]: AVC avc:  denied  { watch } for  pid=2376 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c698,c859 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 21:35:55.677629 kernel: audit: type=1300 audit(1696282554.956:1386): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0002a5f40 a2=fc6 a3=0 items=0 ppid=2239 pid=2376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c698,c859 key=(null)
Oct  2 21:35:54.956000 audit[2376]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0002a5f40 a2=fc6 a3=0 items=0 ppid=2239 pid=2376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c698,c859 key=(null)
Oct  2 21:35:55.798206 kernel: audit: type=1327 audit(1696282554.956:1386): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 21:35:54.956000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 21:35:55.891417 kernel: audit: type=1400 audit(1696282554.956:1387): avc:  denied  { watch } for  pid=2376 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c698,c859 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 21:35:54.956000 audit[2376]: AVC avc:  denied  { watch } for  pid=2376 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c698,c859 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 21:35:54.956000 audit[2376]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000cc7f40 a2=fc6 a3=0 items=0 ppid=2239 pid=2376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c698,c859 key=(null)
Oct  2 21:35:54.956000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 21:35:59.791342 kubelet[2553]: E1002 21:35:59.791318    2553 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-7dbcfbfd9-ts2w6" podUID="10aa136e-fcbb-47e7-b373-1b69bde373de"
Oct  2 21:36:03.791405 kubelet[2553]: E1002 21:36:03.791385    2553 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-7dbcfbfd9-4j6ds" podUID="904b4100-985a-4f84-ae75-ae86d43ecf6f"
Oct  2 21:36:04.794093 kubelet[2553]: E1002 21:36:04.793996    2553 pod_workers.go:1300] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-7djgt" podUID="96f60c96-bc95-4de5-a016-9864623478a6"
Oct  2 21:36:11.791151 kubelet[2553]: E1002 21:36:11.791129    2553 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-7dbcfbfd9-ts2w6" podUID="10aa136e-fcbb-47e7-b373-1b69bde373de"
Oct  2 21:36:15.791513 kubelet[2553]: E1002 21:36:15.791490    2553 pod_workers.go:1300] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-7djgt" podUID="96f60c96-bc95-4de5-a016-9864623478a6"
Oct  2 21:36:16.793048 kubelet[2553]: E1002 21:36:16.792950    2553 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-7dbcfbfd9-4j6ds" podUID="904b4100-985a-4f84-ae75-ae86d43ecf6f"
Oct  2 21:36:26.791234 kubelet[2553]: E1002 21:36:26.791212    2553 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-7dbcfbfd9-ts2w6" podUID="10aa136e-fcbb-47e7-b373-1b69bde373de"
Oct  2 21:36:29.794372 kubelet[2553]: E1002 21:36:29.794272    2553 pod_workers.go:1300] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-7djgt" podUID="96f60c96-bc95-4de5-a016-9864623478a6"
Oct  2 21:36:31.791131 env[1455]: time="2023-10-02T21:36:31.791070217Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\""
Oct  2 21:36:32.089991 env[1455]: time="2023-10-02T21:36:32.089675159Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io
Oct  2 21:36:32.107773 env[1455]: time="2023-10-02T21:36:32.107636252Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden"
Oct  2 21:36:32.108258 kubelet[2553]: E1002 21:36:32.108168    2553 remote_image.go:180] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0"
Oct  2 21:36:32.108258 kubelet[2553]: E1002 21:36:32.108265    2553 kuberuntime_image.go:53] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0"
Oct  2 21:36:32.109183 kubelet[2553]: E1002 21:36:32.108505    2553 kuberuntime_manager.go:1209] container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.25.0,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-trf7h,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/version,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:90,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/code/filecheck],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:5,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:5,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*false,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod calico-apiserver-7dbcfbfd9-4j6ds_calico-apiserver(904b4100-985a-4f84-ae75-ae86d43ecf6f): ErrImagePull: failed to pull and unpack image "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden
Oct  2 21:36:32.109183 kubelet[2553]: E1002 21:36:32.108610    2553 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-apiserver/calico-apiserver-7dbcfbfd9-4j6ds" podUID="904b4100-985a-4f84-ae75-ae86d43ecf6f"
Oct  2 21:36:37.793143 env[1455]: time="2023-10-02T21:36:37.793013175Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\""
Oct  2 21:36:38.025562 env[1455]: time="2023-10-02T21:36:38.025411658Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io
Oct  2 21:36:38.026593 env[1455]: time="2023-10-02T21:36:38.026497647Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden"
Oct  2 21:36:38.027056 kubelet[2553]: E1002 21:36:38.027008    2553 remote_image.go:180] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0"
Oct  2 21:36:38.027857 kubelet[2553]: E1002 21:36:38.027101    2553 kuberuntime_image.go:53] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0"
Oct  2 21:36:38.027857 kubelet[2553]: E1002 21:36:38.027350    2553 kuberuntime_manager.go:1209] container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.25.0,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-cwxlk,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/version,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:90,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/code/filecheck],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:5,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:5,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*false,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod calico-apiserver-7dbcfbfd9-ts2w6_calico-apiserver(10aa136e-fcbb-47e7-b373-1b69bde373de): ErrImagePull: failed to pull and unpack image "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden
Oct  2 21:36:38.027857 kubelet[2553]: E1002 21:36:38.027478    2553 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-apiserver/calico-apiserver-7dbcfbfd9-ts2w6" podUID="10aa136e-fcbb-47e7-b373-1b69bde373de"
Oct  2 21:36:40.138000 audit[2376]: AVC avc:  denied  { watch } for  pid=2376 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c698,c859 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 21:36:40.176636 kernel: kauditd_printk_skb: 2 callbacks suppressed
Oct  2 21:36:40.176717 kernel: audit: type=1400 audit(1696282600.138:1388): avc:  denied  { watch } for  pid=2376 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c698,c859 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 21:36:40.138000 audit[2376]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00311f230 a2=fc6 a3=0 items=0 ppid=2239 pid=2376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c698,c859 key=(null)
Oct  2 21:36:40.271207 systemd[1]: Started sshd@7-139.178.70.49:22-137.184.44.178:56488.service.
Oct  2 21:36:40.386276 kernel: audit: type=1300 audit(1696282600.138:1388): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00311f230 a2=fc6 a3=0 items=0 ppid=2239 pid=2376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c698,c859 key=(null)
Oct  2 21:36:40.386329 kernel: audit: type=1327 audit(1696282600.138:1388): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 21:36:40.138000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 21:36:40.478676 kernel: audit: type=1400 audit(1696282600.138:1389): avc:  denied  { watch } for  pid=2376 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c698,c859 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 21:36:40.138000 audit[2376]: AVC avc:  denied  { watch } for  pid=2376 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c698,c859 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 21:36:40.488575 sshd[6937]: Invalid user 1111 from 137.184.44.178 port 56488
Oct  2 21:36:40.495924 sshd[6937]: pam_faillock(sshd:auth): User unknown
Oct  2 21:36:40.495975 sshd[6937]: pam_unix(sshd:auth): check pass; user unknown
Oct  2 21:36:40.495991 sshd[6937]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.184.44.178
Oct  2 21:36:40.496026 sshd[6937]: pam_faillock(sshd:auth): User unknown
Oct  2 21:36:40.568132 kernel: audit: type=1300 audit(1696282600.138:1389): arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c0016a1ae0 a2=fc6 a3=0 items=0 ppid=2239 pid=2376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c698,c859 key=(null)
Oct  2 21:36:40.138000 audit[2376]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c0016a1ae0 a2=fc6 a3=0 items=0 ppid=2239 pid=2376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c698,c859 key=(null)
Oct  2 21:36:40.138000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 21:36:40.781578 kernel: audit: type=1327 audit(1696282600.138:1389): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 21:36:40.781615 kernel: audit: type=1130 audit(1696282600.269:1390): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-139.178.70.49:22-137.184.44.178:56488 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:36:40.269000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-139.178.70.49:22-137.184.44.178:56488 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:36:40.870584 kernel: audit: type=1400 audit(1696282600.376:1391): avc:  denied  { watch } for  pid=2377 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c411,c438 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 21:36:40.376000 audit[2377]: AVC avc:  denied  { watch } for  pid=2377 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c411,c438 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 21:36:40.960649 kernel: audit: type=1300 audit(1696282600.376:1391): arch=c000003e syscall=254 success=no exit=-13 a0=5f a1=c00d042220 a2=fc6 a3=0 items=0 ppid=2211 pid=2377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c411,c438 key=(null)
Oct  2 21:36:40.376000 audit[2377]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5f a1=c00d042220 a2=fc6 a3=0 items=0 ppid=2211 pid=2377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c411,c438 key=(null)
Oct  2 21:36:41.058905 kernel: audit: type=1327 audit(1696282600.376:1391): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E3439002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75
Oct  2 21:36:40.376000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E3439002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75
Oct  2 21:36:40.376000 audit[2377]: AVC avc:  denied  { watch } for  pid=2377 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c411,c438 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 21:36:40.376000 audit[2377]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5f a1=c013a96e10 a2=fc6 a3=0 items=0 ppid=2211 pid=2377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c411,c438 key=(null)
Oct  2 21:36:40.376000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E3439002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75
Oct  2 21:36:40.376000 audit[2377]: AVC avc:  denied  { watch } for  pid=2377 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=520974 scontext=system_u:system_r:svirt_lxc_net_t:s0:c411,c438 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 21:36:40.376000 audit[2377]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c00df8c900 a2=fc6 a3=0 items=0 ppid=2211 pid=2377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c411,c438 key=(null)
Oct  2 21:36:40.376000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E3439002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75
Oct  2 21:36:40.384000 audit[2377]: AVC avc:  denied  { watch } for  pid=2377 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c411,c438 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 21:36:40.384000 audit[2377]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5f a1=c013c8b880 a2=fc6 a3=0 items=0 ppid=2211 pid=2377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c411,c438 key=(null)
Oct  2 21:36:40.384000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E3439002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75
Oct  2 21:36:40.384000 audit[2377]: AVC avc:  denied  { watch } for  pid=2377 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c411,c438 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 21:36:40.384000 audit[2377]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5f a1=c00df8c930 a2=fc6 a3=0 items=0 ppid=2211 pid=2377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c411,c438 key=(null)
Oct  2 21:36:40.384000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E3439002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75
Oct  2 21:36:40.384000 audit[2377]: AVC avc:  denied  { watch } for  pid=2377 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=520980 scontext=system_u:system_r:svirt_lxc_net_t:s0:c411,c438 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 21:36:40.384000 audit[2377]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5f a1=c012da3770 a2=fc6 a3=0 items=0 ppid=2211 pid=2377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c411,c438 key=(null)
Oct  2 21:36:40.384000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E3439002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75
Oct  2 21:36:40.494000 audit[6937]: USER_AUTH pid=6937 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="1111" exe="/usr/sbin/sshd" hostname=137.184.44.178 addr=137.184.44.178 terminal=ssh res=failed'
Oct  2 21:36:42.545528 sshd[6937]: Failed password for invalid user 1111 from 137.184.44.178 port 56488 ssh2
Oct  2 21:36:43.569325 sshd[6937]: Connection closed by invalid user 1111 137.184.44.178 port 56488 [preauth]
Oct  2 21:36:43.571890 systemd[1]: sshd@7-139.178.70.49:22-137.184.44.178:56488.service: Deactivated successfully.
Oct  2 21:36:43.570000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-139.178.70.49:22-137.184.44.178:56488 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:36:44.793115 env[1455]: time="2023-10-02T21:36:44.792981515Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\""
Oct  2 21:36:45.036971 env[1455]: time="2023-10-02T21:36:45.036811131Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io
Oct  2 21:36:45.037782 env[1455]: time="2023-10-02T21:36:45.037679895Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden"
Oct  2 21:36:45.038202 kubelet[2553]: E1002 21:36:45.038160    2553 remote_image.go:180] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0"
Oct  2 21:36:45.039020 kubelet[2553]: E1002 21:36:45.038250    2553 kuberuntime_image.go:53] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0"
Oct  2 21:36:45.039020 kubelet[2553]: E1002 21:36:45.038558    2553 kuberuntime_manager.go:1209] container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.25.0,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:etccalico,ReadOnly:false,MountPath:/etc/calico,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,},VolumeMount{Name:kube-api-access-4j7vd,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-7djgt_calico-system(96f60c96-bc95-4de5-a016-9864623478a6): ErrImagePull: failed to pull and unpack image "ghcr.io/flatcar/calico/csi:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/csi:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden
Oct  2 21:36:45.040588 env[1455]: time="2023-10-02T21:36:45.040522530Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\""
Oct  2 21:36:45.276785 env[1455]: time="2023-10-02T21:36:45.276613681Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io
Oct  2 21:36:45.277913 env[1455]: time="2023-10-02T21:36:45.277793780Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden"
Oct  2 21:36:45.278429 kubelet[2553]: E1002 21:36:45.278325    2553 remote_image.go:180] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0"
Oct  2 21:36:45.278429 kubelet[2553]: E1002 21:36:45.278424    2553 kuberuntime_image.go:53] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0"
Oct  2 21:36:45.278923 kubelet[2553]: E1002 21:36:45.278678    2553 kuberuntime_manager.go:1209] container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-4j7vd,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-7djgt_calico-system(96f60c96-bc95-4de5-a016-9864623478a6): ErrImagePull: failed to pull and unpack image "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden
Oct  2 21:36:45.278923 kubelet[2553]: E1002 21:36:45.278821    2553 pod_workers.go:1300] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/csi-node-driver-7djgt" podUID="96f60c96-bc95-4de5-a016-9864623478a6"
Oct  2 21:36:45.792000 kubelet[2553]: E1002 21:36:45.791949    2553 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-7dbcfbfd9-4j6ds" podUID="904b4100-985a-4f84-ae75-ae86d43ecf6f"
Oct  2 21:36:51.792950 kubelet[2553]: E1002 21:36:51.792875    2553 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-7dbcfbfd9-ts2w6" podUID="10aa136e-fcbb-47e7-b373-1b69bde373de"
Oct  2 21:36:54.951000 audit[2376]: AVC avc:  denied  { watch } for  pid=2376 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c698,c859 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 21:36:54.994665 kernel: kauditd_printk_skb: 17 callbacks suppressed
Oct  2 21:36:54.994753 kernel: audit: type=1400 audit(1696282614.951:1399): avc:  denied  { watch } for  pid=2376 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c698,c859 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 21:36:54.951000 audit[2376]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001ca2da0 a2=fc6 a3=0 items=0 ppid=2239 pid=2376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c698,c859 key=(null)
Oct  2 21:36:55.205004 kernel: audit: type=1300 audit(1696282614.951:1399): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001ca2da0 a2=fc6 a3=0 items=0 ppid=2239 pid=2376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c698,c859 key=(null)
Oct  2 21:36:55.205040 kernel: audit: type=1327 audit(1696282614.951:1399): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 21:36:54.951000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 21:36:55.297654 kernel: audit: type=1400 audit(1696282614.955:1400): avc:  denied  { watch } for  pid=2376 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c698,c859 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 21:36:54.955000 audit[2376]: AVC avc:  denied  { watch } for  pid=2376 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c698,c859 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 21:36:55.387150 kernel: audit: type=1300 audit(1696282614.955:1400): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000fd18a0 a2=fc6 a3=0 items=0 ppid=2239 pid=2376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c698,c859 key=(null)
Oct  2 21:36:54.955000 audit[2376]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000fd18a0 a2=fc6 a3=0 items=0 ppid=2239 pid=2376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c698,c859 key=(null)
Oct  2 21:36:55.507813 kernel: audit: type=1327 audit(1696282614.955:1400): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 21:36:54.955000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 21:36:55.601183 kernel: audit: type=1400 audit(1696282614.957:1401): avc:  denied  { watch } for  pid=2376 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c698,c859 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 21:36:54.957000 audit[2376]: AVC avc:  denied  { watch } for  pid=2376 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c698,c859 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 21:36:54.957000 audit[2376]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001bb96e0 a2=fc6 a3=0 items=0 ppid=2239 pid=2376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c698,c859 key=(null)
Oct  2 21:36:55.812187 kernel: audit: type=1300 audit(1696282614.957:1401): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001bb96e0 a2=fc6 a3=0 items=0 ppid=2239 pid=2376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c698,c859 key=(null)
Oct  2 21:36:55.812231 kernel: audit: type=1327 audit(1696282614.957:1401): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 21:36:54.957000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 21:36:55.905498 kernel: audit: type=1400 audit(1696282614.958:1402): avc:  denied  { watch } for  pid=2376 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c698,c859 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 21:36:54.958000 audit[2376]: AVC avc:  denied  { watch } for  pid=2376 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c698,c859 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 21:36:54.958000 audit[2376]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001ca2dc0 a2=fc6 a3=0 items=0 ppid=2239 pid=2376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c698,c859 key=(null)
Oct  2 21:36:54.958000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 21:36:56.791653 kubelet[2553]: E1002 21:36:56.791633    2553 pod_workers.go:1300] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-7djgt" podUID="96f60c96-bc95-4de5-a016-9864623478a6"
Oct  2 21:37:00.791361 kubelet[2553]: E1002 21:37:00.791337    2553 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-7dbcfbfd9-4j6ds" podUID="904b4100-985a-4f84-ae75-ae86d43ecf6f"
Oct  2 21:37:06.791474 kubelet[2553]: E1002 21:37:06.791450    2553 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-7dbcfbfd9-ts2w6" podUID="10aa136e-fcbb-47e7-b373-1b69bde373de"
Oct  2 21:37:10.791256 kubelet[2553]: E1002 21:37:10.791236    2553 pod_workers.go:1300] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-7djgt" podUID="96f60c96-bc95-4de5-a016-9864623478a6"
Oct  2 21:37:14.792776 kubelet[2553]: E1002 21:37:14.792703    2553 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-7dbcfbfd9-4j6ds" podUID="904b4100-985a-4f84-ae75-ae86d43ecf6f"
Oct  2 21:37:20.793147 kubelet[2553]: E1002 21:37:20.793075    2553 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-7dbcfbfd9-ts2w6" podUID="10aa136e-fcbb-47e7-b373-1b69bde373de"
Oct  2 21:37:23.993812 update_engine[1447]: I1002 21:37:23.993701  1447 prefs.cc:51] certificate-report-to-send-update not present in /var/lib/update_engine/prefs
Oct  2 21:37:23.993812 update_engine[1447]: I1002 21:37:23.993781  1447 prefs.cc:51] certificate-report-to-send-download not present in /var/lib/update_engine/prefs
Oct  2 21:37:23.994729 update_engine[1447]: I1002 21:37:23.994575  1447 prefs.cc:51] aleph-version not present in /var/lib/update_engine/prefs
Oct  2 21:37:23.995535 update_engine[1447]: I1002 21:37:23.995435  1447 omaha_request_params.cc:62] Current group set to lts
Oct  2 21:37:23.995795 update_engine[1447]: I1002 21:37:23.995748  1447 update_attempter.cc:495] Already updated boot flags. Skipping.
Oct  2 21:37:23.995795 update_engine[1447]: I1002 21:37:23.995769  1447 update_attempter.cc:638] Scheduling an action processor start.
Oct  2 21:37:23.996033 update_engine[1447]: I1002 21:37:23.995801  1447 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction
Oct  2 21:37:23.996033 update_engine[1447]: I1002 21:37:23.995872  1447 prefs.cc:51] previous-version not present in /var/lib/update_engine/prefs
Oct  2 21:37:23.996033 update_engine[1447]: I1002 21:37:23.996011  1447 omaha_request_action.cc:268] Posting an Omaha request to https://public.update.flatcar-linux.net/v1/update/
Oct  2 21:37:23.996033 update_engine[1447]: I1002 21:37:23.996026  1447 omaha_request_action.cc:269] Request: <?xml version="1.0" encoding="UTF-8"?>
Oct  2 21:37:23.996033 update_engine[1447]: <request protocol="3.0" version="update_engine-0.4.10" updaterversion="update_engine-0.4.10" installsource="scheduler" ismachine="1">
Oct  2 21:37:23.996033 update_engine[1447]:     <os version="Chateau" platform="CoreOS" sp="3510.3.0_x86_64"></os>
Oct  2 21:37:23.996033 update_engine[1447]:     <app appid="{e96281a6-d1af-4bde-9a0a-97b76e56dc57}" version="3510.3.0" track="lts" bootid="{f35c6034-f792-4005-b5f3-850903d8363a}" oem="packet" oemversion="0.2.2" alephversion="3510.3.0" machineid="5f74382ea3f04ed99af4e278a6e73398" machinealias="" lang="en-US" board="amd64-usr" hardware_class="" delta_okay="false" >
Oct  2 21:37:23.996033 update_engine[1447]:         <ping active="1"></ping>
Oct  2 21:37:23.996033 update_engine[1447]:         <updatecheck></updatecheck>
Oct  2 21:37:23.996033 update_engine[1447]:         <event eventtype="3" eventresult="2" previousversion="0.0.0.0"></event>
Oct  2 21:37:23.996033 update_engine[1447]:     </app>
Oct  2 21:37:23.996033 update_engine[1447]: </request>
Oct  2 21:37:23.996033 update_engine[1447]: I1002 21:37:23.996037  1447 libcurl_http_fetcher.cc:47] Starting/Resuming transfer
Oct  2 21:37:23.997285 locksmithd[1491]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_CHECKING_FOR_UPDATE" NewVersion=0.0.0 NewSize=0
Oct  2 21:37:23.999154 update_engine[1447]: I1002 21:37:23.999074  1447 libcurl_http_fetcher.cc:174] Setting up curl options for HTTPS
Oct  2 21:37:23.999613 update_engine[1447]: I1002 21:37:23.999539  1447 libcurl_http_fetcher.cc:449] Setting up timeout source: 1 seconds.
Oct  2 21:37:24.794914 kubelet[2553]: E1002 21:37:24.794838    2553 pod_workers.go:1300] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-7djgt" podUID="96f60c96-bc95-4de5-a016-9864623478a6"
Oct  2 21:37:25.176274 update_engine[1447]: I1002 21:37:25.176061  1447 prefs.cc:51] update-server-cert-0-2 not present in /var/lib/update_engine/prefs
Oct  2 21:37:25.177028 update_engine[1447]: I1002 21:37:25.176618  1447 prefs.cc:51] update-server-cert-0-1 not present in /var/lib/update_engine/prefs
Oct  2 21:37:25.177161 update_engine[1447]: I1002 21:37:25.177042  1447 prefs.cc:51] update-server-cert-0-0 not present in /var/lib/update_engine/prefs
Oct  2 21:37:25.537147 update_engine[1447]: I1002 21:37:25.537041  1447 libcurl_http_fetcher.cc:263] HTTP response code: 200
Oct  2 21:37:25.540493 update_engine[1447]: I1002 21:37:25.540400  1447 libcurl_http_fetcher.cc:320] Transfer completed (200), 314 bytes downloaded
Oct  2 21:37:25.540493 update_engine[1447]: I1002 21:37:25.540433  1447 omaha_request_action.cc:619] Omaha request response: <?xml version="1.0" encoding="UTF-8"?>
Oct  2 21:37:25.540493 update_engine[1447]: <response protocol="3.0" server="nebraska"><daystart elapsed_seconds="0"></daystart><app appid="{e96281a6-d1af-4bde-9a0a-97b76e56dc57}" status="ok"><ping status="ok"></ping><updatecheck status="noupdate"><urls></urls></updatecheck><event status="ok"></event></app></response>
Oct  2 21:37:25.554797 update_engine[1447]: I1002 21:37:25.554708  1447 omaha_request_action.cc:409] No update.
Oct  2 21:37:25.554797 update_engine[1447]: I1002 21:37:25.554761  1447 action_processor.cc:82] ActionProcessor::ActionComplete: finished OmahaRequestAction, starting OmahaResponseHandlerAction
Oct  2 21:37:25.554797 update_engine[1447]: I1002 21:37:25.554775  1447 omaha_response_handler_action.cc:36] There are no updates. Aborting.
Oct  2 21:37:25.554797 update_engine[1447]: I1002 21:37:25.554786  1447 action_processor.cc:68] ActionProcessor::ActionComplete: OmahaResponseHandlerAction action failed. Aborting processing.
Oct  2 21:37:25.554797 update_engine[1447]: I1002 21:37:25.554795  1447 action_processor.cc:73] ActionProcessor::ActionComplete: finished last action of type OmahaResponseHandlerAction
Oct  2 21:37:25.554797 update_engine[1447]: I1002 21:37:25.554803  1447 update_attempter.cc:302] Processing Done.
Oct  2 21:37:25.555501 update_engine[1447]: I1002 21:37:25.554831  1447 update_attempter.cc:338] No update.
Oct  2 21:37:25.555501 update_engine[1447]: I1002 21:37:25.554854  1447 update_check_scheduler.cc:74] Next update check in 49m29s
Oct  2 21:37:25.555728 locksmithd[1491]: LastCheckedTime=1696282645 Progress=0 CurrentOperation="UPDATE_STATUS_IDLE" NewVersion=0.0.0 NewSize=0
Oct  2 21:37:29.792772 kubelet[2553]: E1002 21:37:29.792717    2553 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-7dbcfbfd9-4j6ds" podUID="904b4100-985a-4f84-ae75-ae86d43ecf6f"
Oct  2 21:37:33.793378 kubelet[2553]: E1002 21:37:33.793296    2553 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-7dbcfbfd9-ts2w6" podUID="10aa136e-fcbb-47e7-b373-1b69bde373de"
Oct  2 21:37:38.793566 kubelet[2553]: E1002 21:37:38.793501    2553 pod_workers.go:1300] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-7djgt" podUID="96f60c96-bc95-4de5-a016-9864623478a6"
Oct  2 21:37:40.140000 audit[2376]: AVC avc:  denied  { watch } for  pid=2376 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c698,c859 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 21:37:40.184458 kernel: kauditd_printk_skb: 2 callbacks suppressed
Oct  2 21:37:40.184546 kernel: audit: type=1400 audit(1696282660.140:1403): avc:  denied  { watch } for  pid=2376 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c698,c859 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 21:37:40.140000 audit[2376]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000ff94c0 a2=fc6 a3=0 items=0 ppid=2239 pid=2376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c698,c859 key=(null)
Oct  2 21:37:40.397068 kernel: audit: type=1300 audit(1696282660.140:1403): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000ff94c0 a2=fc6 a3=0 items=0 ppid=2239 pid=2376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c698,c859 key=(null)
Oct  2 21:37:40.397152 kernel: audit: type=1327 audit(1696282660.140:1403): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 21:37:40.140000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 21:37:40.140000 audit[2376]: AVC avc:  denied  { watch } for  pid=2376 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c698,c859 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 21:37:40.580472 kernel: audit: type=1400 audit(1696282660.140:1404): avc:  denied  { watch } for  pid=2376 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c698,c859 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 21:37:40.580531 kernel: audit: type=1300 audit(1696282660.140:1404): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0002c71a0 a2=fc6 a3=0 items=0 ppid=2239 pid=2376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c698,c859 key=(null)
Oct  2 21:37:40.140000 audit[2376]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0002c71a0 a2=fc6 a3=0 items=0 ppid=2239 pid=2376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c698,c859 key=(null)
Oct  2 21:37:40.700828 kernel: audit: type=1327 audit(1696282660.140:1404): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 21:37:40.140000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 21:37:40.793841 kernel: audit: type=1400 audit(1696282660.377:1405): avc:  denied  { watch } for  pid=2377 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c411,c438 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 21:37:40.377000 audit[2377]: AVC avc:  denied  { watch } for  pid=2377 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c411,c438 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 21:37:40.884793 kernel: audit: type=1300 audit(1696282660.377:1405): arch=c000003e syscall=254 success=no exit=-13 a0=5f a1=c0076de9c0 a2=fc6 a3=0 items=0 ppid=2211 pid=2377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c411,c438 key=(null)
Oct  2 21:37:40.377000 audit[2377]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5f a1=c0076de9c0 a2=fc6 a3=0 items=0 ppid=2211 pid=2377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c411,c438 key=(null)
Oct  2 21:37:40.377000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E3439002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75
Oct  2 21:37:41.075992 kernel: audit: type=1327 audit(1696282660.377:1405): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E3439002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75
Oct  2 21:37:41.076026 kernel: audit: type=1400 audit(1696282660.377:1406): avc:  denied  { watch } for  pid=2377 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=520974 scontext=system_u:system_r:svirt_lxc_net_t:s0:c411,c438 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 21:37:40.377000 audit[2377]: AVC avc:  denied  { watch } for  pid=2377 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=520974 scontext=system_u:system_r:svirt_lxc_net_t:s0:c411,c438 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 21:37:40.377000 audit[2377]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c007d70150 a2=fc6 a3=0 items=0 ppid=2211 pid=2377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c411,c438 key=(null)
Oct  2 21:37:40.377000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E3439002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75
Oct  2 21:37:40.377000 audit[2377]: AVC avc:  denied  { watch } for  pid=2377 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c411,c438 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 21:37:40.377000 audit[2377]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c00ef3f2c0 a2=fc6 a3=0 items=0 ppid=2211 pid=2377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c411,c438 key=(null)
Oct  2 21:37:40.377000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E3439002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75
Oct  2 21:37:40.385000 audit[2377]: AVC avc:  denied  { watch } for  pid=2377 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=520980 scontext=system_u:system_r:svirt_lxc_net_t:s0:c411,c438 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 21:37:40.385000 audit[2377]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5f a1=c006e833b0 a2=fc6 a3=0 items=0 ppid=2211 pid=2377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c411,c438 key=(null)
Oct  2 21:37:40.385000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E3439002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75
Oct  2 21:37:40.385000 audit[2377]: AVC avc:  denied  { watch } for  pid=2377 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c411,c438 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 21:37:40.385000 audit[2377]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5f a1=c01101b1a0 a2=fc6 a3=0 items=0 ppid=2211 pid=2377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c411,c438 key=(null)
Oct  2 21:37:40.385000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E3439002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75
Oct  2 21:37:40.385000 audit[2377]: AVC avc:  denied  { watch } for  pid=2377 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c411,c438 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 21:37:40.385000 audit[2377]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5f a1=c007ccc810 a2=fc6 a3=0 items=0 ppid=2211 pid=2377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c411,c438 key=(null)
Oct  2 21:37:40.385000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E3439002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75
Oct  2 21:37:42.792346 kubelet[2553]: E1002 21:37:42.792274    2553 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-7dbcfbfd9-4j6ds" podUID="904b4100-985a-4f84-ae75-ae86d43ecf6f"
Oct  2 21:37:47.793188 kubelet[2553]: E1002 21:37:47.793124    2553 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-7dbcfbfd9-ts2w6" podUID="10aa136e-fcbb-47e7-b373-1b69bde373de"
Oct  2 21:37:53.791223 kubelet[2553]: E1002 21:37:53.791202    2553 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-7dbcfbfd9-4j6ds" podUID="904b4100-985a-4f84-ae75-ae86d43ecf6f"
Oct  2 21:37:53.791576 kubelet[2553]: E1002 21:37:53.791466    2553 pod_workers.go:1300] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-7djgt" podUID="96f60c96-bc95-4de5-a016-9864623478a6"
Oct  2 21:37:54.953484 kernel: kauditd_printk_skb: 14 callbacks suppressed
Oct  2 21:37:54.953830 kernel: audit: type=1400 audit(1696282674.952:1411): avc:  denied  { watch } for  pid=2376 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c698,c859 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 21:37:54.952000 audit[2376]: AVC avc:  denied  { watch } for  pid=2376 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c698,c859 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 21:37:54.952000 audit[2376]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0002a4560 a2=fc6 a3=0 items=0 ppid=2239 pid=2376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c698,c859 key=(null)
Oct  2 21:37:55.194622 kernel: audit: type=1300 audit(1696282674.952:1411): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0002a4560 a2=fc6 a3=0 items=0 ppid=2239 pid=2376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c698,c859 key=(null)
Oct  2 21:37:55.194694 kernel: audit: type=1327 audit(1696282674.952:1411): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 21:37:54.952000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 21:37:55.288271 kernel: audit: type=1400 audit(1696282674.956:1412): avc:  denied  { watch } for  pid=2376 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c698,c859 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 21:37:54.956000 audit[2376]: AVC avc:  denied  { watch } for  pid=2376 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c698,c859 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 21:37:55.377590 kernel: audit: type=1300 audit(1696282674.956:1412): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0014a5780 a2=fc6 a3=0 items=0 ppid=2239 pid=2376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c698,c859 key=(null)
Oct  2 21:37:54.956000 audit[2376]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0014a5780 a2=fc6 a3=0 items=0 ppid=2239 pid=2376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c698,c859 key=(null)
Oct  2 21:37:55.497867 kernel: audit: type=1327 audit(1696282674.956:1412): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 21:37:54.956000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 21:37:55.590932 kernel: audit: type=1400 audit(1696282674.958:1413): avc:  denied  { watch } for  pid=2376 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c698,c859 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 21:37:54.958000 audit[2376]: AVC avc:  denied  { watch } for  pid=2376 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c698,c859 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 21:37:55.680878 kernel: audit: type=1300 audit(1696282674.958:1413): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00165d0a0 a2=fc6 a3=0 items=0 ppid=2239 pid=2376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c698,c859 key=(null)
Oct  2 21:37:54.958000 audit[2376]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00165d0a0 a2=fc6 a3=0 items=0 ppid=2239 pid=2376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c698,c859 key=(null)
Oct  2 21:37:55.801277 kernel: audit: type=1327 audit(1696282674.958:1413): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 21:37:54.958000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 21:37:55.894451 kernel: audit: type=1400 audit(1696282674.958:1414): avc:  denied  { watch } for  pid=2376 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c698,c859 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 21:37:54.958000 audit[2376]: AVC avc:  denied  { watch } for  pid=2376 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c698,c859 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 21:37:54.958000 audit[2376]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0002a45c0 a2=fc6 a3=0 items=0 ppid=2239 pid=2376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c698,c859 key=(null)
Oct  2 21:37:54.958000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 21:37:58.793081 kubelet[2553]: E1002 21:37:58.793008    2553 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-7dbcfbfd9-ts2w6" podUID="10aa136e-fcbb-47e7-b373-1b69bde373de"
Oct  2 21:38:06.793974 kubelet[2553]: E1002 21:38:06.793917    2553 pod_workers.go:1300] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-7djgt" podUID="96f60c96-bc95-4de5-a016-9864623478a6"
Oct  2 21:38:07.791203 kubelet[2553]: E1002 21:38:07.791185    2553 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-7dbcfbfd9-4j6ds" podUID="904b4100-985a-4f84-ae75-ae86d43ecf6f"
Oct  2 21:38:13.793678 kubelet[2553]: E1002 21:38:13.793502    2553 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-7dbcfbfd9-ts2w6" podUID="10aa136e-fcbb-47e7-b373-1b69bde373de"
Oct  2 21:38:20.790844 kubelet[2553]: E1002 21:38:20.790795    2553 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-7dbcfbfd9-4j6ds" podUID="904b4100-985a-4f84-ae75-ae86d43ecf6f"
Oct  2 21:38:20.791194 kubelet[2553]: E1002 21:38:20.791172    2553 pod_workers.go:1300] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-7djgt" podUID="96f60c96-bc95-4de5-a016-9864623478a6"
Oct  2 21:38:27.792910 kubelet[2553]: E1002 21:38:27.792830    2553 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-7dbcfbfd9-ts2w6" podUID="10aa136e-fcbb-47e7-b373-1b69bde373de"
Oct  2 21:38:32.792501 kubelet[2553]: E1002 21:38:32.792379    2553 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-7dbcfbfd9-4j6ds" podUID="904b4100-985a-4f84-ae75-ae86d43ecf6f"
Oct  2 21:38:33.792003 kubelet[2553]: E1002 21:38:33.791982    2553 pod_workers.go:1300] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-7djgt" podUID="96f60c96-bc95-4de5-a016-9864623478a6"
Oct  2 21:38:35.689655 systemd[1]: Started sshd@8-139.178.70.49:22-139.178.89.65:34422.service.
Oct  2 21:38:35.689000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-139.178.70.49:22-139.178.89.65:34422 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:38:35.730289 kernel: kauditd_printk_skb: 2 callbacks suppressed
Oct  2 21:38:35.730393 kernel: audit: type=1130 audit(1696282715.689:1415): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-139.178.70.49:22-139.178.89.65:34422 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:38:35.848000 audit[7806]: USER_ACCT pid=7806 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success'
Oct  2 21:38:35.849347 sshd[7806]: Accepted publickey for core from 139.178.89.65 port 34422 ssh2: RSA SHA256:M4fPbwtaE29dxMxiSyaa1yIvxglYsCEa+0scmSZWaB4
Oct  2 21:38:35.850486 sshd[7806]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Oct  2 21:38:35.852985 systemd-logind[1445]: New session 10 of user core.
Oct  2 21:38:35.853500 systemd[1]: Started session-10.scope.
Oct  2 21:38:35.935706 sshd[7806]: pam_unix(sshd:session): session closed for user core
Oct  2 21:38:35.937132 systemd[1]: sshd@8-139.178.70.49:22-139.178.89.65:34422.service: Deactivated successfully.
Oct  2 21:38:35.937596 systemd[1]: session-10.scope: Deactivated successfully.
Oct  2 21:38:35.937934 systemd-logind[1445]: Session 10 logged out. Waiting for processes to exit.
Oct  2 21:38:35.938326 systemd-logind[1445]: Removed session 10.
Oct  2 21:38:35.848000 audit[7806]: CRED_ACQ pid=7806 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success'
Oct  2 21:38:35.941500 kernel: audit: type=1101 audit(1696282715.848:1416): pid=7806 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success'
Oct  2 21:38:35.941534 kernel: audit: type=1103 audit(1696282715.848:1417): pid=7806 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success'
Oct  2 21:38:36.089515 kernel: audit: type=1006 audit(1696282715.848:1418): pid=7806 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1
Oct  2 21:38:36.089578 kernel: audit: type=1300 audit(1696282715.848:1418): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd14871f20 a2=3 a3=0 items=0 ppid=1 pid=7806 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:38:35.848000 audit[7806]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd14871f20 a2=3 a3=0 items=0 ppid=1 pid=7806 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:38:36.181925 kernel: audit: type=1327 audit(1696282715.848:1418): proctitle=737368643A20636F7265205B707269765D
Oct  2 21:38:35.848000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D
Oct  2 21:38:36.212703 kernel: audit: type=1105 audit(1696282715.854:1419): pid=7806 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success'
Oct  2 21:38:35.854000 audit[7806]: USER_START pid=7806 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success'
Oct  2 21:38:36.307842 kernel: audit: type=1103 audit(1696282715.854:1420): pid=7808 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success'
Oct  2 21:38:35.854000 audit[7808]: CRED_ACQ pid=7808 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success'
Oct  2 21:38:36.396877 kernel: audit: type=1106 audit(1696282715.934:1421): pid=7806 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success'
Oct  2 21:38:35.934000 audit[7806]: USER_END pid=7806 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success'
Oct  2 21:38:36.492353 kernel: audit: type=1104 audit(1696282715.934:1422): pid=7806 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success'
Oct  2 21:38:35.934000 audit[7806]: CRED_DISP pid=7806 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success'
Oct  2 21:38:35.935000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-139.178.70.49:22-139.178.89.65:34422 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:38:40.140000 audit[2376]: AVC avc:  denied  { watch } for  pid=2376 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c698,c859 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 21:38:40.140000 audit[2376]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001b12bd0 a2=fc6 a3=0 items=0 ppid=2239 pid=2376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c698,c859 key=(null)
Oct  2 21:38:40.140000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 21:38:40.140000 audit[2376]: AVC avc:  denied  { watch } for  pid=2376 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c698,c859 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 21:38:40.140000 audit[2376]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c000d3e3a0 a2=fc6 a3=0 items=0 ppid=2239 pid=2376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c698,c859 key=(null)
Oct  2 21:38:40.140000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 21:38:40.378000 audit[2377]: AVC avc:  denied  { watch } for  pid=2377 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=520974 scontext=system_u:system_r:svirt_lxc_net_t:s0:c411,c438 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 21:38:40.378000 audit[2377]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5f a1=c010ad5e30 a2=fc6 a3=0 items=0 ppid=2211 pid=2377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c411,c438 key=(null)
Oct  2 21:38:40.378000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E3439002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75
Oct  2 21:38:40.378000 audit[2377]: AVC avc:  denied  { watch } for  pid=2377 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c411,c438 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 21:38:40.378000 audit[2377]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c0099229c0 a2=fc6 a3=0 items=0 ppid=2211 pid=2377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c411,c438 key=(null)
Oct  2 21:38:40.378000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E3439002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75
Oct  2 21:38:40.378000 audit[2377]: AVC avc:  denied  { watch } for  pid=2377 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c411,c438 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 21:38:40.378000 audit[2377]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5f a1=c0025fae80 a2=fc6 a3=0 items=0 ppid=2211 pid=2377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c411,c438 key=(null)
Oct  2 21:38:40.378000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E3439002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75
Oct  2 21:38:40.386000 audit[2377]: AVC avc:  denied  { watch } for  pid=2377 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=520980 scontext=system_u:system_r:svirt_lxc_net_t:s0:c411,c438 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 21:38:40.386000 audit[2377]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5f a1=c0139b7b00 a2=fc6 a3=0 items=0 ppid=2211 pid=2377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c411,c438 key=(null)
Oct  2 21:38:40.386000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E3439002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75
Oct  2 21:38:40.386000 audit[2377]: AVC avc:  denied  { watch } for  pid=2377 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c411,c438 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 21:38:40.386000 audit[2377]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5f a1=c00d03d2e0 a2=fc6 a3=0 items=0 ppid=2211 pid=2377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c411,c438 key=(null)
Oct  2 21:38:40.386000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E3439002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75
Oct  2 21:38:40.386000 audit[2377]: AVC avc:  denied  { watch } for  pid=2377 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c411,c438 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 21:38:40.386000 audit[2377]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c006e6c240 a2=fc6 a3=0 items=0 ppid=2211 pid=2377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c411,c438 key=(null)
Oct  2 21:38:40.386000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E3439002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75
Oct  2 21:38:40.792702 kubelet[2553]: E1002 21:38:40.792632    2553 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-7dbcfbfd9-ts2w6" podUID="10aa136e-fcbb-47e7-b373-1b69bde373de"
Oct  2 21:38:45.946221 systemd[1]: Started sshd@9-139.178.70.49:22-139.178.89.65:59994.service.
Oct  2 21:38:45.944000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-139.178.70.49:22-139.178.89.65:59994 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:38:45.973519 kernel: kauditd_printk_skb: 25 callbacks suppressed
Oct  2 21:38:45.973598 kernel: audit: type=1130 audit(1696282725.944:1432): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-139.178.70.49:22-139.178.89.65:59994 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:38:46.093000 audit[7914]: USER_ACCT pid=7914 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success'
Oct  2 21:38:46.093977 sshd[7914]: Accepted publickey for core from 139.178.89.65 port 59994 ssh2: RSA SHA256:M4fPbwtaE29dxMxiSyaa1yIvxglYsCEa+0scmSZWaB4
Oct  2 21:38:46.095115 sshd[7914]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Oct  2 21:38:46.097299 systemd-logind[1445]: New session 11 of user core.
Oct  2 21:38:46.097850 systemd[1]: Started session-11.scope.
Oct  2 21:38:46.174314 sshd[7914]: pam_unix(sshd:session): session closed for user core
Oct  2 21:38:46.175836 systemd[1]: sshd@9-139.178.70.49:22-139.178.89.65:59994.service: Deactivated successfully.
Oct  2 21:38:46.176268 systemd[1]: session-11.scope: Deactivated successfully.
Oct  2 21:38:46.176624 systemd-logind[1445]: Session 11 logged out. Waiting for processes to exit.
Oct  2 21:38:46.177159 systemd-logind[1445]: Removed session 11.
Oct  2 21:38:46.093000 audit[7914]: CRED_ACQ pid=7914 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success'
Oct  2 21:38:46.275352 kernel: audit: type=1101 audit(1696282726.093:1433): pid=7914 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success'
Oct  2 21:38:46.275389 kernel: audit: type=1103 audit(1696282726.093:1434): pid=7914 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success'
Oct  2 21:38:46.275411 kernel: audit: type=1006 audit(1696282726.093:1435): pid=7914 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1
Oct  2 21:38:46.333709 kernel: audit: type=1300 audit(1696282726.093:1435): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe21cb43d0 a2=3 a3=0 items=0 ppid=1 pid=7914 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:38:46.093000 audit[7914]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe21cb43d0 a2=3 a3=0 items=0 ppid=1 pid=7914 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:38:46.425389 kernel: audit: type=1327 audit(1696282726.093:1435): proctitle=737368643A20636F7265205B707269765D
Oct  2 21:38:46.093000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D
Oct  2 21:38:46.455867 kernel: audit: type=1105 audit(1696282726.098:1436): pid=7914 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success'
Oct  2 21:38:46.098000 audit[7914]: USER_START pid=7914 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success'
Oct  2 21:38:46.550155 kernel: audit: type=1103 audit(1696282726.098:1437): pid=7916 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success'
Oct  2 21:38:46.098000 audit[7916]: CRED_ACQ pid=7916 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success'
Oct  2 21:38:46.639130 kernel: audit: type=1106 audit(1696282726.173:1438): pid=7914 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success'
Oct  2 21:38:46.173000 audit[7914]: USER_END pid=7914 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success'
Oct  2 21:38:46.173000 audit[7914]: CRED_DISP pid=7914 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success'
Oct  2 21:38:46.790771 kubelet[2553]: E1002 21:38:46.790730    2553 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-7dbcfbfd9-4j6ds" podUID="904b4100-985a-4f84-ae75-ae86d43ecf6f"
Oct  2 21:38:46.823628 kernel: audit: type=1104 audit(1696282726.173:1439): pid=7914 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success'
Oct  2 21:38:46.174000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-139.178.70.49:22-139.178.89.65:59994 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:38:48.794095 kubelet[2553]: E1002 21:38:48.793992    2553 pod_workers.go:1300] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-7djgt" podUID="96f60c96-bc95-4de5-a016-9864623478a6"
Oct  2 21:38:54.793309 kubelet[2553]: E1002 21:38:54.793244    2553 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-7dbcfbfd9-ts2w6" podUID="10aa136e-fcbb-47e7-b373-1b69bde373de"
Oct  2 21:38:54.952000 audit[2376]: AVC avc:  denied  { watch } for  pid=2376 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c698,c859 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 21:38:54.981026 kernel: kauditd_printk_skb: 1 callbacks suppressed
Oct  2 21:38:54.981072 kernel: audit: type=1400 audit(1696282734.952:1441): avc:  denied  { watch } for  pid=2376 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c698,c859 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 21:38:54.952000 audit[2376]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001952940 a2=fc6 a3=0 items=0 ppid=2239 pid=2376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c698,c859 key=(null)
Oct  2 21:38:55.191025 kernel: audit: type=1300 audit(1696282734.952:1441): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001952940 a2=fc6 a3=0 items=0 ppid=2239 pid=2376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c698,c859 key=(null)
Oct  2 21:38:55.191062 kernel: audit: type=1327 audit(1696282734.952:1441): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 21:38:54.952000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 21:38:54.956000 audit[2376]: AVC avc:  denied  { watch } for  pid=2376 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c698,c859 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 21:38:55.372899 kernel: audit: type=1400 audit(1696282734.956:1442): avc:  denied  { watch } for  pid=2376 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c698,c859 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 21:38:55.372932 kernel: audit: type=1300 audit(1696282734.956:1442): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001952960 a2=fc6 a3=0 items=0 ppid=2239 pid=2376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c698,c859 key=(null)
Oct  2 21:38:54.956000 audit[2376]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001952960 a2=fc6 a3=0 items=0 ppid=2239 pid=2376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c698,c859 key=(null)
Oct  2 21:38:55.492222 kernel: audit: type=1327 audit(1696282734.956:1442): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 21:38:54.956000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 21:38:54.958000 audit[2376]: AVC avc:  denied  { watch } for  pid=2376 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c698,c859 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 21:38:55.675174 kernel: audit: type=1400 audit(1696282734.958:1443): avc:  denied  { watch } for  pid=2376 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c698,c859 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 21:38:54.958000 audit[2376]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001bb9c60 a2=fc6 a3=0 items=0 ppid=2239 pid=2376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c698,c859 key=(null)
Oct  2 21:38:55.795348 kernel: audit: type=1300 audit(1696282734.958:1443): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001bb9c60 a2=fc6 a3=0 items=0 ppid=2239 pid=2376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c698,c859 key=(null)
Oct  2 21:38:55.795408 kernel: audit: type=1327 audit(1696282734.958:1443): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 21:38:54.958000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 21:38:54.958000 audit[2376]: AVC avc:  denied  { watch } for  pid=2376 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c698,c859 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 21:38:55.978248 kernel: audit: type=1400 audit(1696282734.958:1444): avc:  denied  { watch } for  pid=2376 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c698,c859 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0
Oct  2 21:38:54.958000 audit[2376]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001952980 a2=fc6 a3=0 items=0 ppid=2239 pid=2376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c698,c859 key=(null)
Oct  2 21:38:54.958000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269
Oct  2 21:38:56.184132 systemd[1]: Started sshd@10-139.178.70.49:22-139.178.89.65:44834.service.
Oct  2 21:38:56.182000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-139.178.70.49:22-139.178.89.65:44834 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:38:56.219846 sshd[8014]: Accepted publickey for core from 139.178.89.65 port 44834 ssh2: RSA SHA256:M4fPbwtaE29dxMxiSyaa1yIvxglYsCEa+0scmSZWaB4
Oct  2 21:38:56.218000 audit[8014]: USER_ACCT pid=8014 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success'
Oct  2 21:38:56.219000 audit[8014]: CRED_ACQ pid=8014 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success'
Oct  2 21:38:56.219000 audit[8014]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffec09e53c0 a2=3 a3=0 items=0 ppid=1 pid=8014 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:38:56.219000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D
Oct  2 21:38:56.220802 sshd[8014]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Oct  2 21:38:56.223983 systemd-logind[1445]: New session 12 of user core.
Oct  2 21:38:56.224665 systemd[1]: Started session-12.scope.
Oct  2 21:38:56.226000 audit[8014]: USER_START pid=8014 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success'
Oct  2 21:38:56.227000 audit[8016]: CRED_ACQ pid=8016 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success'
Oct  2 21:38:56.319675 sshd[8014]: pam_unix(sshd:session): session closed for user core
Oct  2 21:38:56.318000 audit[8014]: USER_END pid=8014 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success'
Oct  2 21:38:56.318000 audit[8014]: CRED_DISP pid=8014 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success'
Oct  2 21:38:56.321340 systemd[1]: sshd@10-139.178.70.49:22-139.178.89.65:44834.service: Deactivated successfully.
Oct  2 21:38:56.319000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-139.178.70.49:22-139.178.89.65:44834 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:38:56.321691 systemd[1]: session-12.scope: Deactivated successfully.
Oct  2 21:38:56.322060 systemd-logind[1445]: Session 12 logged out. Waiting for processes to exit.
Oct  2 21:38:56.322658 systemd[1]: Started sshd@11-139.178.70.49:22-139.178.89.65:44838.service.
Oct  2 21:38:56.321000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-139.178.70.49:22-139.178.89.65:44838 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:38:56.323064 systemd-logind[1445]: Removed session 12.
Oct  2 21:38:56.381000 audit[8040]: USER_ACCT pid=8040 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success'
Oct  2 21:38:56.383720 sshd[8040]: Accepted publickey for core from 139.178.89.65 port 44838 ssh2: RSA SHA256:M4fPbwtaE29dxMxiSyaa1yIvxglYsCEa+0scmSZWaB4
Oct  2 21:38:56.384000 audit[8040]: CRED_ACQ pid=8040 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success'
Oct  2 21:38:56.384000 audit[8040]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe1c6de540 a2=3 a3=0 items=0 ppid=1 pid=8040 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:38:56.384000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D
Oct  2 21:38:56.386554 sshd[8040]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Oct  2 21:38:56.396402 systemd-logind[1445]: New session 13 of user core.
Oct  2 21:38:56.398716 systemd[1]: Started session-13.scope.
Oct  2 21:38:56.412000 audit[8040]: USER_START pid=8040 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success'
Oct  2 21:38:56.415000 audit[8043]: CRED_ACQ pid=8043 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success'
Oct  2 21:38:56.640220 sshd[8040]: pam_unix(sshd:session): session closed for user core
Oct  2 21:38:56.639000 audit[8040]: USER_END pid=8040 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success'
Oct  2 21:38:56.639000 audit[8040]: CRED_DISP pid=8040 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success'
Oct  2 21:38:56.642185 systemd[1]: sshd@11-139.178.70.49:22-139.178.89.65:44838.service: Deactivated successfully.
Oct  2 21:38:56.640000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-139.178.70.49:22-139.178.89.65:44838 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:38:56.642633 systemd[1]: session-13.scope: Deactivated successfully.
Oct  2 21:38:56.643044 systemd-logind[1445]: Session 13 logged out. Waiting for processes to exit.
Oct  2 21:38:56.643813 systemd[1]: Started sshd@12-139.178.70.49:22-139.178.89.65:44842.service.
Oct  2 21:38:56.642000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-139.178.70.49:22-139.178.89.65:44842 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:38:56.644247 systemd-logind[1445]: Removed session 13.
Oct  2 21:38:56.730000 audit[8064]: USER_ACCT pid=8064 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success'
Oct  2 21:38:56.732040 sshd[8064]: Accepted publickey for core from 139.178.89.65 port 44842 ssh2: RSA SHA256:M4fPbwtaE29dxMxiSyaa1yIvxglYsCEa+0scmSZWaB4
Oct  2 21:38:56.732000 audit[8064]: CRED_ACQ pid=8064 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success'
Oct  2 21:38:56.732000 audit[8064]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdfcb489b0 a2=3 a3=0 items=0 ppid=1 pid=8064 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:38:56.732000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D
Oct  2 21:38:56.734196 sshd[8064]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Oct  2 21:38:56.741267 systemd-logind[1445]: New session 14 of user core.
Oct  2 21:38:56.743828 systemd[1]: Started session-14.scope.
Oct  2 21:38:56.751000 audit[8064]: USER_START pid=8064 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success'
Oct  2 21:38:56.754000 audit[8068]: CRED_ACQ pid=8068 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success'
Oct  2 21:38:56.884356 sshd[8064]: pam_unix(sshd:session): session closed for user core
Oct  2 21:38:56.884000 audit[8064]: USER_END pid=8064 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success'
Oct  2 21:38:56.885000 audit[8064]: CRED_DISP pid=8064 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success'
Oct  2 21:38:56.888798 systemd[1]: sshd@12-139.178.70.49:22-139.178.89.65:44842.service: Deactivated successfully.
Oct  2 21:38:56.887000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-139.178.70.49:22-139.178.89.65:44842 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:38:56.890225 systemd[1]: session-14.scope: Deactivated successfully.
Oct  2 21:38:56.891615 systemd-logind[1445]: Session 14 logged out. Waiting for processes to exit.
Oct  2 21:38:56.893268 systemd-logind[1445]: Removed session 14.
Oct  2 21:38:57.792906 kubelet[2553]: E1002 21:38:57.792843    2553 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-7dbcfbfd9-4j6ds" podUID="904b4100-985a-4f84-ae75-ae86d43ecf6f"
Oct  2 21:39:01.792066 kubelet[2553]: E1002 21:39:01.792040    2553 pod_workers.go:1300] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-7djgt" podUID="96f60c96-bc95-4de5-a016-9864623478a6"
Oct  2 21:39:06.893967 systemd[1]: Started sshd@13-139.178.70.49:22-139.178.89.65:34808.service.
Oct  2 21:39:06.892000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-139.178.70.49:22-139.178.89.65:34808 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:39:06.921022 kernel: kauditd_printk_skb: 35 callbacks suppressed
Oct  2 21:39:06.921145 kernel: audit: type=1130 audit(1696282746.892:1472): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-139.178.70.49:22-139.178.89.65:34808 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Oct  2 21:39:07.040865 sshd[8167]: Accepted publickey for core from 139.178.89.65 port 34808 ssh2: RSA SHA256:M4fPbwtaE29dxMxiSyaa1yIvxglYsCEa+0scmSZWaB4
Oct  2 21:39:07.039000 audit[8167]: USER_ACCT pid=8167 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success'
Oct  2 21:39:07.042774 sshd[8167]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Oct  2 21:39:07.045139 systemd-logind[1445]: New session 15 of user core.
Oct  2 21:39:07.045700 systemd[1]: Started session-15.scope.
Oct  2 21:39:07.126084 sshd[8167]: pam_unix(sshd:session): session closed for user core
Oct  2 21:39:07.127382 systemd[1]: sshd@13-139.178.70.49:22-139.178.89.65:34808.service: Deactivated successfully.
Oct  2 21:39:07.127915 systemd[1]: session-15.scope: Deactivated successfully.
Oct  2 21:39:07.128292 systemd-logind[1445]: Session 15 logged out. Waiting for processes to exit.
Oct  2 21:39:07.128842 systemd-logind[1445]: Removed session 15.
Oct  2 21:39:07.041000 audit[8167]: CRED_ACQ pid=8167 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success'
Oct  2 21:39:07.225272 kernel: audit: type=1101 audit(1696282747.039:1473): pid=8167 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success'
Oct  2 21:39:07.225340 kernel: audit: type=1103 audit(1696282747.041:1474): pid=8167 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success'
Oct  2 21:39:07.225376 kernel: audit: type=1006 audit(1696282747.041:1475): pid=8167 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1
Oct  2 21:39:07.041000 audit[8167]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd55239100 a2=3 a3=0 items=0 ppid=1 pid=8167 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:39:07.376234 kernel: audit: type=1300 audit(1696282747.041:1475): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd55239100 a2=3 a3=0 items=0 ppid=1 pid=8167 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null)
Oct  2 21:39:07.376291 kernel: audit: type=1327 audit(1696282747.041:1475): proctitle=737368643A20636F7265205B707269765D
Oct  2 21:39:07.041000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D
Oct  2 21:39:07.046000 audit[8167]: USER_START pid=8167 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success'
Oct  2 21:39:07.502227 kernel: audit: type=1105 audit(1696282747.046:1476): pid=8167 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success'
Oct  2 21:39:07.502265 kernel: audit: type=1103 audit(1696282747.047:1477): pid=8169 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success'
Oct  2 21:39:07.047000 audit[8169]: CRED_ACQ pid=8169 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success'
Oct  2 21:39:07.125000 audit[8167]: USER_END pid=8167 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success'
Oct  2 21:39:07.686828 kernel: audit: type=1106 audit(1696282747.125:1478): pid=8167 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success'
Oct  2 21:39:07.686878 kernel: audit: type=1104 audit(1696282747.125:1479): pid=8167 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success'
Oct  2 21:39:07.125000 audit[8167]: CRED_DISP pid=8167 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success'
Oct  2 21:39:07.126000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-139.178.70.49:22-139.178.89.65:34808 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'