Oct 2 18:47:29.154349 kernel: Booting Linux on physical CPU 0x0000000000 [0x410fd083] Oct 2 18:47:29.154386 kernel: Linux version 5.15.132-flatcar (build@pony-truck.infra.kinvolk.io) (aarch64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP PREEMPT Mon Oct 2 17:55:37 -00 2023 Oct 2 18:47:29.154409 kernel: efi: EFI v2.70 by EDK II Oct 2 18:47:29.154424 kernel: efi: SMBIOS=0x7bed0000 SMBIOS 3.0=0x7beb0000 ACPI=0x786e0000 ACPI 2.0=0x786e0014 MEMATTR=0x7ac1aa98 MEMRESERVE=0x71accf98 Oct 2 18:47:29.154437 kernel: ACPI: Early table checksum verification disabled Oct 2 18:47:29.154451 kernel: ACPI: RSDP 0x00000000786E0014 000024 (v02 AMAZON) Oct 2 18:47:29.154467 kernel: ACPI: XSDT 0x00000000786D00E8 000064 (v01 AMAZON AMZNFACP 00000001 01000013) Oct 2 18:47:29.154481 kernel: ACPI: FACP 0x00000000786B0000 000114 (v06 AMAZON AMZNFACP 00000001 AMZN 00000001) Oct 2 18:47:29.154494 kernel: ACPI: DSDT 0x0000000078640000 00154F (v02 AMAZON AMZNDSDT 00000001 INTL 20160527) Oct 2 18:47:29.154508 kernel: ACPI: APIC 0x00000000786C0000 000108 (v04 AMAZON AMZNAPIC 00000001 AMZN 00000001) Oct 2 18:47:29.154526 kernel: ACPI: SPCR 0x00000000786A0000 000050 (v02 AMAZON AMZNSPCR 00000001 AMZN 00000001) Oct 2 18:47:29.154539 kernel: ACPI: GTDT 0x0000000078690000 000060 (v02 AMAZON AMZNGTDT 00000001 AMZN 00000001) Oct 2 18:47:29.154553 kernel: ACPI: MCFG 0x0000000078680000 00003C (v02 AMAZON AMZNMCFG 00000001 AMZN 00000001) Oct 2 18:47:29.154566 kernel: ACPI: SLIT 0x0000000078670000 00002D (v01 AMAZON AMZNSLIT 00000001 AMZN 00000001) Oct 2 18:47:29.154583 kernel: ACPI: IORT 0x0000000078660000 000078 (v01 AMAZON AMZNIORT 00000001 AMZN 00000001) Oct 2 18:47:29.154601 kernel: ACPI: PPTT 0x0000000078650000 0000EC (v01 AMAZON AMZNPPTT 00000001 AMZN 00000001) Oct 2 18:47:29.154616 kernel: ACPI: SPCR: console: uart,mmio,0x90a0000,115200 Oct 2 18:47:29.154630 kernel: earlycon: uart0 at MMIO 0x00000000090a0000 (options '115200') Oct 2 18:47:29.154644 kernel: printk: bootconsole [uart0] enabled Oct 2 18:47:29.154659 kernel: NUMA: Failed to initialise from firmware Oct 2 18:47:29.154673 kernel: NUMA: Faking a node at [mem 0x0000000040000000-0x00000004b5ffffff] Oct 2 18:47:29.154688 kernel: NUMA: NODE_DATA [mem 0x4b5841900-0x4b5846fff] Oct 2 18:47:29.154702 kernel: Zone ranges: Oct 2 18:47:29.154717 kernel: DMA [mem 0x0000000040000000-0x00000000ffffffff] Oct 2 18:47:29.154731 kernel: DMA32 empty Oct 2 18:47:29.155017 kernel: Normal [mem 0x0000000100000000-0x00000004b5ffffff] Oct 2 18:47:29.167138 kernel: Movable zone start for each node Oct 2 18:47:29.167169 kernel: Early memory node ranges Oct 2 18:47:29.167185 kernel: node 0: [mem 0x0000000040000000-0x00000000786effff] Oct 2 18:47:29.167200 kernel: node 0: [mem 0x00000000786f0000-0x000000007872ffff] Oct 2 18:47:29.167214 kernel: node 0: [mem 0x0000000078730000-0x000000007bbfffff] Oct 2 18:47:29.167229 kernel: node 0: [mem 0x000000007bc00000-0x000000007bfdffff] Oct 2 18:47:29.167243 kernel: node 0: [mem 0x000000007bfe0000-0x000000007fffffff] Oct 2 18:47:29.167257 kernel: node 0: [mem 0x0000000400000000-0x00000004b5ffffff] Oct 2 18:47:29.167272 kernel: Initmem setup node 0 [mem 0x0000000040000000-0x00000004b5ffffff] Oct 2 18:47:29.167286 kernel: On node 0, zone Normal: 8192 pages in unavailable ranges Oct 2 18:47:29.167301 kernel: psci: probing for conduit method from ACPI. Oct 2 18:47:29.167315 kernel: psci: PSCIv1.0 detected in firmware. Oct 2 18:47:29.167338 kernel: psci: Using standard PSCI v0.2 function IDs Oct 2 18:47:29.167353 kernel: psci: Trusted OS migration not required Oct 2 18:47:29.167374 kernel: psci: SMC Calling Convention v1.1 Oct 2 18:47:29.167389 kernel: ACPI: SRAT not present Oct 2 18:47:29.167405 kernel: percpu: Embedded 29 pages/cpu s79960 r8192 d30632 u118784 Oct 2 18:47:29.167424 kernel: pcpu-alloc: s79960 r8192 d30632 u118784 alloc=29*4096 Oct 2 18:47:29.167440 kernel: pcpu-alloc: [0] 0 [0] 1 Oct 2 18:47:29.167455 kernel: Detected PIPT I-cache on CPU0 Oct 2 18:47:29.167470 kernel: CPU features: detected: GIC system register CPU interface Oct 2 18:47:29.167485 kernel: CPU features: detected: Spectre-v2 Oct 2 18:47:29.167501 kernel: CPU features: detected: Spectre-v3a Oct 2 18:47:29.167515 kernel: CPU features: detected: Spectre-BHB Oct 2 18:47:29.167530 kernel: CPU features: kernel page table isolation forced ON by KASLR Oct 2 18:47:29.167545 kernel: CPU features: detected: Kernel page table isolation (KPTI) Oct 2 18:47:29.167560 kernel: CPU features: detected: ARM erratum 1742098 Oct 2 18:47:29.167575 kernel: CPU features: detected: ARM errata 1165522, 1319367, or 1530923 Oct 2 18:47:29.167594 kernel: Built 1 zonelists, mobility grouping on. Total pages: 991872 Oct 2 18:47:29.167610 kernel: Policy zone: Normal Oct 2 18:47:29.167627 kernel: Kernel command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlycon flatcar.first_boot=detected acpi=force flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=684fe6a2259d7fb96810743ab87aaaa03d9f185b113bd6990a64d1079e5672ca Oct 2 18:47:29.167644 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Oct 2 18:47:29.167659 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Oct 2 18:47:29.167674 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Oct 2 18:47:29.167690 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Oct 2 18:47:29.167705 kernel: software IO TLB: mapped [mem 0x000000007c000000-0x0000000080000000] (64MB) Oct 2 18:47:29.167722 kernel: Memory: 3826444K/4030464K available (9792K kernel code, 2092K rwdata, 7548K rodata, 34560K init, 779K bss, 204020K reserved, 0K cma-reserved) Oct 2 18:47:29.167738 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Oct 2 18:47:29.167756 kernel: trace event string verifier disabled Oct 2 18:47:29.167772 kernel: rcu: Preemptible hierarchical RCU implementation. Oct 2 18:47:29.167788 kernel: rcu: RCU event tracing is enabled. Oct 2 18:47:29.167803 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Oct 2 18:47:29.167818 kernel: Trampoline variant of Tasks RCU enabled. Oct 2 18:47:29.167834 kernel: Tracing variant of Tasks RCU enabled. Oct 2 18:47:29.167849 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Oct 2 18:47:29.167864 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Oct 2 18:47:29.167879 kernel: NR_IRQS: 64, nr_irqs: 64, preallocated irqs: 0 Oct 2 18:47:29.167894 kernel: GICv3: 96 SPIs implemented Oct 2 18:47:29.167909 kernel: GICv3: 0 Extended SPIs implemented Oct 2 18:47:29.167924 kernel: GICv3: Distributor has no Range Selector support Oct 2 18:47:29.167943 kernel: Root IRQ handler: gic_handle_irq Oct 2 18:47:29.167958 kernel: GICv3: 16 PPIs implemented Oct 2 18:47:29.167973 kernel: GICv3: CPU0: found redistributor 0 region 0:0x0000000010200000 Oct 2 18:47:29.167988 kernel: ACPI: SRAT not present Oct 2 18:47:29.168002 kernel: ITS [mem 0x10080000-0x1009ffff] Oct 2 18:47:29.168017 kernel: ITS@0x0000000010080000: allocated 8192 Devices @4000a0000 (indirect, esz 8, psz 64K, shr 1) Oct 2 18:47:29.168033 kernel: ITS@0x0000000010080000: allocated 8192 Interrupt Collections @4000b0000 (flat, esz 8, psz 64K, shr 1) Oct 2 18:47:29.168048 kernel: GICv3: using LPI property table @0x00000004000c0000 Oct 2 18:47:29.168064 kernel: ITS: Using hypervisor restricted LPI range [128] Oct 2 18:47:29.168116 kernel: GICv3: CPU0: using allocated LPI pending table @0x00000004000d0000 Oct 2 18:47:29.168135 kernel: arch_timer: cp15 timer(s) running at 83.33MHz (virt). Oct 2 18:47:29.168156 kernel: clocksource: arch_sys_counter: mask: 0xffffffffffffff max_cycles: 0x13381ebeec, max_idle_ns: 440795203145 ns Oct 2 18:47:29.168172 kernel: sched_clock: 56 bits at 83MHz, resolution 12ns, wraps every 4398046511100ns Oct 2 18:47:29.168187 kernel: Console: colour dummy device 80x25 Oct 2 18:47:29.168203 kernel: printk: console [tty1] enabled Oct 2 18:47:29.168218 kernel: ACPI: Core revision 20210730 Oct 2 18:47:29.168234 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 166.66 BogoMIPS (lpj=83333) Oct 2 18:47:29.168250 kernel: pid_max: default: 32768 minimum: 301 Oct 2 18:47:29.168266 kernel: LSM: Security Framework initializing Oct 2 18:47:29.168281 kernel: SELinux: Initializing. Oct 2 18:47:29.168297 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Oct 2 18:47:29.168317 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Oct 2 18:47:29.168332 kernel: rcu: Hierarchical SRCU implementation. Oct 2 18:47:29.168347 kernel: Platform MSI: ITS@0x10080000 domain created Oct 2 18:47:29.168363 kernel: PCI/MSI: ITS@0x10080000 domain created Oct 2 18:47:29.168378 kernel: Remapping and enabling EFI services. Oct 2 18:47:29.168393 kernel: smp: Bringing up secondary CPUs ... Oct 2 18:47:29.168409 kernel: Detected PIPT I-cache on CPU1 Oct 2 18:47:29.168424 kernel: GICv3: CPU1: found redistributor 1 region 0:0x0000000010220000 Oct 2 18:47:29.168440 kernel: GICv3: CPU1: using allocated LPI pending table @0x00000004000e0000 Oct 2 18:47:29.168459 kernel: CPU1: Booted secondary processor 0x0000000001 [0x410fd083] Oct 2 18:47:29.168475 kernel: smp: Brought up 1 node, 2 CPUs Oct 2 18:47:29.168490 kernel: SMP: Total of 2 processors activated. Oct 2 18:47:29.168505 kernel: CPU features: detected: 32-bit EL0 Support Oct 2 18:47:29.168520 kernel: CPU features: detected: 32-bit EL1 Support Oct 2 18:47:29.168536 kernel: CPU features: detected: CRC32 instructions Oct 2 18:47:29.168551 kernel: CPU: All CPU(s) started at EL1 Oct 2 18:47:29.168566 kernel: alternatives: patching kernel code Oct 2 18:47:29.168581 kernel: devtmpfs: initialized Oct 2 18:47:29.168600 kernel: KASLR disabled due to lack of seed Oct 2 18:47:29.168615 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Oct 2 18:47:29.168631 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Oct 2 18:47:29.168657 kernel: pinctrl core: initialized pinctrl subsystem Oct 2 18:47:29.168676 kernel: SMBIOS 3.0.0 present. Oct 2 18:47:29.168693 kernel: DMI: Amazon EC2 a1.large/, BIOS 1.0 11/1/2018 Oct 2 18:47:29.168709 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Oct 2 18:47:29.168725 kernel: DMA: preallocated 512 KiB GFP_KERNEL pool for atomic allocations Oct 2 18:47:29.168741 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations Oct 2 18:47:29.168757 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations Oct 2 18:47:29.168773 kernel: audit: initializing netlink subsys (disabled) Oct 2 18:47:29.168789 kernel: audit: type=2000 audit(0.247:1): state=initialized audit_enabled=0 res=1 Oct 2 18:47:29.168809 kernel: thermal_sys: Registered thermal governor 'step_wise' Oct 2 18:47:29.168825 kernel: cpuidle: using governor menu Oct 2 18:47:29.168841 kernel: hw-breakpoint: found 6 breakpoint and 4 watchpoint registers. Oct 2 18:47:29.168857 kernel: ASID allocator initialised with 32768 entries Oct 2 18:47:29.168873 kernel: ACPI: bus type PCI registered Oct 2 18:47:29.168893 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Oct 2 18:47:29.168909 kernel: Serial: AMBA PL011 UART driver Oct 2 18:47:29.168925 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Oct 2 18:47:29.168941 kernel: HugeTLB registered 32.0 MiB page size, pre-allocated 0 pages Oct 2 18:47:29.168957 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Oct 2 18:47:29.168973 kernel: HugeTLB registered 64.0 KiB page size, pre-allocated 0 pages Oct 2 18:47:29.168989 kernel: cryptd: max_cpu_qlen set to 1000 Oct 2 18:47:29.169005 kernel: alg: No test for fips(ansi_cprng) (fips_ansi_cprng) Oct 2 18:47:29.169021 kernel: ACPI: Added _OSI(Module Device) Oct 2 18:47:29.169041 kernel: ACPI: Added _OSI(Processor Device) Oct 2 18:47:29.169057 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Oct 2 18:47:29.169073 kernel: ACPI: Added _OSI(Processor Aggregator Device) Oct 2 18:47:29.169150 kernel: ACPI: Added _OSI(Linux-Dell-Video) Oct 2 18:47:29.169172 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Oct 2 18:47:29.169189 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Oct 2 18:47:29.169205 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Oct 2 18:47:29.169222 kernel: ACPI: Interpreter enabled Oct 2 18:47:29.169238 kernel: ACPI: Using GIC for interrupt routing Oct 2 18:47:29.169259 kernel: ACPI: MCFG table detected, 1 entries Oct 2 18:47:29.169275 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-0f]) Oct 2 18:47:29.169676 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Oct 2 18:47:29.169873 kernel: acpi PNP0A08:00: _OSC: platform does not support [LTR] Oct 2 18:47:29.170063 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME AER PCIeCapability] Oct 2 18:47:29.174403 kernel: acpi PNP0A08:00: ECAM area [mem 0x20000000-0x20ffffff] reserved by PNP0C02:00 Oct 2 18:47:29.174654 kernel: acpi PNP0A08:00: ECAM at [mem 0x20000000-0x20ffffff] for [bus 00-0f] Oct 2 18:47:29.174697 kernel: ACPI: Remapped I/O 0x000000001fff0000 to [io 0x0000-0xffff window] Oct 2 18:47:29.174717 kernel: acpiphp: Slot [1] registered Oct 2 18:47:29.174747 kernel: acpiphp: Slot [2] registered Oct 2 18:47:29.174769 kernel: acpiphp: Slot [3] registered Oct 2 18:47:29.174786 kernel: acpiphp: Slot [4] registered Oct 2 18:47:29.174803 kernel: acpiphp: Slot [5] registered Oct 2 18:47:29.174819 kernel: acpiphp: Slot [6] registered Oct 2 18:47:29.174835 kernel: acpiphp: Slot [7] registered Oct 2 18:47:29.174851 kernel: acpiphp: Slot [8] registered Oct 2 18:47:29.174872 kernel: acpiphp: Slot [9] registered Oct 2 18:47:29.174888 kernel: acpiphp: Slot [10] registered Oct 2 18:47:29.174904 kernel: acpiphp: Slot [11] registered Oct 2 18:47:29.174920 kernel: acpiphp: Slot [12] registered Oct 2 18:47:29.174937 kernel: acpiphp: Slot [13] registered Oct 2 18:47:29.174953 kernel: acpiphp: Slot [14] registered Oct 2 18:47:29.174969 kernel: acpiphp: Slot [15] registered Oct 2 18:47:29.174985 kernel: acpiphp: Slot [16] registered Oct 2 18:47:29.175001 kernel: acpiphp: Slot [17] registered Oct 2 18:47:29.175017 kernel: acpiphp: Slot [18] registered Oct 2 18:47:29.175037 kernel: acpiphp: Slot [19] registered Oct 2 18:47:29.175053 kernel: acpiphp: Slot [20] registered Oct 2 18:47:29.175069 kernel: acpiphp: Slot [21] registered Oct 2 18:47:29.175122 kernel: acpiphp: Slot [22] registered Oct 2 18:47:29.175142 kernel: acpiphp: Slot [23] registered Oct 2 18:47:29.175159 kernel: acpiphp: Slot [24] registered Oct 2 18:47:29.175175 kernel: acpiphp: Slot [25] registered Oct 2 18:47:29.175191 kernel: acpiphp: Slot [26] registered Oct 2 18:47:29.175207 kernel: acpiphp: Slot [27] registered Oct 2 18:47:29.175227 kernel: acpiphp: Slot [28] registered Oct 2 18:47:29.175244 kernel: acpiphp: Slot [29] registered Oct 2 18:47:29.175260 kernel: acpiphp: Slot [30] registered Oct 2 18:47:29.175275 kernel: acpiphp: Slot [31] registered Oct 2 18:47:29.175291 kernel: PCI host bridge to bus 0000:00 Oct 2 18:47:29.175495 kernel: pci_bus 0000:00: root bus resource [mem 0x80000000-0xffffffff window] Oct 2 18:47:29.175675 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0xffff window] Oct 2 18:47:29.175851 kernel: pci_bus 0000:00: root bus resource [mem 0x400000000000-0x407fffffffff window] Oct 2 18:47:29.176030 kernel: pci_bus 0000:00: root bus resource [bus 00-0f] Oct 2 18:47:29.176738 kernel: pci 0000:00:00.0: [1d0f:0200] type 00 class 0x060000 Oct 2 18:47:29.176958 kernel: pci 0000:00:01.0: [1d0f:8250] type 00 class 0x070003 Oct 2 18:47:29.178027 kernel: pci 0000:00:01.0: reg 0x10: [mem 0x80118000-0x80118fff] Oct 2 18:47:29.188137 kernel: pci 0000:00:04.0: [1d0f:8061] type 00 class 0x010802 Oct 2 18:47:29.188374 kernel: pci 0000:00:04.0: reg 0x10: [mem 0x80114000-0x80117fff] Oct 2 18:47:29.188583 kernel: pci 0000:00:04.0: PME# supported from D0 D1 D2 D3hot D3cold Oct 2 18:47:29.188794 kernel: pci 0000:00:05.0: [1d0f:ec20] type 00 class 0x020000 Oct 2 18:47:29.188997 kernel: pci 0000:00:05.0: reg 0x10: [mem 0x80110000-0x80113fff] Oct 2 18:47:29.189269 kernel: pci 0000:00:05.0: reg 0x18: [mem 0x80000000-0x800fffff pref] Oct 2 18:47:29.189468 kernel: pci 0000:00:05.0: reg 0x20: [mem 0x80100000-0x8010ffff] Oct 2 18:47:29.189663 kernel: pci 0000:00:05.0: PME# supported from D0 D1 D2 D3hot D3cold Oct 2 18:47:29.189857 kernel: pci 0000:00:05.0: BAR 2: assigned [mem 0x80000000-0x800fffff pref] Oct 2 18:47:29.190056 kernel: pci 0000:00:05.0: BAR 4: assigned [mem 0x80100000-0x8010ffff] Oct 2 18:47:29.190271 kernel: pci 0000:00:04.0: BAR 0: assigned [mem 0x80110000-0x80113fff] Oct 2 18:47:29.190464 kernel: pci 0000:00:05.0: BAR 0: assigned [mem 0x80114000-0x80117fff] Oct 2 18:47:29.190663 kernel: pci 0000:00:01.0: BAR 0: assigned [mem 0x80118000-0x80118fff] Oct 2 18:47:29.190866 kernel: pci_bus 0000:00: resource 4 [mem 0x80000000-0xffffffff window] Oct 2 18:47:29.191050 kernel: pci_bus 0000:00: resource 5 [io 0x0000-0xffff window] Oct 2 18:47:29.193287 kernel: pci_bus 0000:00: resource 6 [mem 0x400000000000-0x407fffffffff window] Oct 2 18:47:29.193324 kernel: ACPI: PCI: Interrupt link GSI0 configured for IRQ 35 Oct 2 18:47:29.193342 kernel: ACPI: PCI: Interrupt link GSI1 configured for IRQ 36 Oct 2 18:47:29.193360 kernel: ACPI: PCI: Interrupt link GSI2 configured for IRQ 37 Oct 2 18:47:29.193377 kernel: ACPI: PCI: Interrupt link GSI3 configured for IRQ 38 Oct 2 18:47:29.193393 kernel: iommu: Default domain type: Translated Oct 2 18:47:29.193409 kernel: iommu: DMA domain TLB invalidation policy: strict mode Oct 2 18:47:29.193426 kernel: vgaarb: loaded Oct 2 18:47:29.193442 kernel: pps_core: LinuxPPS API ver. 1 registered Oct 2 18:47:29.193458 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Oct 2 18:47:29.193478 kernel: PTP clock support registered Oct 2 18:47:29.193495 kernel: Registered efivars operations Oct 2 18:47:29.193512 kernel: clocksource: Switched to clocksource arch_sys_counter Oct 2 18:47:29.193528 kernel: VFS: Disk quotas dquot_6.6.0 Oct 2 18:47:29.193545 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Oct 2 18:47:29.193561 kernel: pnp: PnP ACPI init Oct 2 18:47:29.193775 kernel: system 00:00: [mem 0x20000000-0x2fffffff] could not be reserved Oct 2 18:47:29.193799 kernel: pnp: PnP ACPI: found 1 devices Oct 2 18:47:29.193816 kernel: NET: Registered PF_INET protocol family Oct 2 18:47:29.193837 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) Oct 2 18:47:29.193854 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) Oct 2 18:47:29.193870 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Oct 2 18:47:29.193886 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) Oct 2 18:47:29.193902 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) Oct 2 18:47:29.193919 kernel: TCP: Hash tables configured (established 32768 bind 32768) Oct 2 18:47:29.193935 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) Oct 2 18:47:29.193951 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) Oct 2 18:47:29.193967 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Oct 2 18:47:29.193988 kernel: PCI: CLS 0 bytes, default 64 Oct 2 18:47:29.194004 kernel: hw perfevents: enabled with armv8_pmuv3_0 PMU driver, 3 counters available Oct 2 18:47:29.194020 kernel: kvm [1]: HYP mode not available Oct 2 18:47:29.194036 kernel: Initialise system trusted keyrings Oct 2 18:47:29.194052 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 Oct 2 18:47:29.194069 kernel: Key type asymmetric registered Oct 2 18:47:29.194621 kernel: Asymmetric key parser 'x509' registered Oct 2 18:47:29.194642 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Oct 2 18:47:29.194659 kernel: io scheduler mq-deadline registered Oct 2 18:47:29.194682 kernel: io scheduler kyber registered Oct 2 18:47:29.194699 kernel: io scheduler bfq registered Oct 2 18:47:29.194944 kernel: pl061_gpio ARMH0061:00: PL061 GPIO chip registered Oct 2 18:47:29.194972 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0C:00/input/input0 Oct 2 18:47:29.194989 kernel: ACPI: button: Power Button [PWRB] Oct 2 18:47:29.195006 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Oct 2 18:47:29.195023 kernel: ACPI: \_SB_.PCI0.GSI2: Enabled at IRQ 37 Oct 2 18:47:29.199330 kernel: serial 0000:00:01.0: enabling device (0010 -> 0012) Oct 2 18:47:29.199383 kernel: printk: console [ttyS0] disabled Oct 2 18:47:29.199402 kernel: 0000:00:01.0: ttyS0 at MMIO 0x80118000 (irq = 14, base_baud = 115200) is a 16550A Oct 2 18:47:29.199419 kernel: printk: console [ttyS0] enabled Oct 2 18:47:29.199436 kernel: printk: bootconsole [uart0] disabled Oct 2 18:47:29.199452 kernel: thunder_xcv, ver 1.0 Oct 2 18:47:29.199468 kernel: thunder_bgx, ver 1.0 Oct 2 18:47:29.199484 kernel: nicpf, ver 1.0 Oct 2 18:47:29.199500 kernel: nicvf, ver 1.0 Oct 2 18:47:29.199713 kernel: rtc-efi rtc-efi.0: registered as rtc0 Oct 2 18:47:29.199905 kernel: rtc-efi rtc-efi.0: setting system clock to 2023-10-02T18:47:28 UTC (1696272448) Oct 2 18:47:29.199929 kernel: hid: raw HID events driver (C) Jiri Kosina Oct 2 18:47:29.199946 kernel: NET: Registered PF_INET6 protocol family Oct 2 18:47:29.199963 kernel: Segment Routing with IPv6 Oct 2 18:47:29.199979 kernel: In-situ OAM (IOAM) with IPv6 Oct 2 18:47:29.199995 kernel: NET: Registered PF_PACKET protocol family Oct 2 18:47:29.200012 kernel: Key type dns_resolver registered Oct 2 18:47:29.200028 kernel: registered taskstats version 1 Oct 2 18:47:29.200050 kernel: Loading compiled-in X.509 certificates Oct 2 18:47:29.200067 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.132-flatcar: 3a2a38edc68cb70dc60ec0223a6460557b3bb28d' Oct 2 18:47:29.200121 kernel: Key type .fscrypt registered Oct 2 18:47:29.200141 kernel: Key type fscrypt-provisioning registered Oct 2 18:47:29.200157 kernel: ima: No TPM chip found, activating TPM-bypass! Oct 2 18:47:29.200174 kernel: ima: Allocated hash algorithm: sha1 Oct 2 18:47:29.200190 kernel: ima: No architecture policies found Oct 2 18:47:29.200206 kernel: Freeing unused kernel memory: 34560K Oct 2 18:47:29.200222 kernel: Run /init as init process Oct 2 18:47:29.200243 kernel: with arguments: Oct 2 18:47:29.200259 kernel: /init Oct 2 18:47:29.200275 kernel: with environment: Oct 2 18:47:29.200290 kernel: HOME=/ Oct 2 18:47:29.200306 kernel: TERM=linux Oct 2 18:47:29.200322 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Oct 2 18:47:29.200344 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Oct 2 18:47:29.200366 systemd[1]: Detected virtualization amazon. Oct 2 18:47:29.200389 systemd[1]: Detected architecture arm64. Oct 2 18:47:29.200407 systemd[1]: Running in initrd. Oct 2 18:47:29.200425 systemd[1]: No hostname configured, using default hostname. Oct 2 18:47:29.200443 systemd[1]: Hostname set to . Oct 2 18:47:29.200462 systemd[1]: Initializing machine ID from VM UUID. Oct 2 18:47:29.200479 systemd[1]: Queued start job for default target initrd.target. Oct 2 18:47:29.200497 systemd[1]: Started systemd-ask-password-console.path. Oct 2 18:47:29.200524 systemd[1]: Reached target cryptsetup.target. Oct 2 18:47:29.200545 systemd[1]: Reached target paths.target. Oct 2 18:47:29.200563 systemd[1]: Reached target slices.target. Oct 2 18:47:29.200581 systemd[1]: Reached target swap.target. Oct 2 18:47:29.200598 systemd[1]: Reached target timers.target. Oct 2 18:47:29.200617 systemd[1]: Listening on iscsid.socket. Oct 2 18:47:29.200635 systemd[1]: Listening on iscsiuio.socket. Oct 2 18:47:29.200653 systemd[1]: Listening on systemd-journald-audit.socket. Oct 2 18:47:29.200671 systemd[1]: Listening on systemd-journald-dev-log.socket. Oct 2 18:47:29.200694 systemd[1]: Listening on systemd-journald.socket. Oct 2 18:47:29.200712 systemd[1]: Listening on systemd-networkd.socket. Oct 2 18:47:29.200730 systemd[1]: Listening on systemd-udevd-control.socket. Oct 2 18:47:29.200748 systemd[1]: Listening on systemd-udevd-kernel.socket. Oct 2 18:47:29.200765 systemd[1]: Reached target sockets.target. Oct 2 18:47:29.200784 systemd[1]: Starting kmod-static-nodes.service... Oct 2 18:47:29.200801 systemd[1]: Finished network-cleanup.service. Oct 2 18:47:29.200819 systemd[1]: Starting systemd-fsck-usr.service... Oct 2 18:47:29.200837 systemd[1]: Starting systemd-journald.service... Oct 2 18:47:29.200859 systemd[1]: Starting systemd-modules-load.service... Oct 2 18:47:29.200877 systemd[1]: Starting systemd-resolved.service... Oct 2 18:47:29.200894 systemd[1]: Starting systemd-vconsole-setup.service... Oct 2 18:47:29.200912 systemd[1]: Finished kmod-static-nodes.service. Oct 2 18:47:29.200930 systemd[1]: Finished systemd-fsck-usr.service. Oct 2 18:47:29.200948 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Oct 2 18:47:29.200965 systemd[1]: Finished systemd-vconsole-setup.service. Oct 2 18:47:29.200984 kernel: audit: type=1130 audit(1696272449.155:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:47:29.201007 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Oct 2 18:47:29.201026 kernel: audit: type=1130 audit(1696272449.177:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:47:29.201043 systemd[1]: Starting dracut-cmdline-ask.service... Oct 2 18:47:29.201065 systemd-journald[308]: Journal started Oct 2 18:47:29.201175 systemd-journald[308]: Runtime Journal (/run/log/journal/ec270735e2145a670dde865e07a6c36f) is 8.0M, max 75.4M, 67.4M free. Oct 2 18:47:29.155000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:47:29.177000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:47:29.144185 systemd-modules-load[309]: Inserted module 'overlay' Oct 2 18:47:29.216832 systemd[1]: Started systemd-journald.service. Oct 2 18:47:29.216903 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Oct 2 18:47:29.215000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:47:29.226103 kernel: audit: type=1130 audit(1696272449.215:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:47:29.230986 systemd-modules-load[309]: Inserted module 'br_netfilter' Oct 2 18:47:29.231420 kernel: Bridge firewalling registered Oct 2 18:47:29.233805 systemd-resolved[310]: Positive Trust Anchors: Oct 2 18:47:29.233836 systemd-resolved[310]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Oct 2 18:47:29.233894 systemd-resolved[310]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Oct 2 18:47:29.253143 kernel: SCSI subsystem initialized Oct 2 18:47:29.272175 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Oct 2 18:47:29.272247 kernel: device-mapper: uevent: version 1.0.3 Oct 2 18:47:29.280113 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Oct 2 18:47:29.284469 systemd[1]: Finished dracut-cmdline-ask.service. Oct 2 18:47:29.285000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:47:29.296113 kernel: audit: type=1130 audit(1696272449.285:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:47:29.296364 systemd-modules-load[309]: Inserted module 'dm_multipath' Oct 2 18:47:29.296793 systemd[1]: Starting dracut-cmdline.service... Oct 2 18:47:29.306000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:47:29.301739 systemd[1]: Finished systemd-modules-load.service. Oct 2 18:47:29.318879 systemd[1]: Starting systemd-sysctl.service... Oct 2 18:47:29.324460 kernel: audit: type=1130 audit(1696272449.306:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:47:29.354711 dracut-cmdline[327]: dracut-dracut-053 Oct 2 18:47:29.365474 systemd[1]: Finished systemd-sysctl.service. Oct 2 18:47:29.367000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:47:29.369482 dracut-cmdline[327]: Using kernel command line parameters: rd.driver.pre=btrfs BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlycon flatcar.first_boot=detected acpi=force flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=684fe6a2259d7fb96810743ab87aaaa03d9f185b113bd6990a64d1079e5672ca Oct 2 18:47:29.392114 kernel: audit: type=1130 audit(1696272449.367:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:47:29.595108 kernel: Loading iSCSI transport class v2.0-870. Oct 2 18:47:29.606109 kernel: iscsi: registered transport (tcp) Oct 2 18:47:29.632639 kernel: iscsi: registered transport (qla4xxx) Oct 2 18:47:29.632709 kernel: QLogic iSCSI HBA Driver Oct 2 18:47:29.799114 kernel: random: crng init done Oct 2 18:47:29.799229 systemd-resolved[310]: Defaulting to hostname 'linux'. Oct 2 18:47:29.803000 systemd[1]: Started systemd-resolved.service. Oct 2 18:47:29.803000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:47:29.804940 systemd[1]: Reached target nss-lookup.target. Oct 2 18:47:29.817121 kernel: audit: type=1130 audit(1696272449.803:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:47:29.860576 systemd[1]: Finished dracut-cmdline.service. Oct 2 18:47:29.865263 systemd[1]: Starting dracut-pre-udev.service... Oct 2 18:47:29.862000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:47:29.888104 kernel: audit: type=1130 audit(1696272449.862:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:47:29.962130 kernel: raid6: neonx8 gen() 6410 MB/s Oct 2 18:47:29.977109 kernel: raid6: neonx8 xor() 4715 MB/s Oct 2 18:47:29.995111 kernel: raid6: neonx4 gen() 6518 MB/s Oct 2 18:47:30.013111 kernel: raid6: neonx4 xor() 4902 MB/s Oct 2 18:47:30.031109 kernel: raid6: neonx2 gen() 5777 MB/s Oct 2 18:47:30.049111 kernel: raid6: neonx2 xor() 4502 MB/s Oct 2 18:47:30.067109 kernel: raid6: neonx1 gen() 4489 MB/s Oct 2 18:47:30.085111 kernel: raid6: neonx1 xor() 3681 MB/s Oct 2 18:47:30.103110 kernel: raid6: int64x8 gen() 3432 MB/s Oct 2 18:47:30.121110 kernel: raid6: int64x8 xor() 2092 MB/s Oct 2 18:47:30.139109 kernel: raid6: int64x4 gen() 3837 MB/s Oct 2 18:47:30.157111 kernel: raid6: int64x4 xor() 2202 MB/s Oct 2 18:47:30.175110 kernel: raid6: int64x2 gen() 3612 MB/s Oct 2 18:47:30.193110 kernel: raid6: int64x2 xor() 1954 MB/s Oct 2 18:47:30.211110 kernel: raid6: int64x1 gen() 2770 MB/s Oct 2 18:47:30.230669 kernel: raid6: int64x1 xor() 1455 MB/s Oct 2 18:47:30.230698 kernel: raid6: using algorithm neonx4 gen() 6518 MB/s Oct 2 18:47:30.230721 kernel: raid6: .... xor() 4902 MB/s, rmw enabled Oct 2 18:47:30.232526 kernel: raid6: using neon recovery algorithm Oct 2 18:47:30.251116 kernel: xor: measuring software checksum speed Oct 2 18:47:30.254110 kernel: 8regs : 9335 MB/sec Oct 2 18:47:30.256111 kernel: 32regs : 11107 MB/sec Oct 2 18:47:30.260358 kernel: arm64_neon : 9575 MB/sec Oct 2 18:47:30.260388 kernel: xor: using function: 32regs (11107 MB/sec) Oct 2 18:47:30.350133 kernel: Btrfs loaded, crc32c=crc32c-generic, zoned=no, fsverity=no Oct 2 18:47:30.388221 systemd[1]: Finished dracut-pre-udev.service. Oct 2 18:47:30.388000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:47:30.399134 kernel: audit: type=1130 audit(1696272450.388:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:47:30.398000 audit: BPF prog-id=7 op=LOAD Oct 2 18:47:30.398000 audit: BPF prog-id=8 op=LOAD Oct 2 18:47:30.400247 systemd[1]: Starting systemd-udevd.service... Oct 2 18:47:30.437978 systemd-udevd[507]: Using default interface naming scheme 'v252'. Oct 2 18:47:30.448232 systemd[1]: Started systemd-udevd.service. Oct 2 18:47:30.452000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:47:30.454712 systemd[1]: Starting dracut-pre-trigger.service... Oct 2 18:47:30.518667 dracut-pre-trigger[522]: rd.md=0: removing MD RAID activation Oct 2 18:47:30.625955 systemd[1]: Finished dracut-pre-trigger.service. Oct 2 18:47:30.628000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:47:30.630700 systemd[1]: Starting systemd-udev-trigger.service... Oct 2 18:47:30.746051 systemd[1]: Finished systemd-udev-trigger.service. Oct 2 18:47:30.746000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:47:30.893525 kernel: ACPI: \_SB_.PCI0.GSI1: Enabled at IRQ 36 Oct 2 18:47:30.893595 kernel: ena 0000:00:05.0: enabling device (0010 -> 0012) Oct 2 18:47:30.893860 kernel: ACPI: \_SB_.PCI0.GSI0: Enabled at IRQ 35 Oct 2 18:47:30.896886 kernel: nvme nvme0: pci function 0000:00:04.0 Oct 2 18:47:30.907922 kernel: ena 0000:00:05.0: ENA device version: 0.10 Oct 2 18:47:30.908283 kernel: ena 0000:00:05.0: ENA controller version: 0.0.1 implementation version 1 Oct 2 18:47:30.908496 kernel: nvme nvme0: 2/0/0 default/read/poll queues Oct 2 18:47:30.915111 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Oct 2 18:47:30.915167 kernel: GPT:9289727 != 16777215 Oct 2 18:47:30.915191 kernel: GPT:Alternate GPT header not at the end of the disk. Oct 2 18:47:30.915223 kernel: GPT:9289727 != 16777215 Oct 2 18:47:30.915245 kernel: GPT: Use GNU Parted to correct GPT errors. Oct 2 18:47:30.915266 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Oct 2 18:47:30.915288 kernel: ena 0000:00:05.0: Elastic Network Adapter (ENA) found at mem 80114000, mac addr 06:44:41:51:c1:95 Oct 2 18:47:30.923617 (udev-worker)[564]: Network interface NamePolicy= disabled on kernel command line. Oct 2 18:47:31.019119 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/nvme0n1p6 scanned by (udev-worker) (563) Oct 2 18:47:31.144529 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Oct 2 18:47:31.179636 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Oct 2 18:47:31.186329 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Oct 2 18:47:31.199002 systemd[1]: Starting disk-uuid.service... Oct 2 18:47:31.226056 disk-uuid[665]: Primary Header is updated. Oct 2 18:47:31.226056 disk-uuid[665]: Secondary Entries is updated. Oct 2 18:47:31.226056 disk-uuid[665]: Secondary Header is updated. Oct 2 18:47:31.258682 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Oct 2 18:47:31.274184 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Oct 2 18:47:32.261119 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Oct 2 18:47:32.261518 disk-uuid[667]: The operation has completed successfully. Oct 2 18:47:32.543881 systemd[1]: disk-uuid.service: Deactivated successfully. Oct 2 18:47:32.546000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:47:32.546000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:47:32.544112 systemd[1]: Finished disk-uuid.service. Oct 2 18:47:32.560862 systemd[1]: Starting verity-setup.service... Oct 2 18:47:32.609493 kernel: device-mapper: verity: sha256 using implementation "sha256-ce" Oct 2 18:47:32.700546 systemd[1]: Found device dev-mapper-usr.device. Oct 2 18:47:32.705625 systemd[1]: Mounting sysusr-usr.mount... Oct 2 18:47:32.715210 systemd[1]: Finished verity-setup.service. Oct 2 18:47:32.728572 kernel: kauditd_printk_skb: 7 callbacks suppressed Oct 2 18:47:32.728624 kernel: audit: type=1130 audit(1696272452.714:18): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:47:32.714000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:47:32.812109 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Oct 2 18:47:32.813333 systemd[1]: Mounted sysusr-usr.mount. Oct 2 18:47:32.816330 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Oct 2 18:47:32.820258 systemd[1]: Starting ignition-setup.service... Oct 2 18:47:32.832039 systemd[1]: Starting parse-ip-for-networkd.service... Oct 2 18:47:32.861995 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-generic) checksum algorithm Oct 2 18:47:32.862061 kernel: BTRFS info (device nvme0n1p6): using free space tree Oct 2 18:47:32.862114 kernel: BTRFS info (device nvme0n1p6): has skinny extents Oct 2 18:47:32.881127 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Oct 2 18:47:32.915996 systemd[1]: mnt-oem.mount: Deactivated successfully. Oct 2 18:47:32.956526 systemd[1]: Finished ignition-setup.service. Oct 2 18:47:32.957000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:47:32.959817 systemd[1]: Starting ignition-fetch-offline.service... Oct 2 18:47:32.969580 kernel: audit: type=1130 audit(1696272452.957:19): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:47:33.202425 systemd[1]: Finished parse-ip-for-networkd.service. Oct 2 18:47:33.218701 kernel: audit: type=1130 audit(1696272453.203:20): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:47:33.219464 kernel: audit: type=1334 audit(1696272453.205:21): prog-id=9 op=LOAD Oct 2 18:47:33.203000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:47:33.205000 audit: BPF prog-id=9 op=LOAD Oct 2 18:47:33.207981 systemd[1]: Starting systemd-networkd.service... Oct 2 18:47:33.271277 systemd-networkd[1100]: lo: Link UP Oct 2 18:47:33.271866 systemd-networkd[1100]: lo: Gained carrier Oct 2 18:47:33.275764 systemd-networkd[1100]: Enumeration completed Oct 2 18:47:33.278129 systemd-networkd[1100]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Oct 2 18:47:33.282239 systemd[1]: Started systemd-networkd.service. Oct 2 18:47:33.286190 systemd[1]: Reached target network.target. Oct 2 18:47:33.283000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:47:33.297113 kernel: audit: type=1130 audit(1696272453.283:22): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:47:33.298354 systemd-networkd[1100]: eth0: Link UP Oct 2 18:47:33.298371 systemd-networkd[1100]: eth0: Gained carrier Oct 2 18:47:33.304033 systemd[1]: Starting iscsiuio.service... Oct 2 18:47:33.310306 systemd-networkd[1100]: eth0: DHCPv4 address 172.31.16.118/20, gateway 172.31.16.1 acquired from 172.31.16.1 Oct 2 18:47:33.334870 systemd[1]: Started iscsiuio.service. Oct 2 18:47:33.335000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:47:33.339356 systemd[1]: Starting iscsid.service... Oct 2 18:47:33.349833 kernel: audit: type=1130 audit(1696272453.335:23): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:47:33.355700 iscsid[1108]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Oct 2 18:47:33.355700 iscsid[1108]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Oct 2 18:47:33.355700 iscsid[1108]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Oct 2 18:47:33.355700 iscsid[1108]: If using hardware iscsi like qla4xxx this message can be ignored. Oct 2 18:47:33.355700 iscsid[1108]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Oct 2 18:47:33.375000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:47:33.386857 iscsid[1108]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Oct 2 18:47:33.389752 kernel: audit: type=1130 audit(1696272453.375:24): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:47:33.374745 systemd[1]: Started iscsid.service. Oct 2 18:47:33.391873 systemd[1]: Starting dracut-initqueue.service... Oct 2 18:47:33.438410 systemd[1]: Finished dracut-initqueue.service. Oct 2 18:47:33.441847 systemd[1]: Reached target remote-fs-pre.target. Oct 2 18:47:33.455065 kernel: audit: type=1130 audit(1696272453.439:25): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:47:33.439000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:47:33.451179 systemd[1]: Reached target remote-cryptsetup.target. Oct 2 18:47:33.454766 systemd[1]: Reached target remote-fs.target. Oct 2 18:47:33.460860 systemd[1]: Starting dracut-pre-mount.service... Oct 2 18:47:33.494858 systemd[1]: Finished dracut-pre-mount.service. Oct 2 18:47:33.497000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:47:33.506594 kernel: audit: type=1130 audit(1696272453.497:26): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:47:33.626978 ignition[1016]: Ignition 2.14.0 Oct 2 18:47:33.628789 ignition[1016]: Stage: fetch-offline Oct 2 18:47:33.630642 ignition[1016]: reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 18:47:33.631330 ignition[1016]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Oct 2 18:47:33.648813 ignition[1016]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Oct 2 18:47:33.651681 ignition[1016]: Ignition finished successfully Oct 2 18:47:33.655133 systemd[1]: Finished ignition-fetch-offline.service. Oct 2 18:47:33.656000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:47:33.667117 kernel: audit: type=1130 audit(1696272453.656:27): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:47:33.667976 systemd[1]: Starting ignition-fetch.service... Oct 2 18:47:33.700039 ignition[1124]: Ignition 2.14.0 Oct 2 18:47:33.700069 ignition[1124]: Stage: fetch Oct 2 18:47:33.700472 ignition[1124]: reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 18:47:33.700536 ignition[1124]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Oct 2 18:47:33.717035 ignition[1124]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Oct 2 18:47:33.719418 ignition[1124]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Oct 2 18:47:33.727168 ignition[1124]: INFO : PUT result: OK Oct 2 18:47:33.730441 ignition[1124]: DEBUG : parsed url from cmdline: "" Oct 2 18:47:33.730441 ignition[1124]: INFO : no config URL provided Oct 2 18:47:33.730441 ignition[1124]: INFO : reading system config file "/usr/lib/ignition/user.ign" Oct 2 18:47:33.736653 ignition[1124]: INFO : no config at "/usr/lib/ignition/user.ign" Oct 2 18:47:33.736653 ignition[1124]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Oct 2 18:47:33.741719 ignition[1124]: INFO : PUT result: OK Oct 2 18:47:33.741719 ignition[1124]: INFO : GET http://169.254.169.254/2019-10-01/user-data: attempt #1 Oct 2 18:47:33.746097 ignition[1124]: INFO : GET result: OK Oct 2 18:47:33.747680 ignition[1124]: DEBUG : parsing config with SHA512: 01f3377ce24f2eaff351b4b80eb42107130b3f81dcde9729260421910c99af1042d461b5c2a4ec7fd5c84fa5ad9d3b9878204f7a38e2a60670c8ebc8aea58a31 Oct 2 18:47:33.787403 unknown[1124]: fetched base config from "system" Oct 2 18:47:33.787648 unknown[1124]: fetched base config from "system" Oct 2 18:47:33.789629 ignition[1124]: fetch: fetch complete Oct 2 18:47:33.787664 unknown[1124]: fetched user config from "aws" Oct 2 18:47:33.789652 ignition[1124]: fetch: fetch passed Oct 2 18:47:33.789748 ignition[1124]: Ignition finished successfully Oct 2 18:47:33.800334 systemd[1]: Finished ignition-fetch.service. Oct 2 18:47:33.802000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:47:33.804890 systemd[1]: Starting ignition-kargs.service... Oct 2 18:47:33.838672 ignition[1130]: Ignition 2.14.0 Oct 2 18:47:33.839227 ignition[1130]: Stage: kargs Oct 2 18:47:33.839583 ignition[1130]: reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 18:47:33.839641 ignition[1130]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Oct 2 18:47:33.853631 ignition[1130]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Oct 2 18:47:33.856431 ignition[1130]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Oct 2 18:47:33.859492 ignition[1130]: INFO : PUT result: OK Oct 2 18:47:33.864735 ignition[1130]: kargs: kargs passed Oct 2 18:47:33.864843 ignition[1130]: Ignition finished successfully Oct 2 18:47:33.869228 systemd[1]: Finished ignition-kargs.service. Oct 2 18:47:33.870000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:47:33.873746 systemd[1]: Starting ignition-disks.service... Oct 2 18:47:33.903558 ignition[1136]: Ignition 2.14.0 Oct 2 18:47:33.903587 ignition[1136]: Stage: disks Oct 2 18:47:33.903936 ignition[1136]: reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 18:47:33.903995 ignition[1136]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Oct 2 18:47:33.920017 ignition[1136]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Oct 2 18:47:33.922403 ignition[1136]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Oct 2 18:47:33.926245 ignition[1136]: INFO : PUT result: OK Oct 2 18:47:33.930978 ignition[1136]: disks: disks passed Oct 2 18:47:33.931069 ignition[1136]: Ignition finished successfully Oct 2 18:47:33.934876 systemd[1]: Finished ignition-disks.service. Oct 2 18:47:33.936000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:47:33.938229 systemd[1]: Reached target initrd-root-device.target. Oct 2 18:47:33.940511 systemd[1]: Reached target local-fs-pre.target. Oct 2 18:47:33.943502 systemd[1]: Reached target local-fs.target. Oct 2 18:47:33.945151 systemd[1]: Reached target sysinit.target. Oct 2 18:47:33.946819 systemd[1]: Reached target basic.target. Oct 2 18:47:33.949876 systemd[1]: Starting systemd-fsck-root.service... Oct 2 18:47:34.007388 systemd-fsck[1144]: ROOT: clean, 603/553520 files, 56011/553472 blocks Oct 2 18:47:34.014308 systemd[1]: Finished systemd-fsck-root.service. Oct 2 18:47:34.013000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:47:34.018841 systemd[1]: Mounting sysroot.mount... Oct 2 18:47:34.050106 kernel: EXT4-fs (nvme0n1p9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Oct 2 18:47:34.051941 systemd[1]: Mounted sysroot.mount. Oct 2 18:47:34.055107 systemd[1]: Reached target initrd-root-fs.target. Oct 2 18:47:34.067680 systemd[1]: Mounting sysroot-usr.mount... Oct 2 18:47:34.071576 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Oct 2 18:47:34.073258 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Oct 2 18:47:34.073318 systemd[1]: Reached target ignition-diskful.target. Oct 2 18:47:34.091246 systemd[1]: Mounted sysroot-usr.mount. Oct 2 18:47:34.108649 systemd[1]: Mounting sysroot-usr-share-oem.mount... Oct 2 18:47:34.113228 systemd[1]: Starting initrd-setup-root.service... Oct 2 18:47:34.136120 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/nvme0n1p6 scanned by mount (1161) Oct 2 18:47:34.145398 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-generic) checksum algorithm Oct 2 18:47:34.145462 kernel: BTRFS info (device nvme0n1p6): using free space tree Oct 2 18:47:34.147655 kernel: BTRFS info (device nvme0n1p6): has skinny extents Oct 2 18:47:34.153861 initrd-setup-root[1166]: cut: /sysroot/etc/passwd: No such file or directory Oct 2 18:47:34.156354 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Oct 2 18:47:34.164465 systemd[1]: Mounted sysroot-usr-share-oem.mount. Oct 2 18:47:34.192209 initrd-setup-root[1192]: cut: /sysroot/etc/group: No such file or directory Oct 2 18:47:34.211614 initrd-setup-root[1200]: cut: /sysroot/etc/shadow: No such file or directory Oct 2 18:47:34.230450 initrd-setup-root[1208]: cut: /sysroot/etc/gshadow: No such file or directory Oct 2 18:47:34.433977 systemd[1]: Finished initrd-setup-root.service. Oct 2 18:47:34.436000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:47:34.439213 systemd[1]: Starting ignition-mount.service... Oct 2 18:47:34.442116 systemd[1]: Starting sysroot-boot.service... Oct 2 18:47:34.474718 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Oct 2 18:47:34.474901 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Oct 2 18:47:34.490255 systemd-networkd[1100]: eth0: Gained IPv6LL Oct 2 18:47:34.505309 systemd[1]: Finished sysroot-boot.service. Oct 2 18:47:34.507000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:47:34.525774 ignition[1229]: INFO : Ignition 2.14.0 Oct 2 18:47:34.525774 ignition[1229]: INFO : Stage: mount Oct 2 18:47:34.529247 ignition[1229]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 18:47:34.529247 ignition[1229]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Oct 2 18:47:34.547590 ignition[1229]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Oct 2 18:47:34.550170 ignition[1229]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Oct 2 18:47:34.553948 ignition[1229]: INFO : PUT result: OK Oct 2 18:47:34.558578 ignition[1229]: INFO : mount: mount passed Oct 2 18:47:34.560677 ignition[1229]: INFO : Ignition finished successfully Oct 2 18:47:34.563773 systemd[1]: Finished ignition-mount.service. Oct 2 18:47:34.565000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:47:34.568302 systemd[1]: Starting ignition-files.service... Oct 2 18:47:34.591398 systemd[1]: Mounting sysroot-usr-share-oem.mount... Oct 2 18:47:34.615110 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/nvme0n1p6 scanned by mount (1236) Oct 2 18:47:34.620543 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-generic) checksum algorithm Oct 2 18:47:34.620576 kernel: BTRFS info (device nvme0n1p6): using free space tree Oct 2 18:47:34.622771 kernel: BTRFS info (device nvme0n1p6): has skinny extents Oct 2 18:47:34.629099 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Oct 2 18:47:34.634545 systemd[1]: Mounted sysroot-usr-share-oem.mount. Oct 2 18:47:34.670272 ignition[1255]: INFO : Ignition 2.14.0 Oct 2 18:47:34.673953 ignition[1255]: INFO : Stage: files Oct 2 18:47:34.673953 ignition[1255]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 18:47:34.673953 ignition[1255]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Oct 2 18:47:34.702560 ignition[1255]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Oct 2 18:47:34.705234 ignition[1255]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Oct 2 18:47:34.708842 ignition[1255]: INFO : PUT result: OK Oct 2 18:47:34.713902 ignition[1255]: DEBUG : files: compiled without relabeling support, skipping Oct 2 18:47:34.717650 ignition[1255]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Oct 2 18:47:34.717650 ignition[1255]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Oct 2 18:47:34.762012 ignition[1255]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Oct 2 18:47:34.764929 ignition[1255]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Oct 2 18:47:34.768386 unknown[1255]: wrote ssh authorized keys file for user: core Oct 2 18:47:34.770706 ignition[1255]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Oct 2 18:47:34.774370 ignition[1255]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/cni-plugins-linux-arm64-v1.1.1.tgz" Oct 2 18:47:34.778422 ignition[1255]: INFO : GET https://github.com/containernetworking/plugins/releases/download/v1.1.1/cni-plugins-linux-arm64-v1.1.1.tgz: attempt #1 Oct 2 18:47:34.943964 ignition[1255]: INFO : GET result: OK Oct 2 18:47:35.429215 ignition[1255]: DEBUG : file matches expected sum of: 6b5df61a53601926e4b5a9174828123d555f592165439f541bc117c68781f41c8bd30dccd52367e406d104df849bcbcfb72d9c4bafda4b045c59ce95d0ca0742 Oct 2 18:47:35.433976 ignition[1255]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/cni-plugins-linux-arm64-v1.1.1.tgz" Oct 2 18:47:35.433976 ignition[1255]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/opt/crictl-v1.24.2-linux-arm64.tar.gz" Oct 2 18:47:35.441736 ignition[1255]: INFO : GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.24.2/crictl-v1.24.2-linux-arm64.tar.gz: attempt #1 Oct 2 18:47:35.661422 ignition[1255]: INFO : GET result: OK Oct 2 18:47:35.822502 ignition[1255]: DEBUG : file matches expected sum of: ebd055e9b2888624d006decd582db742131ed815d059d529ba21eaf864becca98a84b20a10eec91051b9d837c6855d28d5042bf5e9a454f4540aec6b82d37e96 Oct 2 18:47:35.831467 ignition[1255]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/crictl-v1.24.2-linux-arm64.tar.gz" Oct 2 18:47:35.831467 ignition[1255]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/etc/eks/bootstrap.sh" Oct 2 18:47:35.831467 ignition[1255]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Oct 2 18:47:35.845428 ignition[1255]: INFO : op(1): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4164169071" Oct 2 18:47:35.845428 ignition[1255]: CRITICAL : op(1): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4164169071": device or resource busy Oct 2 18:47:35.845428 ignition[1255]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem4164169071", trying btrfs: device or resource busy Oct 2 18:47:35.845428 ignition[1255]: INFO : op(2): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4164169071" Oct 2 18:47:35.861095 kernel: BTRFS info: devid 1 device path /dev/nvme0n1p6 changed to /dev/disk/by-label/OEM scanned by ignition (1258) Oct 2 18:47:35.863169 ignition[1255]: INFO : op(2): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4164169071" Oct 2 18:47:35.874341 ignition[1255]: INFO : op(3): [started] unmounting "/mnt/oem4164169071" Oct 2 18:47:35.876853 ignition[1255]: INFO : op(3): [finished] unmounting "/mnt/oem4164169071" Oct 2 18:47:35.879248 ignition[1255]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/etc/eks/bootstrap.sh" Oct 2 18:47:35.882787 ignition[1255]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/bin/kubeadm" Oct 2 18:47:35.882787 ignition[1255]: INFO : GET https://storage.googleapis.com/kubernetes-release/release/v1.25.10/bin/linux/arm64/kubeadm: attempt #1 Oct 2 18:47:35.891916 systemd[1]: mnt-oem4164169071.mount: Deactivated successfully. Oct 2 18:47:36.225620 ignition[1255]: INFO : GET result: OK Oct 2 18:47:37.425185 ignition[1255]: DEBUG : file matches expected sum of: daab8965a4f617d1570d04c031ab4d55fff6aa13a61f0e4045f2338947f9fb0ee3a80fdee57cfe86db885390595460342181e1ec52b89f127ef09c393ae3db7f Oct 2 18:47:37.430269 ignition[1255]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/bin/kubeadm" Oct 2 18:47:37.430269 ignition[1255]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/opt/bin/kubelet" Oct 2 18:47:37.430269 ignition[1255]: INFO : GET https://storage.googleapis.com/kubernetes-release/release/v1.25.10/bin/linux/arm64/kubelet: attempt #1 Oct 2 18:47:37.563170 ignition[1255]: INFO : GET result: OK Oct 2 18:47:39.344228 ignition[1255]: DEBUG : file matches expected sum of: 7b872a34d86e8aa75455a62a20f5cf16426de2ae54ffb8e0250fead920838df818201b8512c2f8bf4c939e5b21babab371f3a48803e2e861da9e6f8cdd022324 Oct 2 18:47:39.349638 ignition[1255]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/opt/bin/kubelet" Oct 2 18:47:39.349638 ignition[1255]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/opt/bin/kubectl" Oct 2 18:47:39.349638 ignition[1255]: INFO : GET https://storage.googleapis.com/kubernetes-release/release/v1.25.10/bin/linux/arm64/kubectl: attempt #1 Oct 2 18:47:39.394914 ignition[1255]: INFO : GET result: OK Oct 2 18:47:40.344213 ignition[1255]: DEBUG : file matches expected sum of: 733208fa18e683adcd80c621d3be1a1ba35340ff656b78c86068b544045d8710ee100d0ff8df3bf55f607b1863d374f634f2d10b2d37e2be90e2b20dd1cc92ab Oct 2 18:47:40.349864 ignition[1255]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/opt/bin/kubectl" Oct 2 18:47:40.349864 ignition[1255]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/etc/docker/daemon.json" Oct 2 18:47:40.349864 ignition[1255]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/docker/daemon.json" Oct 2 18:47:40.349864 ignition[1255]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/home/core/install.sh" Oct 2 18:47:40.349864 ignition[1255]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/home/core/install.sh" Oct 2 18:47:40.349864 ignition[1255]: INFO : files: createFilesystemsFiles: createFiles: op(b): [started] writing file "/sysroot/home/core/nginx.yaml" Oct 2 18:47:40.349864 ignition[1255]: INFO : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/home/core/nginx.yaml" Oct 2 18:47:40.349864 ignition[1255]: INFO : files: createFilesystemsFiles: createFiles: op(c): [started] writing file "/sysroot/etc/amazon/ssm/amazon-ssm-agent.json" Oct 2 18:47:40.349864 ignition[1255]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Oct 2 18:47:40.394181 ignition[1255]: INFO : op(4): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3701470667" Oct 2 18:47:40.394181 ignition[1255]: CRITICAL : op(4): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3701470667": device or resource busy Oct 2 18:47:40.394181 ignition[1255]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3701470667", trying btrfs: device or resource busy Oct 2 18:47:40.394181 ignition[1255]: INFO : op(5): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3701470667" Oct 2 18:47:40.394181 ignition[1255]: INFO : op(5): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3701470667" Oct 2 18:47:40.394181 ignition[1255]: INFO : op(6): [started] unmounting "/mnt/oem3701470667" Oct 2 18:47:40.394181 ignition[1255]: INFO : op(6): [finished] unmounting "/mnt/oem3701470667" Oct 2 18:47:40.394181 ignition[1255]: INFO : files: createFilesystemsFiles: createFiles: op(c): [finished] writing file "/sysroot/etc/amazon/ssm/amazon-ssm-agent.json" Oct 2 18:47:40.394181 ignition[1255]: INFO : files: createFilesystemsFiles: createFiles: op(d): [started] writing file "/sysroot/etc/amazon/ssm/seelog.xml" Oct 2 18:47:40.394181 ignition[1255]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Oct 2 18:47:40.429924 systemd[1]: mnt-oem3701470667.mount: Deactivated successfully. Oct 2 18:47:40.448596 ignition[1255]: INFO : op(7): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3827691724" Oct 2 18:47:40.452020 ignition[1255]: CRITICAL : op(7): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3827691724": device or resource busy Oct 2 18:47:40.452020 ignition[1255]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3827691724", trying btrfs: device or resource busy Oct 2 18:47:40.452020 ignition[1255]: INFO : op(8): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3827691724" Oct 2 18:47:40.464738 ignition[1255]: INFO : op(8): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3827691724" Oct 2 18:47:40.464738 ignition[1255]: INFO : op(9): [started] unmounting "/mnt/oem3827691724" Oct 2 18:47:40.464738 ignition[1255]: INFO : op(9): [finished] unmounting "/mnt/oem3827691724" Oct 2 18:47:40.464738 ignition[1255]: INFO : files: createFilesystemsFiles: createFiles: op(d): [finished] writing file "/sysroot/etc/amazon/ssm/seelog.xml" Oct 2 18:47:40.464738 ignition[1255]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/etc/systemd/system/nvidia.service" Oct 2 18:47:40.464738 ignition[1255]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Oct 2 18:47:40.498360 ignition[1255]: INFO : op(a): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1998764461" Oct 2 18:47:40.498360 ignition[1255]: CRITICAL : op(a): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1998764461": device or resource busy Oct 2 18:47:40.498360 ignition[1255]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem1998764461", trying btrfs: device or resource busy Oct 2 18:47:40.498360 ignition[1255]: INFO : op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1998764461" Oct 2 18:47:40.498360 ignition[1255]: INFO : op(b): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1998764461" Oct 2 18:47:40.498360 ignition[1255]: INFO : op(c): [started] unmounting "/mnt/oem1998764461" Oct 2 18:47:40.498360 ignition[1255]: INFO : op(c): [finished] unmounting "/mnt/oem1998764461" Oct 2 18:47:40.498360 ignition[1255]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service" Oct 2 18:47:40.498360 ignition[1255]: INFO : files: op(f): [started] processing unit "coreos-metadata-sshkeys@.service" Oct 2 18:47:40.498360 ignition[1255]: INFO : files: op(f): [finished] processing unit "coreos-metadata-sshkeys@.service" Oct 2 18:47:40.498360 ignition[1255]: INFO : files: op(10): [started] processing unit "amazon-ssm-agent.service" Oct 2 18:47:40.498360 ignition[1255]: INFO : files: op(10): op(11): [started] writing unit "amazon-ssm-agent.service" at "/sysroot/etc/systemd/system/amazon-ssm-agent.service" Oct 2 18:47:40.498360 ignition[1255]: INFO : files: op(10): op(11): [finished] writing unit "amazon-ssm-agent.service" at "/sysroot/etc/systemd/system/amazon-ssm-agent.service" Oct 2 18:47:40.498360 ignition[1255]: INFO : files: op(10): [finished] processing unit "amazon-ssm-agent.service" Oct 2 18:47:40.498360 ignition[1255]: INFO : files: op(12): [started] processing unit "nvidia.service" Oct 2 18:47:40.498360 ignition[1255]: INFO : files: op(12): [finished] processing unit "nvidia.service" Oct 2 18:47:40.498360 ignition[1255]: INFO : files: op(13): [started] processing unit "prepare-cni-plugins.service" Oct 2 18:47:40.498360 ignition[1255]: INFO : files: op(13): op(14): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Oct 2 18:47:40.498360 ignition[1255]: INFO : files: op(13): op(14): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Oct 2 18:47:40.498360 ignition[1255]: INFO : files: op(13): [finished] processing unit "prepare-cni-plugins.service" Oct 2 18:47:40.566773 ignition[1255]: INFO : files: op(15): [started] processing unit "prepare-critools.service" Oct 2 18:47:40.566773 ignition[1255]: INFO : files: op(15): op(16): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Oct 2 18:47:40.566773 ignition[1255]: INFO : files: op(15): op(16): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Oct 2 18:47:40.566773 ignition[1255]: INFO : files: op(15): [finished] processing unit "prepare-critools.service" Oct 2 18:47:40.566773 ignition[1255]: INFO : files: op(17): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Oct 2 18:47:40.566773 ignition[1255]: INFO : files: op(17): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Oct 2 18:47:40.566773 ignition[1255]: INFO : files: op(18): [started] setting preset to enabled for "amazon-ssm-agent.service" Oct 2 18:47:40.566773 ignition[1255]: INFO : files: op(18): [finished] setting preset to enabled for "amazon-ssm-agent.service" Oct 2 18:47:40.566773 ignition[1255]: INFO : files: op(19): [started] setting preset to enabled for "nvidia.service" Oct 2 18:47:40.566773 ignition[1255]: INFO : files: op(19): [finished] setting preset to enabled for "nvidia.service" Oct 2 18:47:40.566773 ignition[1255]: INFO : files: op(1a): [started] setting preset to enabled for "prepare-cni-plugins.service" Oct 2 18:47:40.566773 ignition[1255]: INFO : files: op(1a): [finished] setting preset to enabled for "prepare-cni-plugins.service" Oct 2 18:47:40.566773 ignition[1255]: INFO : files: op(1b): [started] setting preset to enabled for "prepare-critools.service" Oct 2 18:47:40.566773 ignition[1255]: INFO : files: op(1b): [finished] setting preset to enabled for "prepare-critools.service" Oct 2 18:47:40.610270 systemd[1]: mnt-oem1998764461.mount: Deactivated successfully. Oct 2 18:47:40.621809 ignition[1255]: INFO : files: createResultFile: createFiles: op(1c): [started] writing file "/sysroot/etc/.ignition-result.json" Oct 2 18:47:40.625562 ignition[1255]: INFO : files: createResultFile: createFiles: op(1c): [finished] writing file "/sysroot/etc/.ignition-result.json" Oct 2 18:47:40.625562 ignition[1255]: INFO : files: files passed Oct 2 18:47:40.632014 ignition[1255]: INFO : Ignition finished successfully Oct 2 18:47:40.632621 systemd[1]: Finished ignition-files.service. Oct 2 18:47:40.650050 kernel: kauditd_printk_skb: 7 callbacks suppressed Oct 2 18:47:40.650119 kernel: audit: type=1130 audit(1696272460.632:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:47:40.632000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:47:40.656281 systemd[1]: Starting initrd-setup-root-after-ignition.service... Oct 2 18:47:40.658273 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Oct 2 18:47:40.672027 systemd[1]: Starting ignition-quench.service... Oct 2 18:47:40.686790 systemd[1]: ignition-quench.service: Deactivated successfully. Oct 2 18:47:40.688908 systemd[1]: Finished ignition-quench.service. Oct 2 18:47:40.691000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:47:40.691000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:47:40.707625 kernel: audit: type=1130 audit(1696272460.691:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:47:40.707687 kernel: audit: type=1131 audit(1696272460.691:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:47:40.716809 initrd-setup-root-after-ignition[1280]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Oct 2 18:47:40.722023 systemd[1]: Finished initrd-setup-root-after-ignition.service. Oct 2 18:47:40.724000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:47:40.726055 systemd[1]: Reached target ignition-complete.target. Oct 2 18:47:40.741093 kernel: audit: type=1130 audit(1696272460.724:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:47:40.742058 systemd[1]: Starting initrd-parse-etc.service... Oct 2 18:47:40.791553 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Oct 2 18:47:40.793593 systemd[1]: Finished initrd-parse-etc.service. Oct 2 18:47:40.795000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:47:40.797878 systemd[1]: Reached target initrd-fs.target. Oct 2 18:47:40.812449 kernel: audit: type=1130 audit(1696272460.795:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:47:40.812494 kernel: audit: type=1131 audit(1696272460.796:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:47:40.796000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:47:40.815336 systemd[1]: Reached target initrd.target. Oct 2 18:47:40.818384 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Oct 2 18:47:40.822333 systemd[1]: Starting dracut-pre-pivot.service... Oct 2 18:47:40.862764 systemd[1]: Finished dracut-pre-pivot.service. Oct 2 18:47:40.865000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:47:40.867420 systemd[1]: Starting initrd-cleanup.service... Oct 2 18:47:40.876900 kernel: audit: type=1130 audit(1696272460.865:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:47:40.896382 systemd[1]: Stopped target nss-lookup.target. Oct 2 18:47:40.899968 systemd[1]: Stopped target remote-cryptsetup.target. Oct 2 18:47:40.904151 systemd[1]: Stopped target timers.target. Oct 2 18:47:40.907191 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Oct 2 18:47:40.909357 systemd[1]: Stopped dracut-pre-pivot.service. Oct 2 18:47:40.911000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:47:40.912816 systemd[1]: Stopped target initrd.target. Oct 2 18:47:40.921453 kernel: audit: type=1131 audit(1696272460.911:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:47:40.923272 systemd[1]: Stopped target basic.target. Oct 2 18:47:40.926502 systemd[1]: Stopped target ignition-complete.target. Oct 2 18:47:40.930279 systemd[1]: Stopped target ignition-diskful.target. Oct 2 18:47:40.933866 systemd[1]: Stopped target initrd-root-device.target. Oct 2 18:47:40.937515 systemd[1]: Stopped target remote-fs.target. Oct 2 18:47:40.940791 systemd[1]: Stopped target remote-fs-pre.target. Oct 2 18:47:40.944317 systemd[1]: Stopped target sysinit.target. Oct 2 18:47:40.947501 systemd[1]: Stopped target local-fs.target. Oct 2 18:47:40.950636 systemd[1]: Stopped target local-fs-pre.target. Oct 2 18:47:40.954051 systemd[1]: Stopped target swap.target. Oct 2 18:47:40.956938 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Oct 2 18:47:40.959004 systemd[1]: Stopped dracut-pre-mount.service. Oct 2 18:47:40.961000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:47:40.969971 systemd[1]: Stopped target cryptsetup.target. Oct 2 18:47:40.973239 kernel: audit: type=1131 audit(1696272460.961:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:47:40.973231 systemd[1]: dracut-initqueue.service: Deactivated successfully. Oct 2 18:47:40.975381 systemd[1]: Stopped dracut-initqueue.service. Oct 2 18:47:40.977000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:47:40.978733 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Oct 2 18:47:40.988194 kernel: audit: type=1131 audit(1696272460.977:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:47:40.978953 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Oct 2 18:47:40.991000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:47:40.992178 systemd[1]: ignition-files.service: Deactivated successfully. Oct 2 18:47:40.992844 systemd[1]: Stopped ignition-files.service. Oct 2 18:47:40.993000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:47:41.016000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:47:40.997370 systemd[1]: Stopping ignition-mount.service... Oct 2 18:47:41.000223 systemd[1]: Stopping iscsiuio.service... Oct 2 18:47:41.008226 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Oct 2 18:47:41.008494 systemd[1]: Stopped kmod-static-nodes.service. Oct 2 18:47:41.026872 systemd[1]: Stopping sysroot-boot.service... Oct 2 18:47:41.042886 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Oct 2 18:47:41.045389 systemd[1]: Stopped systemd-udev-trigger.service. Oct 2 18:47:41.058801 ignition[1293]: INFO : Ignition 2.14.0 Oct 2 18:47:41.057000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:47:41.059194 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Oct 2 18:47:41.060885 systemd[1]: Stopped dracut-pre-trigger.service. Oct 2 18:47:41.066249 ignition[1293]: INFO : Stage: umount Oct 2 18:47:41.066249 ignition[1293]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 2 18:47:41.066249 ignition[1293]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Oct 2 18:47:41.075000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:47:41.080668 systemd[1]: iscsiuio.service: Deactivated successfully. Oct 2 18:47:41.084785 systemd[1]: Stopped iscsiuio.service. Oct 2 18:47:41.090000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:47:41.094868 systemd[1]: initrd-cleanup.service: Deactivated successfully. Oct 2 18:47:41.095069 systemd[1]: Finished initrd-cleanup.service. Oct 2 18:47:41.105000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:47:41.105000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:47:41.111343 ignition[1293]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Oct 2 18:47:41.117063 ignition[1293]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Oct 2 18:47:41.123592 ignition[1293]: INFO : PUT result: OK Oct 2 18:47:41.128623 systemd[1]: sysroot-boot.service: Deactivated successfully. Oct 2 18:47:41.129000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:47:41.128812 systemd[1]: Stopped sysroot-boot.service. Oct 2 18:47:41.135916 ignition[1293]: INFO : umount: umount passed Oct 2 18:47:41.139865 ignition[1293]: INFO : Ignition finished successfully Oct 2 18:47:41.137657 systemd[1]: ignition-mount.service: Deactivated successfully. Oct 2 18:47:41.143000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:47:41.137850 systemd[1]: Stopped ignition-mount.service. Oct 2 18:47:41.145000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:47:41.149000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:47:41.145868 systemd[1]: ignition-disks.service: Deactivated successfully. Oct 2 18:47:41.145956 systemd[1]: Stopped ignition-disks.service. Oct 2 18:47:41.148488 systemd[1]: ignition-kargs.service: Deactivated successfully. Oct 2 18:47:41.148569 systemd[1]: Stopped ignition-kargs.service. Oct 2 18:47:41.150315 systemd[1]: ignition-fetch.service: Deactivated successfully. Oct 2 18:47:41.150929 systemd[1]: Stopped ignition-fetch.service. Oct 2 18:47:41.164157 systemd[1]: Stopped target network.target. Oct 2 18:47:41.160000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:47:41.165000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:47:41.165769 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Oct 2 18:47:41.165856 systemd[1]: Stopped ignition-fetch-offline.service. Oct 2 18:47:41.167677 systemd[1]: Stopped target paths.target. Oct 2 18:47:41.169180 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Oct 2 18:47:41.169327 systemd[1]: Stopped systemd-ask-password-console.path. Oct 2 18:47:41.177454 systemd[1]: Stopped target slices.target. Oct 2 18:47:41.179026 systemd[1]: Stopped target sockets.target. Oct 2 18:47:41.187197 systemd[1]: iscsid.socket: Deactivated successfully. Oct 2 18:47:41.187260 systemd[1]: Closed iscsid.socket. Oct 2 18:47:41.188740 systemd[1]: iscsiuio.socket: Deactivated successfully. Oct 2 18:47:41.195432 systemd[1]: Closed iscsiuio.socket. Oct 2 18:47:41.198465 systemd[1]: ignition-setup.service: Deactivated successfully. Oct 2 18:47:41.204800 systemd[1]: Stopped ignition-setup.service. Oct 2 18:47:41.206000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:47:41.207815 systemd[1]: initrd-setup-root.service: Deactivated successfully. Oct 2 18:47:41.207893 systemd[1]: Stopped initrd-setup-root.service. Oct 2 18:47:41.211000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:47:41.213108 systemd[1]: Stopping systemd-networkd.service... Oct 2 18:47:41.216435 systemd[1]: Stopping systemd-resolved.service... Oct 2 18:47:41.221135 systemd-networkd[1100]: eth0: DHCPv6 lease lost Oct 2 18:47:41.226478 systemd[1]: systemd-networkd.service: Deactivated successfully. Oct 2 18:47:41.227000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:47:41.226705 systemd[1]: Stopped systemd-networkd.service. Oct 2 18:47:41.228939 systemd[1]: systemd-networkd.socket: Deactivated successfully. Oct 2 18:47:41.236000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:47:41.241000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:47:41.242000 audit: BPF prog-id=9 op=UNLOAD Oct 2 18:47:41.245000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:47:41.229011 systemd[1]: Closed systemd-networkd.socket. Oct 2 18:47:41.233942 systemd[1]: Stopping network-cleanup.service... Oct 2 18:47:41.235441 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Oct 2 18:47:41.235545 systemd[1]: Stopped parse-ip-for-networkd.service. Oct 2 18:47:41.241256 systemd[1]: systemd-sysctl.service: Deactivated successfully. Oct 2 18:47:41.241354 systemd[1]: Stopped systemd-sysctl.service. Oct 2 18:47:41.243272 systemd[1]: systemd-modules-load.service: Deactivated successfully. Oct 2 18:47:41.243358 systemd[1]: Stopped systemd-modules-load.service. Oct 2 18:47:41.247280 systemd[1]: Stopping systemd-udevd.service... Oct 2 18:47:41.271813 systemd[1]: systemd-resolved.service: Deactivated successfully. Oct 2 18:47:41.272140 systemd[1]: Stopped systemd-resolved.service. Oct 2 18:47:41.278000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:47:41.280533 systemd[1]: systemd-udevd.service: Deactivated successfully. Oct 2 18:47:41.280969 systemd[1]: Stopped systemd-udevd.service. Oct 2 18:47:41.285000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:47:41.299237 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Oct 2 18:47:41.300894 systemd[1]: Closed systemd-udevd-control.socket. Oct 2 18:47:41.304982 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Oct 2 18:47:41.305519 systemd[1]: Closed systemd-udevd-kernel.socket. Oct 2 18:47:41.306000 audit: BPF prog-id=6 op=UNLOAD Oct 2 18:47:41.310870 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Oct 2 18:47:41.312193 systemd[1]: Stopped dracut-pre-udev.service. Oct 2 18:47:41.315000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:47:41.316613 systemd[1]: dracut-cmdline.service: Deactivated successfully. Oct 2 18:47:41.317523 systemd[1]: Stopped dracut-cmdline.service. Oct 2 18:47:41.320000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:47:41.321903 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Oct 2 18:47:41.322111 systemd[1]: Stopped dracut-cmdline-ask.service. Oct 2 18:47:41.326000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:47:41.328949 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Oct 2 18:47:41.332823 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Oct 2 18:47:41.334274 systemd[1]: Stopped systemd-vconsole-setup.service. Oct 2 18:47:41.343000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:47:41.349626 systemd[1]: network-cleanup.service: Deactivated successfully. Oct 2 18:47:41.352000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:47:41.349818 systemd[1]: Stopped network-cleanup.service. Oct 2 18:47:41.362060 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Oct 2 18:47:41.363000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:47:41.363000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:47:41.362264 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Oct 2 18:47:41.365549 systemd[1]: Reached target initrd-switch-root.target. Oct 2 18:47:41.370945 systemd[1]: Starting initrd-switch-root.service... Oct 2 18:47:41.395199 systemd[1]: sysroot-boot.mount: Deactivated successfully. Oct 2 18:47:41.397320 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Oct 2 18:47:41.403721 systemd[1]: Switching root. Oct 2 18:47:41.432846 iscsid[1108]: iscsid shutting down. Oct 2 18:47:41.434446 systemd-journald[308]: Received SIGTERM from PID 1 (n/a). Oct 2 18:47:41.434532 systemd-journald[308]: Journal stopped Oct 2 18:47:46.786478 kernel: SELinux: Class mctp_socket not defined in policy. Oct 2 18:47:46.787054 kernel: SELinux: Class anon_inode not defined in policy. Oct 2 18:47:46.787108 kernel: SELinux: the above unknown classes and permissions will be allowed Oct 2 18:47:46.787142 kernel: SELinux: policy capability network_peer_controls=1 Oct 2 18:47:46.787173 kernel: SELinux: policy capability open_perms=1 Oct 2 18:47:46.787203 kernel: SELinux: policy capability extended_socket_class=1 Oct 2 18:47:46.787235 kernel: SELinux: policy capability always_check_network=0 Oct 2 18:47:46.787272 kernel: SELinux: policy capability cgroup_seclabel=1 Oct 2 18:47:46.787303 kernel: SELinux: policy capability nnp_nosuid_transition=1 Oct 2 18:47:46.787334 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Oct 2 18:47:46.787431 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Oct 2 18:47:46.787466 systemd[1]: Successfully loaded SELinux policy in 94.138ms. Oct 2 18:47:46.791412 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 19.761ms. Oct 2 18:47:46.791474 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Oct 2 18:47:46.791509 systemd[1]: Detected virtualization amazon. Oct 2 18:47:46.791546 systemd[1]: Detected architecture arm64. Oct 2 18:47:46.797198 systemd[1]: Detected first boot. Oct 2 18:47:46.797331 systemd[1]: Initializing machine ID from VM UUID. Oct 2 18:47:46.797367 systemd[1]: Populated /etc with preset unit settings. Oct 2 18:47:46.801159 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 2 18:47:46.801202 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 2 18:47:46.801238 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 2 18:47:46.801337 kernel: kauditd_printk_skb: 38 callbacks suppressed Oct 2 18:47:46.801380 kernel: audit: type=1334 audit(1696272466.284:83): prog-id=12 op=LOAD Oct 2 18:47:46.801411 kernel: audit: type=1334 audit(1696272466.284:84): prog-id=3 op=UNLOAD Oct 2 18:47:46.801442 kernel: audit: type=1334 audit(1696272466.286:85): prog-id=13 op=LOAD Oct 2 18:47:46.801472 kernel: audit: type=1334 audit(1696272466.289:86): prog-id=14 op=LOAD Oct 2 18:47:46.801502 kernel: audit: type=1334 audit(1696272466.289:87): prog-id=4 op=UNLOAD Oct 2 18:47:46.801533 kernel: audit: type=1334 audit(1696272466.289:88): prog-id=5 op=UNLOAD Oct 2 18:47:46.801565 kernel: audit: type=1334 audit(1696272466.291:89): prog-id=15 op=LOAD Oct 2 18:47:46.801595 kernel: audit: type=1334 audit(1696272466.291:90): prog-id=12 op=UNLOAD Oct 2 18:47:46.801630 systemd[1]: iscsid.service: Deactivated successfully. Oct 2 18:47:46.801662 kernel: audit: type=1334 audit(1696272466.294:91): prog-id=16 op=LOAD Oct 2 18:47:46.801690 systemd[1]: Stopped iscsid.service. Oct 2 18:47:46.801725 kernel: audit: type=1334 audit(1696272466.296:92): prog-id=17 op=LOAD Oct 2 18:47:46.801756 systemd[1]: initrd-switch-root.service: Deactivated successfully. Oct 2 18:47:46.801785 systemd[1]: Stopped initrd-switch-root.service. Oct 2 18:47:46.801884 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Oct 2 18:47:46.801918 systemd[1]: Created slice system-addon\x2dconfig.slice. Oct 2 18:47:46.801953 systemd[1]: Created slice system-addon\x2drun.slice. Oct 2 18:47:46.801991 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Oct 2 18:47:46.802025 systemd[1]: Created slice system-getty.slice. Oct 2 18:47:46.802057 systemd[1]: Created slice system-modprobe.slice. Oct 2 18:47:46.802105 systemd[1]: Created slice system-serial\x2dgetty.slice. Oct 2 18:47:46.802140 systemd[1]: Created slice system-system\x2dcloudinit.slice. Oct 2 18:47:46.802175 systemd[1]: Created slice system-systemd\x2dfsck.slice. Oct 2 18:47:46.802208 systemd[1]: Created slice user.slice. Oct 2 18:47:46.803836 systemd[1]: Started systemd-ask-password-console.path. Oct 2 18:47:46.803939 systemd[1]: Started systemd-ask-password-wall.path. Oct 2 18:47:46.803971 systemd[1]: Set up automount boot.automount. Oct 2 18:47:46.804001 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Oct 2 18:47:46.804031 systemd[1]: Stopped target initrd-switch-root.target. Oct 2 18:47:46.804063 systemd[1]: Stopped target initrd-fs.target. Oct 2 18:47:46.804113 systemd[1]: Stopped target initrd-root-fs.target. Oct 2 18:47:46.804145 systemd[1]: Reached target integritysetup.target. Oct 2 18:47:46.804184 systemd[1]: Reached target remote-cryptsetup.target. Oct 2 18:47:46.804216 systemd[1]: Reached target remote-fs.target. Oct 2 18:47:46.804252 systemd[1]: Reached target slices.target. Oct 2 18:47:46.804283 systemd[1]: Reached target swap.target. Oct 2 18:47:46.804312 systemd[1]: Reached target torcx.target. Oct 2 18:47:46.804342 systemd[1]: Reached target veritysetup.target. Oct 2 18:47:46.804374 systemd[1]: Listening on systemd-coredump.socket. Oct 2 18:47:46.804403 systemd[1]: Listening on systemd-initctl.socket. Oct 2 18:47:46.804433 systemd[1]: Listening on systemd-networkd.socket. Oct 2 18:47:46.804463 systemd[1]: Listening on systemd-udevd-control.socket. Oct 2 18:47:46.804492 systemd[1]: Listening on systemd-udevd-kernel.socket. Oct 2 18:47:46.804526 systemd[1]: Listening on systemd-userdbd.socket. Oct 2 18:47:46.804561 systemd[1]: Mounting dev-hugepages.mount... Oct 2 18:47:46.804590 systemd[1]: Mounting dev-mqueue.mount... Oct 2 18:47:46.804620 systemd[1]: Mounting media.mount... Oct 2 18:47:46.804651 systemd[1]: Mounting sys-kernel-debug.mount... Oct 2 18:47:46.804681 systemd[1]: Mounting sys-kernel-tracing.mount... Oct 2 18:47:46.804711 systemd[1]: Mounting tmp.mount... Oct 2 18:47:46.804742 systemd[1]: Starting flatcar-tmpfiles.service... Oct 2 18:47:46.804774 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Oct 2 18:47:46.804809 systemd[1]: Starting kmod-static-nodes.service... Oct 2 18:47:46.804843 systemd[1]: Starting modprobe@configfs.service... Oct 2 18:47:46.804872 systemd[1]: Starting modprobe@dm_mod.service... Oct 2 18:47:46.804901 systemd[1]: Starting modprobe@drm.service... Oct 2 18:47:46.804931 systemd[1]: Starting modprobe@efi_pstore.service... Oct 2 18:47:46.804960 systemd[1]: Starting modprobe@fuse.service... Oct 2 18:47:46.804990 systemd[1]: Starting modprobe@loop.service... Oct 2 18:47:46.805024 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Oct 2 18:47:46.805054 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Oct 2 18:47:46.815898 systemd[1]: Stopped systemd-fsck-root.service. Oct 2 18:47:46.815950 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Oct 2 18:47:46.815988 systemd[1]: Stopped systemd-fsck-usr.service. Oct 2 18:47:46.816023 systemd[1]: Stopped systemd-journald.service. Oct 2 18:47:46.816053 systemd[1]: Starting systemd-journald.service... Oct 2 18:47:46.816234 systemd[1]: Starting systemd-modules-load.service... Oct 2 18:47:46.816271 systemd[1]: Starting systemd-network-generator.service... Oct 2 18:47:46.816302 systemd[1]: Starting systemd-remount-fs.service... Oct 2 18:47:46.816332 systemd[1]: Starting systemd-udev-trigger.service... Oct 2 18:47:46.816370 systemd[1]: verity-setup.service: Deactivated successfully. Oct 2 18:47:46.816403 systemd[1]: Stopped verity-setup.service. Oct 2 18:47:46.816433 systemd[1]: Mounted dev-hugepages.mount. Oct 2 18:47:46.816463 systemd[1]: Mounted dev-mqueue.mount. Oct 2 18:47:46.816492 systemd[1]: Mounted media.mount. Oct 2 18:47:46.816522 systemd[1]: Mounted sys-kernel-debug.mount. Oct 2 18:47:46.816551 systemd[1]: Mounted sys-kernel-tracing.mount. Oct 2 18:47:46.816582 systemd[1]: Mounted tmp.mount. Oct 2 18:47:46.816612 systemd[1]: Finished kmod-static-nodes.service. Oct 2 18:47:46.816641 systemd[1]: modprobe@configfs.service: Deactivated successfully. Oct 2 18:47:46.816675 systemd[1]: Finished modprobe@configfs.service. Oct 2 18:47:46.816704 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Oct 2 18:47:46.816734 systemd[1]: Finished modprobe@dm_mod.service. Oct 2 18:47:46.816764 systemd[1]: modprobe@drm.service: Deactivated successfully. Oct 2 18:47:46.816802 systemd[1]: Finished modprobe@drm.service. Oct 2 18:47:46.816833 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Oct 2 18:47:46.816870 systemd[1]: Finished modprobe@efi_pstore.service. Oct 2 18:47:46.816900 systemd[1]: Finished systemd-network-generator.service. Oct 2 18:47:46.816929 systemd[1]: Reached target network-pre.target. Oct 2 18:47:46.816962 systemd[1]: Mounting sys-kernel-config.mount... Oct 2 18:47:46.816994 systemd[1]: Finished systemd-remount-fs.service. Oct 2 18:47:46.817025 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Oct 2 18:47:46.817054 kernel: loop: module loaded Oct 2 18:47:46.817103 systemd[1]: Starting systemd-hwdb-update.service... Oct 2 18:47:46.817137 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Oct 2 18:47:46.817169 kernel: fuse: init (API version 7.34) Oct 2 18:47:46.817198 systemd[1]: Starting systemd-random-seed.service... Oct 2 18:47:46.817230 systemd[1]: Mounted sys-kernel-config.mount. Oct 2 18:47:46.817264 systemd[1]: modprobe@loop.service: Deactivated successfully. Oct 2 18:47:46.817296 systemd[1]: Finished modprobe@loop.service. Oct 2 18:47:46.817337 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Oct 2 18:47:46.817373 systemd-journald[1405]: Journal started Oct 2 18:47:46.817477 systemd-journald[1405]: Runtime Journal (/run/log/journal/ec270735e2145a670dde865e07a6c36f) is 8.0M, max 75.4M, 67.4M free. Oct 2 18:47:42.088000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Oct 2 18:47:42.257000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Oct 2 18:47:42.257000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Oct 2 18:47:42.257000 audit: BPF prog-id=10 op=LOAD Oct 2 18:47:42.257000 audit: BPF prog-id=10 op=UNLOAD Oct 2 18:47:42.257000 audit: BPF prog-id=11 op=LOAD Oct 2 18:47:42.257000 audit: BPF prog-id=11 op=UNLOAD Oct 2 18:47:46.284000 audit: BPF prog-id=12 op=LOAD Oct 2 18:47:46.284000 audit: BPF prog-id=3 op=UNLOAD Oct 2 18:47:46.286000 audit: BPF prog-id=13 op=LOAD Oct 2 18:47:46.289000 audit: BPF prog-id=14 op=LOAD Oct 2 18:47:46.289000 audit: BPF prog-id=4 op=UNLOAD Oct 2 18:47:46.289000 audit: BPF prog-id=5 op=UNLOAD Oct 2 18:47:46.291000 audit: BPF prog-id=15 op=LOAD Oct 2 18:47:46.291000 audit: BPF prog-id=12 op=UNLOAD Oct 2 18:47:46.294000 audit: BPF prog-id=16 op=LOAD Oct 2 18:47:46.296000 audit: BPF prog-id=17 op=LOAD Oct 2 18:47:46.296000 audit: BPF prog-id=13 op=UNLOAD Oct 2 18:47:46.296000 audit: BPF prog-id=14 op=UNLOAD Oct 2 18:47:46.299000 audit: BPF prog-id=18 op=LOAD Oct 2 18:47:46.299000 audit: BPF prog-id=15 op=UNLOAD Oct 2 18:47:46.301000 audit: BPF prog-id=19 op=LOAD Oct 2 18:47:46.304000 audit: BPF prog-id=20 op=LOAD Oct 2 18:47:46.304000 audit: BPF prog-id=16 op=UNLOAD Oct 2 18:47:46.304000 audit: BPF prog-id=17 op=UNLOAD Oct 2 18:47:46.305000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:47:46.317000 audit: BPF prog-id=18 op=UNLOAD Oct 2 18:47:46.317000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:47:46.324000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:47:46.324000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:47:46.591000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:47:46.598000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:47:46.602000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:47:46.603000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:47:46.604000 audit: BPF prog-id=21 op=LOAD Oct 2 18:47:46.605000 audit: BPF prog-id=22 op=LOAD Oct 2 18:47:46.605000 audit: BPF prog-id=23 op=LOAD Oct 2 18:47:46.605000 audit: BPF prog-id=19 op=UNLOAD Oct 2 18:47:46.605000 audit: BPF prog-id=20 op=UNLOAD Oct 2 18:47:46.648000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:47:46.685000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:47:46.839181 systemd[1]: Started systemd-journald.service. Oct 2 18:47:46.695000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:47:46.695000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:47:46.704000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:47:46.704000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:47:46.714000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:47:46.714000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:47:46.733000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:47:46.733000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:47:46.740000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:47:46.766000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:47:46.775000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Oct 2 18:47:46.775000 audit[1405]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=60 a0=3 a1=ffffcf3fa2a0 a2=4000 a3=1 items=0 ppid=1 pid=1405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:47:46.775000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Oct 2 18:47:46.814000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:47:46.814000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:47:46.825000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:47:46.828000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:47:46.828000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:47:46.831000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:47:42.426041 /usr/lib/systemd/system-generators/torcx-generator[1326]: time="2023-10-02T18:47:42Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.0 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.0 /var/lib/torcx/store]" Oct 2 18:47:46.281709 systemd[1]: Queued start job for default target multi-user.target. Oct 2 18:47:42.427978 /usr/lib/systemd/system-generators/torcx-generator[1326]: time="2023-10-02T18:47:42Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Oct 2 18:47:46.306258 systemd[1]: systemd-journald.service: Deactivated successfully. Oct 2 18:47:42.428028 /usr/lib/systemd/system-generators/torcx-generator[1326]: time="2023-10-02T18:47:42Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Oct 2 18:47:46.827656 systemd[1]: modprobe@fuse.service: Deactivated successfully. Oct 2 18:47:42.428120 /usr/lib/systemd/system-generators/torcx-generator[1326]: time="2023-10-02T18:47:42Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Oct 2 18:47:46.827950 systemd[1]: Finished modprobe@fuse.service. Oct 2 18:47:42.428146 /usr/lib/systemd/system-generators/torcx-generator[1326]: time="2023-10-02T18:47:42Z" level=debug msg="skipped missing lower profile" missing profile=oem Oct 2 18:47:46.830236 systemd[1]: Finished systemd-modules-load.service. Oct 2 18:47:42.428213 /usr/lib/systemd/system-generators/torcx-generator[1326]: time="2023-10-02T18:47:42Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Oct 2 18:47:46.834635 systemd[1]: Mounting sys-fs-fuse-connections.mount... Oct 2 18:47:42.428243 /usr/lib/systemd/system-generators/torcx-generator[1326]: time="2023-10-02T18:47:42Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Oct 2 18:47:46.841592 systemd[1]: Starting systemd-journal-flush.service... Oct 2 18:47:42.428656 /usr/lib/systemd/system-generators/torcx-generator[1326]: time="2023-10-02T18:47:42Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Oct 2 18:47:46.845662 systemd[1]: Starting systemd-sysctl.service... Oct 2 18:47:42.428741 /usr/lib/systemd/system-generators/torcx-generator[1326]: time="2023-10-02T18:47:42Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Oct 2 18:47:46.854385 systemd[1]: Mounted sys-fs-fuse-connections.mount. Oct 2 18:47:42.428777 /usr/lib/systemd/system-generators/torcx-generator[1326]: time="2023-10-02T18:47:42Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Oct 2 18:47:42.429769 /usr/lib/systemd/system-generators/torcx-generator[1326]: time="2023-10-02T18:47:42Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Oct 2 18:47:42.429850 /usr/lib/systemd/system-generators/torcx-generator[1326]: time="2023-10-02T18:47:42Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Oct 2 18:47:42.429894 /usr/lib/systemd/system-generators/torcx-generator[1326]: time="2023-10-02T18:47:42Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.0: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.0 Oct 2 18:47:42.429933 /usr/lib/systemd/system-generators/torcx-generator[1326]: time="2023-10-02T18:47:42Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Oct 2 18:47:42.429978 /usr/lib/systemd/system-generators/torcx-generator[1326]: time="2023-10-02T18:47:42Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.0: no such file or directory" path=/var/lib/torcx/store/3510.3.0 Oct 2 18:47:46.874151 systemd[1]: Finished systemd-random-seed.service. Oct 2 18:47:42.430016 /usr/lib/systemd/system-generators/torcx-generator[1326]: time="2023-10-02T18:47:42Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Oct 2 18:47:45.452696 /usr/lib/systemd/system-generators/torcx-generator[1326]: time="2023-10-02T18:47:45Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 2 18:47:45.453257 /usr/lib/systemd/system-generators/torcx-generator[1326]: time="2023-10-02T18:47:45Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 2 18:47:46.874000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:47:46.876653 systemd[1]: Reached target first-boot-complete.target. Oct 2 18:47:45.453491 /usr/lib/systemd/system-generators/torcx-generator[1326]: time="2023-10-02T18:47:45Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 2 18:47:45.453925 /usr/lib/systemd/system-generators/torcx-generator[1326]: time="2023-10-02T18:47:45Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 2 18:47:45.454033 /usr/lib/systemd/system-generators/torcx-generator[1326]: time="2023-10-02T18:47:45Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Oct 2 18:47:45.454187 /usr/lib/systemd/system-generators/torcx-generator[1326]: time="2023-10-02T18:47:45Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Oct 2 18:47:46.916482 systemd-journald[1405]: Time spent on flushing to /var/log/journal/ec270735e2145a670dde865e07a6c36f is 79.988ms for 1152 entries. Oct 2 18:47:46.916482 systemd-journald[1405]: System Journal (/var/log/journal/ec270735e2145a670dde865e07a6c36f) is 8.0M, max 195.6M, 187.6M free. Oct 2 18:47:47.062817 systemd-journald[1405]: Received client request to flush runtime journal. Oct 2 18:47:46.962000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:47:47.024000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:47:47.056000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:47:46.961353 systemd[1]: Finished systemd-sysctl.service. Oct 2 18:47:47.023820 systemd[1]: Finished systemd-udev-trigger.service. Oct 2 18:47:47.028042 systemd[1]: Starting systemd-udev-settle.service... Oct 2 18:47:47.055257 systemd[1]: Finished flatcar-tmpfiles.service. Oct 2 18:47:47.059434 systemd[1]: Starting systemd-sysusers.service... Oct 2 18:47:47.066016 systemd[1]: Finished systemd-journal-flush.service. Oct 2 18:47:47.067000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:47:47.076487 udevadm[1440]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Oct 2 18:47:47.162607 systemd[1]: Finished systemd-sysusers.service. Oct 2 18:47:47.163000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:47:47.785958 systemd[1]: Finished systemd-hwdb-update.service. Oct 2 18:47:47.786000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:47:47.787000 audit: BPF prog-id=24 op=LOAD Oct 2 18:47:47.788000 audit: BPF prog-id=25 op=LOAD Oct 2 18:47:47.788000 audit: BPF prog-id=7 op=UNLOAD Oct 2 18:47:47.788000 audit: BPF prog-id=8 op=UNLOAD Oct 2 18:47:47.790442 systemd[1]: Starting systemd-udevd.service... Oct 2 18:47:47.839276 systemd-udevd[1447]: Using default interface naming scheme 'v252'. Oct 2 18:47:47.880214 systemd[1]: Started systemd-udevd.service. Oct 2 18:47:47.880000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:47:47.882000 audit: BPF prog-id=26 op=LOAD Oct 2 18:47:47.887242 systemd[1]: Starting systemd-networkd.service... Oct 2 18:47:47.905000 audit: BPF prog-id=27 op=LOAD Oct 2 18:47:47.905000 audit: BPF prog-id=28 op=LOAD Oct 2 18:47:47.905000 audit: BPF prog-id=29 op=LOAD Oct 2 18:47:47.907531 systemd[1]: Starting systemd-userdbd.service... Oct 2 18:47:48.013894 systemd[1]: Started systemd-userdbd.service. Oct 2 18:47:48.014000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:47:48.083244 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Oct 2 18:47:48.121793 (udev-worker)[1461]: Network interface NamePolicy= disabled on kernel command line. Oct 2 18:47:48.208826 systemd-networkd[1457]: lo: Link UP Oct 2 18:47:48.208849 systemd-networkd[1457]: lo: Gained carrier Oct 2 18:47:48.209842 systemd-networkd[1457]: Enumeration completed Oct 2 18:47:48.210021 systemd[1]: Started systemd-networkd.service. Oct 2 18:47:48.210131 systemd-networkd[1457]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Oct 2 18:47:48.210000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:47:48.214166 systemd[1]: Starting systemd-networkd-wait-online.service... Oct 2 18:47:48.222147 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Oct 2 18:47:48.222731 systemd-networkd[1457]: eth0: Link UP Oct 2 18:47:48.223037 systemd-networkd[1457]: eth0: Gained carrier Oct 2 18:47:48.249403 systemd-networkd[1457]: eth0: DHCPv4 address 172.31.16.118/20, gateway 172.31.16.1 acquired from 172.31.16.1 Oct 2 18:47:48.342163 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/nvme0n1p6 scanned by (udev-worker) (1465) Oct 2 18:47:48.543294 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Oct 2 18:47:48.549738 systemd[1]: Finished systemd-udev-settle.service. Oct 2 18:47:48.550000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:47:48.553982 systemd[1]: Starting lvm2-activation-early.service... Oct 2 18:47:48.604666 lvm[1566]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Oct 2 18:47:48.642016 systemd[1]: Finished lvm2-activation-early.service. Oct 2 18:47:48.642000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:47:48.644234 systemd[1]: Reached target cryptsetup.target. Oct 2 18:47:48.648618 systemd[1]: Starting lvm2-activation.service... Oct 2 18:47:48.663167 lvm[1567]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Oct 2 18:47:48.700233 systemd[1]: Finished lvm2-activation.service. Oct 2 18:47:48.701000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:47:48.702608 systemd[1]: Reached target local-fs-pre.target. Oct 2 18:47:48.704580 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Oct 2 18:47:48.704818 systemd[1]: Reached target local-fs.target. Oct 2 18:47:48.706804 systemd[1]: Reached target machines.target. Oct 2 18:47:48.711122 systemd[1]: Starting ldconfig.service... Oct 2 18:47:48.717456 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Oct 2 18:47:48.717964 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 2 18:47:48.725238 systemd[1]: Starting systemd-boot-update.service... Oct 2 18:47:48.728944 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Oct 2 18:47:48.733518 systemd[1]: Starting systemd-machine-id-commit.service... Oct 2 18:47:48.735595 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Oct 2 18:47:48.735724 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Oct 2 18:47:48.738262 systemd[1]: Starting systemd-tmpfiles-setup.service... Oct 2 18:47:48.761801 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1569 (bootctl) Oct 2 18:47:48.764226 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Oct 2 18:47:48.803442 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Oct 2 18:47:48.804000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:47:48.868980 systemd-tmpfiles[1572]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Oct 2 18:47:48.883103 systemd-tmpfiles[1572]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Oct 2 18:47:48.904599 systemd-fsck[1577]: fsck.fat 4.2 (2021-01-31) Oct 2 18:47:48.904599 systemd-fsck[1577]: /dev/nvme0n1p1: 236 files, 113463/258078 clusters Oct 2 18:47:48.911186 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Oct 2 18:47:48.912000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:47:48.916188 systemd[1]: Mounting boot.mount... Oct 2 18:47:48.926047 systemd-tmpfiles[1572]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Oct 2 18:47:48.958498 systemd[1]: Mounted boot.mount. Oct 2 18:47:48.989172 systemd[1]: Finished systemd-boot-update.service. Oct 2 18:47:48.990000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:47:49.238559 systemd[1]: Finished systemd-tmpfiles-setup.service. Oct 2 18:47:49.239000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:47:49.242934 systemd[1]: Starting audit-rules.service... Oct 2 18:47:49.250256 systemd[1]: Starting clean-ca-certificates.service... Oct 2 18:47:49.255567 systemd[1]: Starting systemd-journal-catalog-update.service... Oct 2 18:47:49.258000 audit: BPF prog-id=30 op=LOAD Oct 2 18:47:49.262404 systemd[1]: Starting systemd-resolved.service... Oct 2 18:47:49.266000 audit: BPF prog-id=31 op=LOAD Oct 2 18:47:49.269626 systemd[1]: Starting systemd-timesyncd.service... Oct 2 18:47:49.274191 systemd[1]: Starting systemd-update-utmp.service... Oct 2 18:47:49.313178 systemd[1]: Finished clean-ca-certificates.service. Oct 2 18:47:49.314000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:47:49.315530 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Oct 2 18:47:49.325000 audit[1598]: SYSTEM_BOOT pid=1598 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Oct 2 18:47:49.333126 systemd[1]: Finished systemd-update-utmp.service. Oct 2 18:47:49.334000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:47:49.338445 systemd-networkd[1457]: eth0: Gained IPv6LL Oct 2 18:47:49.345874 systemd[1]: Finished systemd-networkd-wait-online.service. Oct 2 18:47:49.346000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:47:49.387581 systemd[1]: Finished systemd-journal-catalog-update.service. Oct 2 18:47:49.388000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:47:49.506849 systemd-resolved[1596]: Positive Trust Anchors: Oct 2 18:47:49.506939 systemd-resolved[1596]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Oct 2 18:47:49.507010 systemd-resolved[1596]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Oct 2 18:47:49.529868 systemd[1]: Started systemd-timesyncd.service. Oct 2 18:47:49.530000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:47:49.531997 systemd[1]: Reached target time-set.target. Oct 2 18:47:49.193591 systemd-timesyncd[1597]: Contacted time server 69.89.207.199:123 (0.flatcar.pool.ntp.org). Oct 2 18:47:49.566850 systemd-journald[1405]: Time jumped backwards, rotating. Oct 2 18:47:49.228000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Oct 2 18:47:49.228000 audit[1615]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffce6a2fa0 a2=420 a3=0 items=0 ppid=1593 pid=1615 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:47:49.228000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Oct 2 18:47:49.567611 augenrules[1615]: No rules Oct 2 18:47:49.193716 systemd-timesyncd[1597]: Initial clock synchronization to Mon 2023-10-02 18:47:49.193376 UTC. Oct 2 18:47:49.230236 systemd[1]: Finished audit-rules.service. Oct 2 18:47:49.399740 systemd-resolved[1596]: Defaulting to hostname 'linux'. Oct 2 18:47:49.403235 systemd[1]: Started systemd-resolved.service. Oct 2 18:47:49.405213 systemd[1]: Reached target network.target. Oct 2 18:47:49.406935 systemd[1]: Reached target network-online.target. Oct 2 18:47:49.409049 systemd[1]: Reached target nss-lookup.target. Oct 2 18:47:49.767622 ldconfig[1568]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Oct 2 18:47:49.898677 systemd[1]: Finished ldconfig.service. Oct 2 18:47:49.905414 systemd[1]: Starting systemd-update-done.service... Oct 2 18:47:49.927191 systemd[1]: Finished systemd-update-done.service. Oct 2 18:47:49.929324 systemd[1]: Reached target sysinit.target. Oct 2 18:47:49.931321 systemd[1]: Started motdgen.path. Oct 2 18:47:49.932936 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Oct 2 18:47:49.935531 systemd[1]: Started logrotate.timer. Oct 2 18:47:49.937335 systemd[1]: Started mdadm.timer. Oct 2 18:47:49.938765 systemd[1]: Started systemd-tmpfiles-clean.timer. Oct 2 18:47:49.940581 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Oct 2 18:47:49.940635 systemd[1]: Reached target paths.target. Oct 2 18:47:49.942173 systemd[1]: Reached target timers.target. Oct 2 18:47:49.944372 systemd[1]: Listening on dbus.socket. Oct 2 18:47:49.949126 systemd[1]: Starting docker.socket... Oct 2 18:47:50.005178 systemd[1]: Listening on sshd.socket. Oct 2 18:47:50.007905 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 2 18:47:50.008795 systemd[1]: Listening on docker.socket. Oct 2 18:47:50.010655 systemd[1]: Reached target sockets.target. Oct 2 18:47:50.012376 systemd[1]: Reached target basic.target. Oct 2 18:47:50.014098 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Oct 2 18:47:50.014157 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Oct 2 18:47:50.016947 systemd[1]: Started amazon-ssm-agent.service. Oct 2 18:47:50.021138 systemd[1]: Starting containerd.service... Oct 2 18:47:50.026067 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Oct 2 18:47:50.033776 systemd[1]: Starting dbus.service... Oct 2 18:47:50.037512 systemd[1]: Starting enable-oem-cloudinit.service... Oct 2 18:47:50.041472 systemd[1]: Starting extend-filesystems.service... Oct 2 18:47:50.043199 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Oct 2 18:47:50.046894 systemd[1]: Starting motdgen.service... Oct 2 18:47:50.050537 systemd[1]: Started nvidia.service. Oct 2 18:47:50.054685 systemd[1]: Starting prepare-cni-plugins.service... Oct 2 18:47:50.058676 systemd[1]: Starting prepare-critools.service... Oct 2 18:47:50.062703 systemd[1]: Starting ssh-key-proc-cmdline.service... Oct 2 18:47:50.066711 systemd[1]: Starting sshd-keygen.service... Oct 2 18:47:50.074918 systemd[1]: Starting systemd-logind.service... Oct 2 18:47:50.076538 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 2 18:47:50.076690 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Oct 2 18:47:50.078139 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Oct 2 18:47:50.079751 systemd[1]: Starting update-engine.service... Oct 2 18:47:50.083697 systemd[1]: Starting update-ssh-keys-after-ignition.service... Oct 2 18:47:50.130806 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Oct 2 18:47:50.131174 systemd[1]: Finished ssh-key-proc-cmdline.service. Oct 2 18:47:50.210209 jq[1643]: true Oct 2 18:47:50.215499 jq[1633]: false Oct 2 18:47:50.250274 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Oct 2 18:47:50.250625 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Oct 2 18:47:50.285524 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Oct 2 18:47:50.312469 tar[1649]: crictl Oct 2 18:47:50.314893 systemd[1]: Finished systemd-machine-id-commit.service. Oct 2 18:47:50.318003 tar[1645]: ./ Oct 2 18:47:50.321322 tar[1645]: ./macvlan Oct 2 18:47:50.355456 extend-filesystems[1634]: Found nvme0n1 Oct 2 18:47:50.357511 extend-filesystems[1634]: Found nvme0n1p1 Oct 2 18:47:50.357511 extend-filesystems[1634]: Found nvme0n1p2 Oct 2 18:47:50.357511 extend-filesystems[1634]: Found nvme0n1p3 Oct 2 18:47:50.357511 extend-filesystems[1634]: Found usr Oct 2 18:47:50.357511 extend-filesystems[1634]: Found nvme0n1p4 Oct 2 18:47:50.357511 extend-filesystems[1634]: Found nvme0n1p6 Oct 2 18:47:50.357511 extend-filesystems[1634]: Found nvme0n1p7 Oct 2 18:47:50.357511 extend-filesystems[1634]: Found nvme0n1p9 Oct 2 18:47:50.357511 extend-filesystems[1634]: Checking size of /dev/nvme0n1p9 Oct 2 18:47:50.417743 jq[1658]: true Oct 2 18:47:50.484076 update_engine[1642]: I1002 18:47:50.483508 1642 main.cc:92] Flatcar Update Engine starting Oct 2 18:47:50.502138 dbus-daemon[1632]: [system] SELinux support is enabled Oct 2 18:47:50.508526 systemd[1]: Started dbus.service. Oct 2 18:47:50.513302 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Oct 2 18:47:50.513351 systemd[1]: Reached target system-config.target. Oct 2 18:47:50.515487 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Oct 2 18:47:50.515525 systemd[1]: Reached target user-config.target. Oct 2 18:47:50.558954 extend-filesystems[1634]: Resized partition /dev/nvme0n1p9 Oct 2 18:47:50.569098 systemd[1]: motdgen.service: Deactivated successfully. Oct 2 18:47:50.569435 systemd[1]: Finished motdgen.service. Oct 2 18:47:50.577624 dbus-daemon[1632]: [system] Activating via systemd: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.1' (uid=244 pid=1457 comm="/usr/lib/systemd/systemd-networkd" label="system_u:system_r:kernel_t:s0") Oct 2 18:47:50.578995 extend-filesystems[1679]: resize2fs 1.46.5 (30-Dec-2021) Oct 2 18:47:50.587384 systemd[1]: Starting systemd-hostnamed.service... Oct 2 18:47:50.604223 systemd[1]: Started update-engine.service. Oct 2 18:47:50.611245 update_engine[1642]: I1002 18:47:50.604266 1642 update_check_scheduler.cc:74] Next update check in 11m45s Oct 2 18:47:50.609130 systemd[1]: Started locksmithd.service. Oct 2 18:47:50.613854 kernel: EXT4-fs (nvme0n1p9): resizing filesystem from 553472 to 1489915 blocks Oct 2 18:47:50.619536 systemd-logind[1641]: Watching system buttons on /dev/input/event0 (Power Button) Oct 2 18:47:50.628981 systemd-logind[1641]: New seat seat0. Oct 2 18:47:50.639406 systemd[1]: Started systemd-logind.service. Oct 2 18:47:50.675612 kernel: EXT4-fs (nvme0n1p9): resized filesystem to 1489915 Oct 2 18:47:50.703881 amazon-ssm-agent[1629]: 2023/10/02 18:47:50 Failed to load instance info from vault. RegistrationKey does not exist. Oct 2 18:47:50.704357 extend-filesystems[1679]: Filesystem at /dev/nvme0n1p9 is mounted on /; on-line resizing required Oct 2 18:47:50.704357 extend-filesystems[1679]: old_desc_blocks = 1, new_desc_blocks = 1 Oct 2 18:47:50.704357 extend-filesystems[1679]: The filesystem on /dev/nvme0n1p9 is now 1489915 (4k) blocks long. Oct 2 18:47:50.728257 extend-filesystems[1634]: Resized filesystem in /dev/nvme0n1p9 Oct 2 18:47:50.710288 systemd[1]: extend-filesystems.service: Deactivated successfully. Oct 2 18:47:50.710653 systemd[1]: Finished extend-filesystems.service. Oct 2 18:47:50.737808 amazon-ssm-agent[1629]: Initializing new seelog logger Oct 2 18:47:50.737976 amazon-ssm-agent[1629]: New Seelog Logger Creation Complete Oct 2 18:47:50.738148 amazon-ssm-agent[1629]: 2023/10/02 18:47:50 Found config file at /etc/amazon/ssm/amazon-ssm-agent.json. Oct 2 18:47:50.738148 amazon-ssm-agent[1629]: Applying config override from /etc/amazon/ssm/amazon-ssm-agent.json. Oct 2 18:47:50.752881 amazon-ssm-agent[1629]: 2023/10/02 18:47:50 processing appconfig overrides Oct 2 18:47:50.780595 systemd[1]: nvidia.service: Deactivated successfully. Oct 2 18:47:50.890768 tar[1645]: ./static Oct 2 18:47:50.893027 bash[1713]: Updated "/home/core/.ssh/authorized_keys" Oct 2 18:47:50.894621 systemd[1]: Finished update-ssh-keys-after-ignition.service. Oct 2 18:47:50.908377 env[1656]: time="2023-10-02T18:47:50.908285356Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Oct 2 18:47:51.063376 tar[1645]: ./vlan Oct 2 18:47:51.201991 env[1656]: time="2023-10-02T18:47:51.201872654Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Oct 2 18:47:51.202232 env[1656]: time="2023-10-02T18:47:51.202187558Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Oct 2 18:47:51.214938 dbus-daemon[1632]: [system] Successfully activated service 'org.freedesktop.hostname1' Oct 2 18:47:51.215199 systemd[1]: Started systemd-hostnamed.service. Oct 2 18:47:51.219201 dbus-daemon[1632]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' requested by ':1.6' (uid=0 pid=1682 comm="/usr/lib/systemd/systemd-hostnamed" label="system_u:system_r:kernel_t:s0") Oct 2 18:47:51.223787 systemd[1]: Starting polkit.service... Oct 2 18:47:51.235858 env[1656]: time="2023-10-02T18:47:51.234948482Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.132-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Oct 2 18:47:51.235858 env[1656]: time="2023-10-02T18:47:51.235036286Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Oct 2 18:47:51.235858 env[1656]: time="2023-10-02T18:47:51.235430630Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Oct 2 18:47:51.235858 env[1656]: time="2023-10-02T18:47:51.235467146Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Oct 2 18:47:51.235858 env[1656]: time="2023-10-02T18:47:51.235497734Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Oct 2 18:47:51.235858 env[1656]: time="2023-10-02T18:47:51.235522826Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Oct 2 18:47:51.236319 env[1656]: time="2023-10-02T18:47:51.235997234Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Oct 2 18:47:51.237799 env[1656]: time="2023-10-02T18:47:51.237733010Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Oct 2 18:47:51.238098 env[1656]: time="2023-10-02T18:47:51.238043486Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Oct 2 18:47:51.238179 env[1656]: time="2023-10-02T18:47:51.238096898Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Oct 2 18:47:51.238281 env[1656]: time="2023-10-02T18:47:51.238237670Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Oct 2 18:47:51.238362 env[1656]: time="2023-10-02T18:47:51.238277054Z" level=info msg="metadata content store policy set" policy=shared Oct 2 18:47:51.257107 env[1656]: time="2023-10-02T18:47:51.257010038Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Oct 2 18:47:51.257256 env[1656]: time="2023-10-02T18:47:51.257136866Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Oct 2 18:47:51.257256 env[1656]: time="2023-10-02T18:47:51.257174954Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Oct 2 18:47:51.257552 env[1656]: time="2023-10-02T18:47:51.257278742Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Oct 2 18:47:51.257635 env[1656]: time="2023-10-02T18:47:51.257549606Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Oct 2 18:47:51.257635 env[1656]: time="2023-10-02T18:47:51.257616746Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Oct 2 18:47:51.257738 env[1656]: time="2023-10-02T18:47:51.257674358Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Oct 2 18:47:51.258489 env[1656]: time="2023-10-02T18:47:51.258405182Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Oct 2 18:47:51.258622 env[1656]: time="2023-10-02T18:47:51.258495206Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Oct 2 18:47:51.258622 env[1656]: time="2023-10-02T18:47:51.258593894Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Oct 2 18:47:51.258728 env[1656]: time="2023-10-02T18:47:51.258630434Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Oct 2 18:47:51.258728 env[1656]: time="2023-10-02T18:47:51.258685634Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Oct 2 18:47:51.259037 env[1656]: time="2023-10-02T18:47:51.258992690Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Oct 2 18:47:51.259257 env[1656]: time="2023-10-02T18:47:51.259213754Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Oct 2 18:47:51.263824 env[1656]: time="2023-10-02T18:47:51.263729210Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Oct 2 18:47:51.263951 env[1656]: time="2023-10-02T18:47:51.263819426Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Oct 2 18:47:51.263951 env[1656]: time="2023-10-02T18:47:51.263855834Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Oct 2 18:47:51.264053 env[1656]: time="2023-10-02T18:47:51.264028430Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Oct 2 18:47:51.264108 env[1656]: time="2023-10-02T18:47:51.264083198Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Oct 2 18:47:51.264188 env[1656]: time="2023-10-02T18:47:51.264118910Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Oct 2 18:47:51.264188 env[1656]: time="2023-10-02T18:47:51.264148466Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Oct 2 18:47:51.264188 env[1656]: time="2023-10-02T18:47:51.264179690Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Oct 2 18:47:51.264333 env[1656]: time="2023-10-02T18:47:51.264210146Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Oct 2 18:47:51.264333 env[1656]: time="2023-10-02T18:47:51.264239282Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Oct 2 18:47:51.264333 env[1656]: time="2023-10-02T18:47:51.264268610Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Oct 2 18:47:51.264333 env[1656]: time="2023-10-02T18:47:51.264303014Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Oct 2 18:47:51.264656 env[1656]: time="2023-10-02T18:47:51.264609506Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Oct 2 18:47:51.264726 env[1656]: time="2023-10-02T18:47:51.264661322Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Oct 2 18:47:51.264726 env[1656]: time="2023-10-02T18:47:51.264697022Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Oct 2 18:47:51.264824 env[1656]: time="2023-10-02T18:47:51.264727670Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Oct 2 18:47:51.264824 env[1656]: time="2023-10-02T18:47:51.264760802Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Oct 2 18:47:51.264824 env[1656]: time="2023-10-02T18:47:51.264792974Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Oct 2 18:47:51.264984 env[1656]: time="2023-10-02T18:47:51.264829778Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Oct 2 18:47:51.264984 env[1656]: time="2023-10-02T18:47:51.264892550Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Oct 2 18:47:51.265593 env[1656]: time="2023-10-02T18:47:51.265289690Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Oct 2 18:47:51.266810 env[1656]: time="2023-10-02T18:47:51.265597646Z" level=info msg="Connect containerd service" Oct 2 18:47:51.266810 env[1656]: time="2023-10-02T18:47:51.265682426Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Oct 2 18:47:51.267364 env[1656]: time="2023-10-02T18:47:51.267299066Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Oct 2 18:47:51.269181 env[1656]: time="2023-10-02T18:47:51.269086406Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Oct 2 18:47:51.270110 env[1656]: time="2023-10-02T18:47:51.270056258Z" level=info msg=serving... address=/run/containerd/containerd.sock Oct 2 18:47:51.270307 systemd[1]: Started containerd.service. Oct 2 18:47:51.274706 env[1656]: time="2023-10-02T18:47:51.274641122Z" level=info msg="containerd successfully booted in 0.375293s" Oct 2 18:47:51.279589 env[1656]: time="2023-10-02T18:47:51.277667666Z" level=info msg="Start subscribing containerd event" Oct 2 18:47:51.279589 env[1656]: time="2023-10-02T18:47:51.278083826Z" level=info msg="Start recovering state" Oct 2 18:47:51.279589 env[1656]: time="2023-10-02T18:47:51.278229914Z" level=info msg="Start event monitor" Oct 2 18:47:51.279589 env[1656]: time="2023-10-02T18:47:51.278380934Z" level=info msg="Start snapshots syncer" Oct 2 18:47:51.279589 env[1656]: time="2023-10-02T18:47:51.278417678Z" level=info msg="Start cni network conf syncer for default" Oct 2 18:47:51.279589 env[1656]: time="2023-10-02T18:47:51.278439794Z" level=info msg="Start streaming server" Oct 2 18:47:51.287103 tar[1645]: ./portmap Oct 2 18:47:51.316783 polkitd[1750]: Started polkitd version 121 Oct 2 18:47:51.368249 coreos-metadata[1631]: Oct 02 18:47:51.368 INFO Putting http://169.254.169.254/latest/api/token: Attempt #1 Oct 2 18:47:51.369413 coreos-metadata[1631]: Oct 02 18:47:51.369 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-keys: Attempt #1 Oct 2 18:47:51.373576 coreos-metadata[1631]: Oct 02 18:47:51.373 INFO Fetch successful Oct 2 18:47:51.373576 coreos-metadata[1631]: Oct 02 18:47:51.373 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-keys/0/openssh-key: Attempt #1 Oct 2 18:47:51.374612 coreos-metadata[1631]: Oct 02 18:47:51.374 INFO Fetch successful Oct 2 18:47:51.379397 unknown[1631]: wrote ssh authorized keys file for user: core Oct 2 18:47:51.382216 polkitd[1750]: Loading rules from directory /etc/polkit-1/rules.d Oct 2 18:47:51.385584 polkitd[1750]: Loading rules from directory /usr/share/polkit-1/rules.d Oct 2 18:47:51.398081 polkitd[1750]: Finished loading, compiling and executing 2 rules Oct 2 18:47:51.400468 dbus-daemon[1632]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' Oct 2 18:47:51.400804 systemd[1]: Started polkit.service. Oct 2 18:47:51.403652 polkitd[1750]: Acquired the name org.freedesktop.PolicyKit1 on the system bus Oct 2 18:47:51.411538 update-ssh-keys[1761]: Updated "/home/core/.ssh/authorized_keys" Oct 2 18:47:51.412499 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Oct 2 18:47:51.484638 systemd-resolved[1596]: System hostname changed to 'ip-172-31-16-118'. Oct 2 18:47:51.484761 systemd-hostnamed[1682]: Hostname set to (transient) Oct 2 18:47:51.524489 tar[1645]: ./host-local Oct 2 18:47:51.637835 amazon-ssm-agent[1629]: 2023-10-02 18:47:51 INFO Entering SSM Agent hibernate - AccessDeniedException: User: arn:aws:sts::075585003325:assumed-role/jenkins-test/i-0c7a9a8217494f83a is not authorized to perform: ssm:UpdateInstanceInformation on resource: arn:aws:ec2:us-west-2:075585003325:instance/i-0c7a9a8217494f83a because no identity-based policy allows the ssm:UpdateInstanceInformation action Oct 2 18:47:51.637835 amazon-ssm-agent[1629]: status code: 400, request id: 381e5e8b-b27d-4cbe-b056-af577cdd22fe Oct 2 18:47:51.638170 amazon-ssm-agent[1629]: 2023-10-02 18:47:51 INFO Agent is in hibernate mode. Reducing logging. Logging will be reduced to one log per backoff period Oct 2 18:47:51.666728 tar[1645]: ./vrf Oct 2 18:47:51.813074 tar[1645]: ./bridge Oct 2 18:47:51.932802 systemd[1]: Finished prepare-critools.service. Oct 2 18:47:51.969222 tar[1645]: ./tuning Oct 2 18:47:52.025086 tar[1645]: ./firewall Oct 2 18:47:52.090874 tar[1645]: ./host-device Oct 2 18:47:52.150811 tar[1645]: ./sbr Oct 2 18:47:52.203680 tar[1645]: ./loopback Oct 2 18:47:52.255829 tar[1645]: ./dhcp Oct 2 18:47:52.399902 tar[1645]: ./ptp Oct 2 18:47:52.461897 tar[1645]: ./ipvlan Oct 2 18:47:52.522315 tar[1645]: ./bandwidth Oct 2 18:47:52.607127 systemd[1]: Finished prepare-cni-plugins.service. Oct 2 18:47:52.640422 locksmithd[1684]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Oct 2 18:47:55.568402 sshd_keygen[1652]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Oct 2 18:47:55.633009 systemd[1]: Finished sshd-keygen.service. Oct 2 18:47:55.637930 systemd[1]: Starting issuegen.service... Oct 2 18:47:55.656841 systemd[1]: issuegen.service: Deactivated successfully. Oct 2 18:47:55.657238 systemd[1]: Finished issuegen.service. Oct 2 18:47:55.662053 systemd[1]: Starting systemd-user-sessions.service... Oct 2 18:47:55.684364 systemd[1]: Finished systemd-user-sessions.service. Oct 2 18:47:55.689547 systemd[1]: Started getty@tty1.service. Oct 2 18:47:55.694527 systemd[1]: Started serial-getty@ttyS0.service. Oct 2 18:47:55.696890 systemd[1]: Reached target getty.target. Oct 2 18:47:55.698849 systemd[1]: Reached target multi-user.target. Oct 2 18:47:55.703370 systemd[1]: Starting systemd-update-utmp-runlevel.service... Oct 2 18:47:55.727120 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Oct 2 18:47:55.727484 systemd[1]: Finished systemd-update-utmp-runlevel.service. Oct 2 18:47:55.729996 systemd[1]: Startup finished in 1.181s (kernel) + 13.370s (initrd) + 14.236s (userspace) = 28.788s. Oct 2 18:47:59.786011 systemd[1]: Created slice system-sshd.slice. Oct 2 18:47:59.789006 systemd[1]: Started sshd@0-172.31.16.118:22-139.178.89.65:45722.service. Oct 2 18:47:59.983412 sshd[1841]: Accepted publickey for core from 139.178.89.65 port 45722 ssh2: RSA SHA256:ePkK8jKoGlhN3AxcTQ2G+RQZHD5kDZhw675IJmRySH8 Oct 2 18:47:59.988020 sshd[1841]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 18:48:00.006130 systemd[1]: Created slice user-500.slice. Oct 2 18:48:00.008918 systemd[1]: Starting user-runtime-dir@500.service... Oct 2 18:48:00.016670 systemd-logind[1641]: New session 1 of user core. Oct 2 18:48:00.034324 systemd[1]: Finished user-runtime-dir@500.service. Oct 2 18:48:00.038548 systemd[1]: Starting user@500.service... Oct 2 18:48:00.049848 (systemd)[1844]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Oct 2 18:48:00.248332 systemd[1844]: Queued start job for default target default.target. Oct 2 18:48:00.249399 systemd[1844]: Reached target paths.target. Oct 2 18:48:00.249452 systemd[1844]: Reached target sockets.target. Oct 2 18:48:00.249484 systemd[1844]: Reached target timers.target. Oct 2 18:48:00.249514 systemd[1844]: Reached target basic.target. Oct 2 18:48:00.249641 systemd[1844]: Reached target default.target. Oct 2 18:48:00.249706 systemd[1844]: Startup finished in 182ms. Oct 2 18:48:00.250570 systemd[1]: Started user@500.service. Oct 2 18:48:00.252515 systemd[1]: Started session-1.scope. Oct 2 18:48:00.406998 systemd[1]: Started sshd@1-172.31.16.118:22-139.178.89.65:45726.service. Oct 2 18:48:00.595725 sshd[1853]: Accepted publickey for core from 139.178.89.65 port 45726 ssh2: RSA SHA256:ePkK8jKoGlhN3AxcTQ2G+RQZHD5kDZhw675IJmRySH8 Oct 2 18:48:00.599454 sshd[1853]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 18:48:00.606958 systemd-logind[1641]: New session 2 of user core. Oct 2 18:48:00.608796 systemd[1]: Started session-2.scope. Oct 2 18:48:00.756648 sshd[1853]: pam_unix(sshd:session): session closed for user core Oct 2 18:48:00.762829 systemd-logind[1641]: Session 2 logged out. Waiting for processes to exit. Oct 2 18:48:00.763700 systemd[1]: sshd@1-172.31.16.118:22-139.178.89.65:45726.service: Deactivated successfully. Oct 2 18:48:00.765012 systemd[1]: session-2.scope: Deactivated successfully. Oct 2 18:48:00.766414 systemd-logind[1641]: Removed session 2. Oct 2 18:48:00.788738 systemd[1]: Started sshd@2-172.31.16.118:22-139.178.89.65:45728.service. Oct 2 18:48:00.969786 sshd[1859]: Accepted publickey for core from 139.178.89.65 port 45728 ssh2: RSA SHA256:ePkK8jKoGlhN3AxcTQ2G+RQZHD5kDZhw675IJmRySH8 Oct 2 18:48:00.973427 sshd[1859]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 18:48:00.981244 systemd-logind[1641]: New session 3 of user core. Oct 2 18:48:00.982219 systemd[1]: Started session-3.scope. Oct 2 18:48:01.112242 sshd[1859]: pam_unix(sshd:session): session closed for user core Oct 2 18:48:01.117661 systemd-logind[1641]: Session 3 logged out. Waiting for processes to exit. Oct 2 18:48:01.118201 systemd[1]: sshd@2-172.31.16.118:22-139.178.89.65:45728.service: Deactivated successfully. Oct 2 18:48:01.119389 systemd[1]: session-3.scope: Deactivated successfully. Oct 2 18:48:01.121018 systemd-logind[1641]: Removed session 3. Oct 2 18:48:01.145707 systemd[1]: Started sshd@3-172.31.16.118:22-139.178.89.65:45732.service. Oct 2 18:48:01.333607 sshd[1865]: Accepted publickey for core from 139.178.89.65 port 45732 ssh2: RSA SHA256:ePkK8jKoGlhN3AxcTQ2G+RQZHD5kDZhw675IJmRySH8 Oct 2 18:48:01.336369 sshd[1865]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 18:48:01.345195 systemd-logind[1641]: New session 4 of user core. Oct 2 18:48:01.346142 systemd[1]: Started session-4.scope. Oct 2 18:48:01.494957 sshd[1865]: pam_unix(sshd:session): session closed for user core Oct 2 18:48:01.501594 systemd-logind[1641]: Session 4 logged out. Waiting for processes to exit. Oct 2 18:48:01.502177 systemd[1]: sshd@3-172.31.16.118:22-139.178.89.65:45732.service: Deactivated successfully. Oct 2 18:48:01.503384 systemd[1]: session-4.scope: Deactivated successfully. Oct 2 18:48:01.504815 systemd-logind[1641]: Removed session 4. Oct 2 18:48:01.527326 systemd[1]: Started sshd@4-172.31.16.118:22-139.178.89.65:45734.service. Oct 2 18:48:01.713608 sshd[1871]: Accepted publickey for core from 139.178.89.65 port 45734 ssh2: RSA SHA256:ePkK8jKoGlhN3AxcTQ2G+RQZHD5kDZhw675IJmRySH8 Oct 2 18:48:01.716858 sshd[1871]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 18:48:01.726303 systemd[1]: Started session-5.scope. Oct 2 18:48:01.727682 systemd-logind[1641]: New session 5 of user core. Oct 2 18:48:01.856992 sudo[1874]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Oct 2 18:48:01.857946 sudo[1874]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 2 18:48:01.874805 dbus-daemon[1632]: avc: received setenforce notice (enforcing=1) Oct 2 18:48:01.877767 sudo[1874]: pam_unix(sudo:session): session closed for user root Oct 2 18:48:01.902601 sshd[1871]: pam_unix(sshd:session): session closed for user core Oct 2 18:48:01.909772 systemd[1]: sshd@4-172.31.16.118:22-139.178.89.65:45734.service: Deactivated successfully. Oct 2 18:48:01.911209 systemd[1]: session-5.scope: Deactivated successfully. Oct 2 18:48:01.912425 systemd-logind[1641]: Session 5 logged out. Waiting for processes to exit. Oct 2 18:48:01.914444 systemd-logind[1641]: Removed session 5. Oct 2 18:48:01.931969 systemd[1]: Started sshd@5-172.31.16.118:22-139.178.89.65:45748.service. Oct 2 18:48:02.112726 sshd[1878]: Accepted publickey for core from 139.178.89.65 port 45748 ssh2: RSA SHA256:ePkK8jKoGlhN3AxcTQ2G+RQZHD5kDZhw675IJmRySH8 Oct 2 18:48:02.116545 sshd[1878]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 18:48:02.124877 systemd-logind[1641]: New session 6 of user core. Oct 2 18:48:02.125805 systemd[1]: Started session-6.scope. Oct 2 18:48:02.244890 sudo[1882]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Oct 2 18:48:02.245401 sudo[1882]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 2 18:48:02.252516 sudo[1882]: pam_unix(sudo:session): session closed for user root Oct 2 18:48:02.266098 sudo[1881]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Oct 2 18:48:02.267038 sudo[1881]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 2 18:48:02.291718 systemd[1]: Stopping audit-rules.service... Oct 2 18:48:02.296000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Oct 2 18:48:02.297742 auditctl[1885]: No rules Oct 2 18:48:02.299091 kernel: kauditd_printk_skb: 79 callbacks suppressed Oct 2 18:48:02.299147 kernel: audit: type=1305 audit(1696272482.296:168): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Oct 2 18:48:02.300099 systemd[1]: audit-rules.service: Deactivated successfully. Oct 2 18:48:02.300623 systemd[1]: Stopped audit-rules.service. Oct 2 18:48:02.296000 audit[1885]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=fffffcbc0320 a2=420 a3=0 items=0 ppid=1 pid=1885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:48:02.309898 systemd[1]: Starting audit-rules.service... Oct 2 18:48:02.317600 kernel: audit: type=1300 audit(1696272482.296:168): arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=fffffcbc0320 a2=420 a3=0 items=0 ppid=1 pid=1885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:48:02.296000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Oct 2 18:48:02.322167 kernel: audit: type=1327 audit(1696272482.296:168): proctitle=2F7362696E2F617564697463746C002D44 Oct 2 18:48:02.322260 kernel: audit: type=1131 audit(1696272482.300:169): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:48:02.300000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:48:02.376610 augenrules[1902]: No rules Oct 2 18:48:02.377773 systemd[1]: Finished audit-rules.service. Oct 2 18:48:02.377000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:48:02.387839 sudo[1881]: pam_unix(sudo:session): session closed for user root Oct 2 18:48:02.387000 audit[1881]: USER_END pid=1881 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 18:48:02.398544 kernel: audit: type=1130 audit(1696272482.377:170): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:48:02.398625 kernel: audit: type=1106 audit(1696272482.387:171): pid=1881 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 18:48:02.387000 audit[1881]: CRED_DISP pid=1881 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 18:48:02.407903 kernel: audit: type=1104 audit(1696272482.387:172): pid=1881 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 18:48:02.419919 sshd[1878]: pam_unix(sshd:session): session closed for user core Oct 2 18:48:02.421000 audit[1878]: USER_END pid=1878 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:48:02.421000 audit[1878]: CRED_DISP pid=1878 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:48:02.445606 kernel: audit: type=1106 audit(1696272482.421:173): pid=1878 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:48:02.445694 kernel: audit: type=1104 audit(1696272482.421:174): pid=1878 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:48:02.446039 systemd[1]: sshd@5-172.31.16.118:22-139.178.89.65:45748.service: Deactivated successfully. Oct 2 18:48:02.445000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.31.16.118:22-139.178.89.65:45748 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:48:02.447258 systemd[1]: session-6.scope: Deactivated successfully. Oct 2 18:48:02.457366 systemd-logind[1641]: Session 6 logged out. Waiting for processes to exit. Oct 2 18:48:02.459601 kernel: audit: type=1131 audit(1696272482.445:175): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.31.16.118:22-139.178.89.65:45748 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:48:02.467248 systemd[1]: Started sshd@6-172.31.16.118:22-139.178.89.65:45750.service. Oct 2 18:48:02.467000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.16.118:22-139.178.89.65:45750 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:48:02.470379 systemd-logind[1641]: Removed session 6. Oct 2 18:48:02.650000 audit[1908]: USER_ACCT pid=1908 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:48:02.652361 sshd[1908]: Accepted publickey for core from 139.178.89.65 port 45750 ssh2: RSA SHA256:ePkK8jKoGlhN3AxcTQ2G+RQZHD5kDZhw675IJmRySH8 Oct 2 18:48:02.653000 audit[1908]: CRED_ACQ pid=1908 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:48:02.653000 audit[1908]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe4816e10 a2=3 a3=1 items=0 ppid=1 pid=1908 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:48:02.653000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 18:48:02.654976 sshd[1908]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 18:48:02.664153 systemd[1]: Started session-7.scope. Oct 2 18:48:02.665104 systemd-logind[1641]: New session 7 of user core. Oct 2 18:48:02.673000 audit[1908]: USER_START pid=1908 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:48:02.680000 audit[1910]: CRED_ACQ pid=1910 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:48:02.783000 audit[1911]: USER_ACCT pid=1911 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 18:48:02.784332 sudo[1911]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Oct 2 18:48:02.784000 audit[1911]: CRED_REFR pid=1911 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 18:48:02.785414 sudo[1911]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 2 18:48:02.789000 audit[1911]: USER_START pid=1911 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 18:48:03.518170 systemd[1]: Starting docker.service... Oct 2 18:48:03.625812 env[1926]: time="2023-10-02T18:48:03.625722987Z" level=info msg="Starting up" Oct 2 18:48:03.629193 env[1926]: time="2023-10-02T18:48:03.629143695Z" level=info msg="parsed scheme: \"unix\"" module=grpc Oct 2 18:48:03.629461 env[1926]: time="2023-10-02T18:48:03.629433135Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Oct 2 18:48:03.629637 env[1926]: time="2023-10-02T18:48:03.629603595Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Oct 2 18:48:03.629745 env[1926]: time="2023-10-02T18:48:03.629717967Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Oct 2 18:48:03.633591 env[1926]: time="2023-10-02T18:48:03.633530451Z" level=info msg="parsed scheme: \"unix\"" module=grpc Oct 2 18:48:03.633831 env[1926]: time="2023-10-02T18:48:03.633801279Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Oct 2 18:48:03.633961 env[1926]: time="2023-10-02T18:48:03.633927423Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Oct 2 18:48:03.634067 env[1926]: time="2023-10-02T18:48:03.634040343Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Oct 2 18:48:03.647205 systemd[1]: var-lib-docker-check\x2doverlayfs\x2dsupport660431377-merged.mount: Deactivated successfully. Oct 2 18:48:03.680192 env[1926]: time="2023-10-02T18:48:03.680135296Z" level=info msg="Loading containers: start." Oct 2 18:48:03.792000 audit[1957]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1957 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:48:03.792000 audit[1957]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=116 a0=3 a1=ffffef0333a0 a2=0 a3=1 items=0 ppid=1926 pid=1957 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:48:03.792000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Oct 2 18:48:03.799000 audit[1959]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1959 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:48:03.799000 audit[1959]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=124 a0=3 a1=ffffdec79840 a2=0 a3=1 items=0 ppid=1926 pid=1959 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:48:03.799000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Oct 2 18:48:03.806000 audit[1961]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1961 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:48:03.806000 audit[1961]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=112 a0=3 a1=ffffd16fbbd0 a2=0 a3=1 items=0 ppid=1926 pid=1961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:48:03.806000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Oct 2 18:48:03.813000 audit[1963]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1963 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:48:03.813000 audit[1963]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=112 a0=3 a1=fffff7233620 a2=0 a3=1 items=0 ppid=1926 pid=1963 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:48:03.813000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Oct 2 18:48:03.820000 audit[1965]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1965 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:48:03.820000 audit[1965]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffea403260 a2=0 a3=1 items=0 ppid=1926 pid=1965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:48:03.820000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Oct 2 18:48:03.855000 audit[1970]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1970 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:48:03.855000 audit[1970]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffd4a600a0 a2=0 a3=1 items=0 ppid=1926 pid=1970 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:48:03.855000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Oct 2 18:48:03.871000 audit[1972]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1972 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:48:03.871000 audit[1972]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=fffffd81ba70 a2=0 a3=1 items=0 ppid=1926 pid=1972 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:48:03.871000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Oct 2 18:48:03.879000 audit[1974]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1974 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:48:03.879000 audit[1974]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=212 a0=3 a1=ffffe38334d0 a2=0 a3=1 items=0 ppid=1926 pid=1974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:48:03.879000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Oct 2 18:48:03.885000 audit[1976]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1976 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:48:03.885000 audit[1976]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=308 a0=3 a1=fffff5c64130 a2=0 a3=1 items=0 ppid=1926 pid=1976 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:48:03.885000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Oct 2 18:48:03.908000 audit[1980]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1980 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:48:03.908000 audit[1980]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=216 a0=3 a1=ffffd0d4c140 a2=0 a3=1 items=0 ppid=1926 pid=1980 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:48:03.908000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Oct 2 18:48:03.912000 audit[1981]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1981 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:48:03.912000 audit[1981]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=224 a0=3 a1=fffff1c004a0 a2=0 a3=1 items=0 ppid=1926 pid=1981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:48:03.912000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Oct 2 18:48:03.925598 kernel: Initializing XFRM netlink socket Oct 2 18:48:03.968727 env[1926]: time="2023-10-02T18:48:03.968656025Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Oct 2 18:48:03.971012 (udev-worker)[1937]: Network interface NamePolicy= disabled on kernel command line. Oct 2 18:48:04.005000 audit[1989]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1989 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:48:04.005000 audit[1989]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=492 a0=3 a1=fffff1a26390 a2=0 a3=1 items=0 ppid=1926 pid=1989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:48:04.005000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Oct 2 18:48:04.029000 audit[1992]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1992 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:48:04.029000 audit[1992]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=288 a0=3 a1=fffff60e7d40 a2=0 a3=1 items=0 ppid=1926 pid=1992 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:48:04.029000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Oct 2 18:48:04.039000 audit[1995]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1995 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:48:04.039000 audit[1995]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=376 a0=3 a1=ffffe24ace50 a2=0 a3=1 items=0 ppid=1926 pid=1995 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:48:04.039000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Oct 2 18:48:04.046000 audit[1997]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1997 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:48:04.046000 audit[1997]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=376 a0=3 a1=fffff8098e80 a2=0 a3=1 items=0 ppid=1926 pid=1997 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:48:04.046000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Oct 2 18:48:04.053000 audit[1999]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1999 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:48:04.053000 audit[1999]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=356 a0=3 a1=ffffd45383a0 a2=0 a3=1 items=0 ppid=1926 pid=1999 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:48:04.053000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Oct 2 18:48:04.061000 audit[2001]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=2001 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:48:04.061000 audit[2001]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=444 a0=3 a1=ffffea33d650 a2=0 a3=1 items=0 ppid=1926 pid=2001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:48:04.061000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Oct 2 18:48:04.068000 audit[2003]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=2003 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:48:04.068000 audit[2003]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=304 a0=3 a1=fffff5826a00 a2=0 a3=1 items=0 ppid=1926 pid=2003 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:48:04.068000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Oct 2 18:48:04.087000 audit[2006]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=2006 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:48:04.087000 audit[2006]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=508 a0=3 a1=ffffdc5e1ad0 a2=0 a3=1 items=0 ppid=1926 pid=2006 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:48:04.087000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Oct 2 18:48:04.095000 audit[2008]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=2008 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:48:04.095000 audit[2008]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=240 a0=3 a1=fffffacb71f0 a2=0 a3=1 items=0 ppid=1926 pid=2008 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:48:04.095000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Oct 2 18:48:04.102000 audit[2010]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=2010 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:48:04.102000 audit[2010]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=428 a0=3 a1=fffff9b24a60 a2=0 a3=1 items=0 ppid=1926 pid=2010 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:48:04.102000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Oct 2 18:48:04.109000 audit[2012]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=2012 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:48:04.109000 audit[2012]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffee675c60 a2=0 a3=1 items=0 ppid=1926 pid=2012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:48:04.109000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Oct 2 18:48:04.110843 systemd-networkd[1457]: docker0: Link UP Oct 2 18:48:04.133000 audit[2016]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=2016 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:48:04.133000 audit[2016]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffded2cfc0 a2=0 a3=1 items=0 ppid=1926 pid=2016 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:48:04.133000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Oct 2 18:48:04.137000 audit[2017]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=2017 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:48:04.137000 audit[2017]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=224 a0=3 a1=ffffc3b35ce0 a2=0 a3=1 items=0 ppid=1926 pid=2017 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:48:04.137000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Oct 2 18:48:04.138664 env[1926]: time="2023-10-02T18:48:04.138623042Z" level=info msg="Loading containers: done." Oct 2 18:48:04.169297 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck1121983180-merged.mount: Deactivated successfully. Oct 2 18:48:04.178130 env[1926]: time="2023-10-02T18:48:04.178059086Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Oct 2 18:48:04.178854 env[1926]: time="2023-10-02T18:48:04.178822430Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Oct 2 18:48:04.179206 env[1926]: time="2023-10-02T18:48:04.179180822Z" level=info msg="Daemon has completed initialization" Oct 2 18:48:04.213015 systemd[1]: Started docker.service. Oct 2 18:48:04.212000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:48:04.226892 env[1926]: time="2023-10-02T18:48:04.226707722Z" level=info msg="API listen on /run/docker.sock" Oct 2 18:48:04.282226 systemd[1]: Reloading. Oct 2 18:48:04.460366 /usr/lib/systemd/system-generators/torcx-generator[2063]: time="2023-10-02T18:48:04Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.0 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.0 /var/lib/torcx/store]" Oct 2 18:48:04.462765 /usr/lib/systemd/system-generators/torcx-generator[2063]: time="2023-10-02T18:48:04Z" level=info msg="torcx already run" Oct 2 18:48:04.700548 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 2 18:48:04.701089 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 2 18:48:04.738683 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 2 18:48:04.893000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.893000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.893000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.893000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.893000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.893000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.893000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.893000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.894000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.894000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.894000 audit: BPF prog-id=40 op=LOAD Oct 2 18:48:04.895000 audit: BPF prog-id=21 op=UNLOAD Oct 2 18:48:04.895000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.895000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.895000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.895000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.895000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.895000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.895000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.895000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.896000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.896000 audit: BPF prog-id=41 op=LOAD Oct 2 18:48:04.896000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.896000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.896000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.896000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.896000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.896000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.896000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.897000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.897000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.897000 audit: BPF prog-id=42 op=LOAD Oct 2 18:48:04.897000 audit: BPF prog-id=22 op=UNLOAD Oct 2 18:48:04.897000 audit: BPF prog-id=23 op=UNLOAD Oct 2 18:48:04.903000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.903000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.903000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.903000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.903000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.903000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.903000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.903000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.903000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.904000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.904000 audit: BPF prog-id=43 op=LOAD Oct 2 18:48:04.904000 audit: BPF prog-id=30 op=UNLOAD Oct 2 18:48:04.906000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.906000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.906000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.906000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.906000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.906000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.906000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.906000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.906000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.907000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.907000 audit: BPF prog-id=44 op=LOAD Oct 2 18:48:04.907000 audit: BPF prog-id=38 op=UNLOAD Oct 2 18:48:04.908000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.908000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.908000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.908000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.908000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.908000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.908000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.908000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.908000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.909000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.909000 audit: BPF prog-id=45 op=LOAD Oct 2 18:48:04.909000 audit: BPF prog-id=26 op=UNLOAD Oct 2 18:48:04.914000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.914000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.914000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.914000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.914000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.914000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.914000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.914000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.914000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.914000 audit: BPF prog-id=46 op=LOAD Oct 2 18:48:04.915000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.915000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.915000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.915000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.915000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.915000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.915000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.915000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.915000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.915000 audit: BPF prog-id=47 op=LOAD Oct 2 18:48:04.916000 audit: BPF prog-id=24 op=UNLOAD Oct 2 18:48:04.916000 audit: BPF prog-id=25 op=UNLOAD Oct 2 18:48:04.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.919000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.919000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.919000 audit: BPF prog-id=48 op=LOAD Oct 2 18:48:04.919000 audit: BPF prog-id=35 op=UNLOAD Oct 2 18:48:04.920000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.920000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.920000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.920000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.920000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.920000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.920000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.920000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.920000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.920000 audit: BPF prog-id=49 op=LOAD Oct 2 18:48:04.921000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.921000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.921000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.921000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.921000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.921000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.921000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.921000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.921000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.921000 audit: BPF prog-id=50 op=LOAD Oct 2 18:48:04.922000 audit: BPF prog-id=36 op=UNLOAD Oct 2 18:48:04.922000 audit: BPF prog-id=37 op=UNLOAD Oct 2 18:48:04.923000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.923000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.923000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.923000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.923000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.923000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.923000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.923000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.924000 audit: BPF prog-id=51 op=LOAD Oct 2 18:48:04.924000 audit: BPF prog-id=32 op=UNLOAD Oct 2 18:48:04.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.924000 audit: BPF prog-id=52 op=LOAD Oct 2 18:48:04.925000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.925000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.925000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.925000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.925000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.925000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.925000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.925000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.925000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.925000 audit: BPF prog-id=53 op=LOAD Oct 2 18:48:04.925000 audit: BPF prog-id=33 op=UNLOAD Oct 2 18:48:04.925000 audit: BPF prog-id=34 op=UNLOAD Oct 2 18:48:04.927000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.927000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.927000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.927000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.927000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.927000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.927000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.927000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.927000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.927000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.927000 audit: BPF prog-id=54 op=LOAD Oct 2 18:48:04.927000 audit: BPF prog-id=31 op=UNLOAD Oct 2 18:48:04.928000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.928000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.928000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.928000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.928000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.928000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.928000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.928000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.928000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.928000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.928000 audit: BPF prog-id=55 op=LOAD Oct 2 18:48:04.928000 audit: BPF prog-id=27 op=UNLOAD Oct 2 18:48:04.928000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.928000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.928000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.928000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.928000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.928000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.928000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.928000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.929000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.929000 audit: BPF prog-id=56 op=LOAD Oct 2 18:48:04.929000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.929000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.929000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.929000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.929000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.929000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.929000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.929000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.929000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:04.929000 audit: BPF prog-id=57 op=LOAD Oct 2 18:48:04.929000 audit: BPF prog-id=28 op=UNLOAD Oct 2 18:48:04.929000 audit: BPF prog-id=29 op=UNLOAD Oct 2 18:48:04.975000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:48:04.973254 systemd[1]: Started kubelet.service. Oct 2 18:48:05.183826 kubelet[2118]: E1002 18:48:05.183747 2118 run.go:74] "command failed" err="failed to load kubelet config file, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory, path: /var/lib/kubelet/config.yaml" Oct 2 18:48:05.188059 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Oct 2 18:48:05.188376 systemd[1]: kubelet.service: Failed with result 'exit-code'. Oct 2 18:48:05.188000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 2 18:48:05.550255 env[1656]: time="2023-10-02T18:48:05.550192001Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.25.14\"" Oct 2 18:48:06.259811 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2207568446.mount: Deactivated successfully. Oct 2 18:48:08.465568 env[1656]: time="2023-10-02T18:48:08.465494503Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.25.14,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:48:08.468393 env[1656]: time="2023-10-02T18:48:08.468326791Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ebd6eba6928e5f8f82d90c8538a99543a7f31a39cfbb40e52bf9c5486da9a2dc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:48:08.472085 env[1656]: time="2023-10-02T18:48:08.472035391Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.25.14,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:48:08.476415 env[1656]: time="2023-10-02T18:48:08.476353579Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:bb3eff7d20d94d44ffea47066a4400a70ede58abd9de01c80400817a955397b4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:48:08.478429 env[1656]: time="2023-10-02T18:48:08.478339435Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.25.14\" returns image reference \"sha256:ebd6eba6928e5f8f82d90c8538a99543a7f31a39cfbb40e52bf9c5486da9a2dc\"" Oct 2 18:48:08.507168 env[1656]: time="2023-10-02T18:48:08.507098372Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.25.14\"" Oct 2 18:48:11.133260 env[1656]: time="2023-10-02T18:48:11.133190589Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.25.14,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:48:11.136664 env[1656]: time="2023-10-02T18:48:11.136612017Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:439086a7540e058995295148eb4f15a3d14f129b494e3d5645fb1742cd799c1e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:48:11.141013 env[1656]: time="2023-10-02T18:48:11.140951973Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.25.14,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:48:11.145296 env[1656]: time="2023-10-02T18:48:11.145239381Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:44d63bed8020f7610851a1a653ad7c6df83bd02ad128303de939a39997854ace,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:48:11.146015 env[1656]: time="2023-10-02T18:48:11.145965021Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.25.14\" returns image reference \"sha256:439086a7540e058995295148eb4f15a3d14f129b494e3d5645fb1742cd799c1e\"" Oct 2 18:48:11.176948 env[1656]: time="2023-10-02T18:48:11.176897541Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.25.14\"" Oct 2 18:48:12.660607 env[1656]: time="2023-10-02T18:48:12.660514944Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.25.14,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:48:12.665323 env[1656]: time="2023-10-02T18:48:12.665259180Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4405f55bf1c9d908a16c5c9894679cdf78c6235dd653ca6d7cb78a8d7b4644d0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:48:12.668648 env[1656]: time="2023-10-02T18:48:12.668490468Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.25.14,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:48:12.672474 env[1656]: time="2023-10-02T18:48:12.672426156Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:207b36120eca76bf8607682a3ee37e12b5156b921a9379d776b297ab01ca8198,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:48:12.673973 env[1656]: time="2023-10-02T18:48:12.673927320Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.25.14\" returns image reference \"sha256:4405f55bf1c9d908a16c5c9894679cdf78c6235dd653ca6d7cb78a8d7b4644d0\"" Oct 2 18:48:12.703057 env[1656]: time="2023-10-02T18:48:12.703007208Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.25.14\"" Oct 2 18:48:13.995197 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1216058904.mount: Deactivated successfully. Oct 2 18:48:14.618931 env[1656]: time="2023-10-02T18:48:14.618861686Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.25.14,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:48:14.621875 env[1656]: time="2023-10-02T18:48:14.621813674Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:36ad84e6a838b02d80a9db87b13c83185253f647e2af2f58f91ac1346103ff4e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:48:14.624738 env[1656]: time="2023-10-02T18:48:14.624688874Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.25.14,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:48:14.627065 env[1656]: time="2023-10-02T18:48:14.627024314Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:4a23f328943342be6a3eeda75cc7a01d175bcf8b096611c97d2aa14c843cf326,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:48:14.627962 env[1656]: time="2023-10-02T18:48:14.627919250Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.25.14\" returns image reference \"sha256:36ad84e6a838b02d80a9db87b13c83185253f647e2af2f58f91ac1346103ff4e\"" Oct 2 18:48:14.657223 env[1656]: time="2023-10-02T18:48:14.657174662Z" level=info msg="PullImage \"registry.k8s.io/pause:3.8\"" Oct 2 18:48:15.171444 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount286434455.mount: Deactivated successfully. Oct 2 18:48:15.181707 env[1656]: time="2023-10-02T18:48:15.181633633Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:48:15.185595 env[1656]: time="2023-10-02T18:48:15.185519353Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4e42fb3c9d90ed7895bc04a9d96fe3102a65b521f485cc5a4f3dd818afef9cef,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:48:15.194440 env[1656]: time="2023-10-02T18:48:15.194340361Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:48:15.201500 env[1656]: time="2023-10-02T18:48:15.201442489Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:9001185023633d17a2f98ff69b6ff2615b8ea02a825adffa40422f51dfdcde9d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:48:15.202292 env[1656]: time="2023-10-02T18:48:15.202242313Z" level=info msg="PullImage \"registry.k8s.io/pause:3.8\" returns image reference \"sha256:4e42fb3c9d90ed7895bc04a9d96fe3102a65b521f485cc5a4f3dd818afef9cef\"" Oct 2 18:48:15.230677 env[1656]: time="2023-10-02T18:48:15.230621641Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.6-0\"" Oct 2 18:48:15.261246 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Oct 2 18:48:15.272868 kernel: kauditd_printk_skb: 292 callbacks suppressed Oct 2 18:48:15.273047 kernel: audit: type=1130 audit(1696272495.261:418): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:48:15.261000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:48:15.261634 systemd[1]: Stopped kubelet.service. Oct 2 18:48:15.264249 systemd[1]: Started kubelet.service. Oct 2 18:48:15.281656 kernel: audit: type=1131 audit(1696272495.261:419): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:48:15.261000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:48:15.263000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:48:15.289939 kernel: audit: type=1130 audit(1696272495.263:420): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:48:15.420497 kubelet[2161]: E1002 18:48:15.420432 2161 run.go:74] "command failed" err="failed to load kubelet config file, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory, path: /var/lib/kubelet/config.yaml" Oct 2 18:48:15.429140 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Oct 2 18:48:15.429459 systemd[1]: kubelet.service: Failed with result 'exit-code'. Oct 2 18:48:15.429000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 2 18:48:15.439624 kernel: audit: type=1131 audit(1696272495.429:421): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 2 18:48:16.462402 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3267147224.mount: Deactivated successfully. Oct 2 18:48:19.763118 env[1656]: time="2023-10-02T18:48:19.763048879Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.6-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:48:19.766122 env[1656]: time="2023-10-02T18:48:19.766054940Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ef245802824036d4a23ba6f8b3f04c055416f9dc73a54d546b1f98ad16f6b8cb,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:48:19.769637 env[1656]: time="2023-10-02T18:48:19.769518248Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.6-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:48:19.773090 env[1656]: time="2023-10-02T18:48:19.773039720Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:dd75ec974b0a2a6f6bb47001ba09207976e625db898d1b16735528c009cb171c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:48:19.775163 env[1656]: time="2023-10-02T18:48:19.775084256Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.6-0\" returns image reference \"sha256:ef245802824036d4a23ba6f8b3f04c055416f9dc73a54d546b1f98ad16f6b8cb\"" Oct 2 18:48:19.804348 env[1656]: time="2023-10-02T18:48:19.804298520Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.9.3\"" Oct 2 18:48:20.385087 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2290648194.mount: Deactivated successfully. Oct 2 18:48:21.107642 env[1656]: time="2023-10-02T18:48:21.107538750Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.9.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:48:21.110130 env[1656]: time="2023-10-02T18:48:21.110062290Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b19406328e70dd2f6a36d6dbe4e867b0684ced2fdeb2f02ecb54ead39ec0bac0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:48:21.113840 env[1656]: time="2023-10-02T18:48:21.113784114Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.9.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:48:21.117089 env[1656]: time="2023-10-02T18:48:21.115793946Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:8e352a029d304ca7431c6507b56800636c321cb52289686a581ab70aaa8a2e2a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:48:21.117225 env[1656]: time="2023-10-02T18:48:21.117038394Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.9.3\" returns image reference \"sha256:b19406328e70dd2f6a36d6dbe4e867b0684ced2fdeb2f02ecb54ead39ec0bac0\"" Oct 2 18:48:21.515000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:48:21.515800 systemd[1]: systemd-hostnamed.service: Deactivated successfully. Oct 2 18:48:21.525612 kernel: audit: type=1131 audit(1696272501.515:422): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:48:21.545940 kernel: audit: type=1334 audit(1696272501.540:423): prog-id=50 op=UNLOAD Oct 2 18:48:21.546067 kernel: audit: type=1334 audit(1696272501.540:424): prog-id=49 op=UNLOAD Oct 2 18:48:21.540000 audit: BPF prog-id=50 op=UNLOAD Oct 2 18:48:21.540000 audit: BPF prog-id=49 op=UNLOAD Oct 2 18:48:21.540000 audit: BPF prog-id=48 op=UNLOAD Oct 2 18:48:21.546575 kernel: audit: type=1334 audit(1696272501.540:425): prog-id=48 op=UNLOAD Oct 2 18:48:25.511264 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Oct 2 18:48:25.511648 systemd[1]: Stopped kubelet.service. Oct 2 18:48:25.511000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:48:25.514489 systemd[1]: Started kubelet.service. Oct 2 18:48:25.511000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:48:25.535522 kernel: audit: type=1130 audit(1696272505.511:426): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:48:25.535689 kernel: audit: type=1131 audit(1696272505.511:427): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:48:25.511000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:48:25.549482 kernel: audit: type=1130 audit(1696272505.511:428): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:48:25.674497 kubelet[2232]: E1002 18:48:25.674416 2232 run.go:74] "command failed" err="failed to load kubelet config file, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory, path: /var/lib/kubelet/config.yaml" Oct 2 18:48:25.678247 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Oct 2 18:48:25.678599 systemd[1]: kubelet.service: Failed with result 'exit-code'. Oct 2 18:48:25.678000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 2 18:48:25.687650 kernel: audit: type=1131 audit(1696272505.678:429): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 2 18:48:28.210496 systemd[1]: Stopped kubelet.service. Oct 2 18:48:28.210000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:48:28.212000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:48:28.227896 kernel: audit: type=1130 audit(1696272508.210:430): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:48:28.228019 kernel: audit: type=1131 audit(1696272508.212:431): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:48:28.260281 systemd[1]: Reloading. Oct 2 18:48:28.454797 /usr/lib/systemd/system-generators/torcx-generator[2262]: time="2023-10-02T18:48:28Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.0 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.0 /var/lib/torcx/store]" Oct 2 18:48:28.454856 /usr/lib/systemd/system-generators/torcx-generator[2262]: time="2023-10-02T18:48:28Z" level=info msg="torcx already run" Oct 2 18:48:28.678807 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 2 18:48:28.678849 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 2 18:48:28.716775 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 2 18:48:28.869000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:28.889160 kernel: audit: type=1400 audit(1696272508.869:432): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:28.889275 kernel: audit: type=1400 audit(1696272508.869:433): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:28.869000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:28.869000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:28.898847 kernel: audit: type=1400 audit(1696272508.869:434): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:28.869000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:28.906509 kernel: audit: type=1400 audit(1696272508.869:435): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:28.906619 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Oct 2 18:48:28.869000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:28.916202 kernel: audit: type=1400 audit(1696272508.869:436): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:28.916267 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 Oct 2 18:48:28.869000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:28.926206 kernel: audit: type=1400 audit(1696272508.869:437): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:28.869000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:28.869000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:28.869000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:28.876000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:28.876000 audit: BPF prog-id=58 op=LOAD Oct 2 18:48:28.876000 audit: BPF prog-id=40 op=UNLOAD Oct 2 18:48:28.876000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:28.876000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:28.876000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:28.876000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:28.876000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:28.876000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:28.876000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:28.876000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:28.877000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:28.877000 audit: BPF prog-id=59 op=LOAD Oct 2 18:48:28.877000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:28.877000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:28.877000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:28.877000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:28.877000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:28.877000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:28.877000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:28.877000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:28.877000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:28.877000 audit: BPF prog-id=60 op=LOAD Oct 2 18:48:28.877000 audit: BPF prog-id=41 op=UNLOAD Oct 2 18:48:28.877000 audit: BPF prog-id=42 op=UNLOAD Oct 2 18:48:28.882000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:28.882000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:28.882000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:28.882000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:28.882000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:28.882000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:28.882000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:28.882000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:28.882000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:28.888000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:28.888000 audit: BPF prog-id=61 op=LOAD Oct 2 18:48:28.888000 audit: BPF prog-id=43 op=UNLOAD Oct 2 18:48:28.890000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:28.890000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:28.890000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:28.890000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:28.890000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:28.890000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:28.890000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:28.890000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:28.890000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:28.898000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:28.898000 audit: BPF prog-id=62 op=LOAD Oct 2 18:48:28.898000 audit: BPF prog-id=44 op=UNLOAD Oct 2 18:48:28.899000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:28.899000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:28.899000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:28.899000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:28.899000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:28.899000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:28.899000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:28.899000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:28.899000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:28.905000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:28.905000 audit: BPF prog-id=63 op=LOAD Oct 2 18:48:28.922000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:28.922000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:28.925000 audit: BPF prog-id=46 op=UNLOAD Oct 2 18:48:28.931000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:28.931000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:28.931000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:28.931000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:28.931000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:28.931000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:28.931000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:28.931000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:28.931000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:28.932000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:28.932000 audit: BPF prog-id=66 op=LOAD Oct 2 18:48:28.932000 audit: BPF prog-id=51 op=UNLOAD Oct 2 18:48:28.932000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:28.932000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:28.932000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:28.932000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:28.932000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:28.932000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:28.932000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:28.932000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:28.932000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:28.932000 audit: BPF prog-id=67 op=LOAD Oct 2 18:48:28.932000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:28.932000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:28.932000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:28.932000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:28.932000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:28.932000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:28.932000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:28.932000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:28.932000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:28.932000 audit: BPF prog-id=68 op=LOAD Oct 2 18:48:28.932000 audit: BPF prog-id=52 op=UNLOAD Oct 2 18:48:28.932000 audit: BPF prog-id=53 op=UNLOAD Oct 2 18:48:28.934000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:28.934000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:28.935000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:28.935000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:28.935000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:28.935000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:28.935000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:28.935000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:28.935000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:28.935000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:28.935000 audit: BPF prog-id=69 op=LOAD Oct 2 18:48:28.935000 audit: BPF prog-id=54 op=UNLOAD Oct 2 18:48:28.935000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:28.936000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:28.936000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:28.936000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:28.936000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:28.936000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:28.936000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:28.936000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:28.936000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:28.936000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:28.936000 audit: BPF prog-id=70 op=LOAD Oct 2 18:48:28.936000 audit: BPF prog-id=55 op=UNLOAD Oct 2 18:48:28.936000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:28.936000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:28.936000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:28.936000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:28.936000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:28.936000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:28.936000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:28.936000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:28.936000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:28.936000 audit: BPF prog-id=71 op=LOAD Oct 2 18:48:28.936000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:28.936000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:28.936000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:28.936000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:28.936000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:28.936000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:28.936000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:28.936000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:28.936000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:28.936000 audit: BPF prog-id=72 op=LOAD Oct 2 18:48:28.936000 audit: BPF prog-id=56 op=UNLOAD Oct 2 18:48:28.936000 audit: BPF prog-id=57 op=UNLOAD Oct 2 18:48:28.975000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:48:28.975818 systemd[1]: Started kubelet.service. Oct 2 18:48:29.122513 kubelet[2317]: Flag --container-runtime has been deprecated, will be removed in 1.27 as the only valid value is 'remote' Oct 2 18:48:29.123018 kubelet[2317]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Oct 2 18:48:29.123114 kubelet[2317]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Oct 2 18:48:29.123447 kubelet[2317]: I1002 18:48:29.123395 2317 server.go:200] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Oct 2 18:48:29.125992 kubelet[2317]: Flag --container-runtime has been deprecated, will be removed in 1.27 as the only valid value is 'remote' Oct 2 18:48:29.126148 kubelet[2317]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Oct 2 18:48:29.126243 kubelet[2317]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Oct 2 18:48:30.645285 kubelet[2317]: I1002 18:48:30.645234 2317 server.go:413] "Kubelet version" kubeletVersion="v1.25.10" Oct 2 18:48:30.645285 kubelet[2317]: I1002 18:48:30.645290 2317 server.go:415] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Oct 2 18:48:30.645918 kubelet[2317]: I1002 18:48:30.645723 2317 server.go:825] "Client rotation is on, will bootstrap in background" Oct 2 18:48:30.655617 kubelet[2317]: E1002 18:48:30.655580 2317 certificate_manager.go:471] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://172.31.16.118:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 172.31.16.118:6443: connect: connection refused Oct 2 18:48:30.655856 kubelet[2317]: I1002 18:48:30.655829 2317 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Oct 2 18:48:30.656077 kubelet[2317]: W1002 18:48:30.655886 2317 machine.go:65] Cannot read vendor id correctly, set empty. Oct 2 18:48:30.657419 kubelet[2317]: I1002 18:48:30.657392 2317 server.go:660] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Oct 2 18:48:30.658002 kubelet[2317]: I1002 18:48:30.657981 2317 container_manager_linux.go:262] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Oct 2 18:48:30.658219 kubelet[2317]: I1002 18:48:30.658198 2317 container_manager_linux.go:267] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:} {Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:} {Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] ExperimentalCPUManagerPolicy:none ExperimentalCPUManagerPolicyOptions:map[] ExperimentalTopologyManagerScope:container ExperimentalCPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] ExperimentalPodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms ExperimentalTopologyManagerPolicy:none} Oct 2 18:48:30.658586 kubelet[2317]: I1002 18:48:30.658532 2317 topology_manager.go:134] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Oct 2 18:48:30.658721 kubelet[2317]: I1002 18:48:30.658702 2317 container_manager_linux.go:302] "Creating device plugin manager" devicePluginEnabled=true Oct 2 18:48:30.658959 kubelet[2317]: I1002 18:48:30.658939 2317 state_mem.go:36] "Initialized new in-memory state store" Oct 2 18:48:30.664695 kubelet[2317]: I1002 18:48:30.664660 2317 kubelet.go:381] "Attempting to sync node with API server" Oct 2 18:48:30.664917 kubelet[2317]: I1002 18:48:30.664896 2317 kubelet.go:270] "Adding static pod path" path="/etc/kubernetes/manifests" Oct 2 18:48:30.665044 kubelet[2317]: I1002 18:48:30.665023 2317 kubelet.go:281] "Adding apiserver pod source" Oct 2 18:48:30.665161 kubelet[2317]: I1002 18:48:30.665140 2317 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Oct 2 18:48:30.672496 kubelet[2317]: I1002 18:48:30.672440 2317 kuberuntime_manager.go:240] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Oct 2 18:48:30.673460 kubelet[2317]: W1002 18:48:30.673420 2317 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Oct 2 18:48:30.674727 kubelet[2317]: I1002 18:48:30.674681 2317 server.go:1175] "Started kubelet" Oct 2 18:48:30.674950 kubelet[2317]: W1002 18:48:30.674871 2317 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:134: failed to list *v1.Node: Get "https://172.31.16.118:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-16-118&limit=500&resourceVersion=0": dial tcp 172.31.16.118:6443: connect: connection refused Oct 2 18:48:30.675023 kubelet[2317]: E1002 18:48:30.674955 2317 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:134: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://172.31.16.118:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-16-118&limit=500&resourceVersion=0": dial tcp 172.31.16.118:6443: connect: connection refused Oct 2 18:48:30.678232 kubelet[2317]: W1002 18:48:30.678154 2317 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:134: failed to list *v1.Service: Get "https://172.31.16.118:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.31.16.118:6443: connect: connection refused Oct 2 18:48:30.678442 kubelet[2317]: E1002 18:48:30.678419 2317 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:134: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://172.31.16.118:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.31.16.118:6443: connect: connection refused Oct 2 18:48:30.679462 kubelet[2317]: E1002 18:48:30.679190 2317 event.go:276] Unable to write event: '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ip-172-31-16-118.178a5edc7905a4bf", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ip-172-31-16-118", UID:"ip-172-31-16-118", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"ip-172-31-16-118"}, FirstTimestamp:time.Date(2023, time.October, 2, 18, 48, 30, 674642111, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 18, 48, 30, 674642111, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'Post "https://172.31.16.118:6443/api/v1/namespaces/default/events": dial tcp 172.31.16.118:6443: connect: connection refused'(may retry after sleeping) Oct 2 18:48:30.678000 audit[2317]: AVC avc: denied { mac_admin } for pid=2317 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:30.678000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 18:48:30.678000 audit[2317]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000f6d770 a1=4000d3e588 a2=4000f6d740 a3=25 items=0 ppid=1 pid=2317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:48:30.678000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 18:48:30.680156 kubelet[2317]: I1002 18:48:30.679816 2317 kubelet.go:1274] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Oct 2 18:48:30.678000 audit[2317]: AVC avc: denied { mac_admin } for pid=2317 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:30.678000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 18:48:30.680648 kubelet[2317]: I1002 18:48:30.680016 2317 server.go:155] "Starting to listen" address="0.0.0.0" port=10250 Oct 2 18:48:30.681406 kubelet[2317]: E1002 18:48:30.680717 2317 cri_stats_provider.go:452] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Oct 2 18:48:30.681406 kubelet[2317]: E1002 18:48:30.681257 2317 kubelet.go:1317] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Oct 2 18:48:30.682832 kubelet[2317]: I1002 18:48:30.682799 2317 server.go:438] "Adding debug handlers to kubelet server" Oct 2 18:48:30.678000 audit[2317]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000d870e0 a1=4000cfb320 a2=4000bffdd0 a3=25 items=0 ppid=1 pid=2317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:48:30.678000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 18:48:30.687968 kubelet[2317]: I1002 18:48:30.687921 2317 kubelet.go:1278] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Oct 2 18:48:30.688312 kubelet[2317]: I1002 18:48:30.688275 2317 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Oct 2 18:48:30.692278 kubelet[2317]: I1002 18:48:30.692222 2317 volume_manager.go:293] "Starting Kubelet Volume Manager" Oct 2 18:48:30.694655 kubelet[2317]: I1002 18:48:30.694619 2317 desired_state_of_world_populator.go:149] "Desired state populator starts to run" Oct 2 18:48:30.697251 kubelet[2317]: W1002 18:48:30.697159 2317 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:134: failed to list *v1.CSIDriver: Get "https://172.31.16.118:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.31.16.118:6443: connect: connection refused Oct 2 18:48:30.697504 kubelet[2317]: E1002 18:48:30.697480 2317 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:134: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://172.31.16.118:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.31.16.118:6443: connect: connection refused Oct 2 18:48:30.698248 kubelet[2317]: E1002 18:48:30.698197 2317 controller.go:144] failed to ensure lease exists, will retry in 200ms, error: Get "https://172.31.16.118:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-16-118?timeout=10s": dial tcp 172.31.16.118:6443: connect: connection refused Oct 2 18:48:30.700652 kubelet[2317]: E1002 18:48:30.700616 2317 kubelet.go:2373] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 18:48:30.707000 audit[2332]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=2332 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:48:30.707000 audit[2332]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffd248cf90 a2=0 a3=1 items=0 ppid=2317 pid=2332 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:48:30.707000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Oct 2 18:48:30.713000 audit[2333]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=2333 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:48:30.713000 audit[2333]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff2691fb0 a2=0 a3=1 items=0 ppid=2317 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:48:30.713000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Oct 2 18:48:30.729000 audit[2336]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=2336 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:48:30.729000 audit[2336]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffd5fc6310 a2=0 a3=1 items=0 ppid=2317 pid=2336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:48:30.729000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 2 18:48:30.736000 audit[2338]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=2338 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:48:30.736000 audit[2338]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffc51084b0 a2=0 a3=1 items=0 ppid=2317 pid=2338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:48:30.736000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 2 18:48:30.759537 kubelet[2317]: I1002 18:48:30.759491 2317 cpu_manager.go:213] "Starting CPU manager" policy="none" Oct 2 18:48:30.759537 kubelet[2317]: I1002 18:48:30.759530 2317 cpu_manager.go:214] "Reconciling" reconcilePeriod="10s" Oct 2 18:48:30.759759 kubelet[2317]: I1002 18:48:30.759576 2317 state_mem.go:36] "Initialized new in-memory state store" Oct 2 18:48:30.762442 kubelet[2317]: I1002 18:48:30.762393 2317 policy_none.go:49] "None policy: Start" Oct 2 18:48:30.763686 kubelet[2317]: I1002 18:48:30.763643 2317 memory_manager.go:168] "Starting memorymanager" policy="None" Oct 2 18:48:30.763809 kubelet[2317]: I1002 18:48:30.763703 2317 state_mem.go:35] "Initializing new in-memory state store" Oct 2 18:48:30.762000 audit[2342]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=2342 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:48:30.762000 audit[2342]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=924 a0=3 a1=ffffd4e0e730 a2=0 a3=1 items=0 ppid=2317 pid=2342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:48:30.762000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Oct 2 18:48:30.770000 audit[2344]: NETFILTER_CFG table=nat:31 family=2 entries=1 op=nft_register_chain pid=2344 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:48:30.770000 audit[2344]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffd46fd2c0 a2=0 a3=1 items=0 ppid=2317 pid=2344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:48:30.770000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D44524F50002D74006E6174 Oct 2 18:48:30.772733 systemd[1]: Created slice kubepods.slice. Oct 2 18:48:30.782830 systemd[1]: Created slice kubepods-burstable.slice. Oct 2 18:48:30.790339 systemd[1]: Created slice kubepods-besteffort.slice. Oct 2 18:48:30.793593 kubelet[2317]: E1002 18:48:30.793522 2317 kubelet.go:2448] "Error getting node" err="node \"ip-172-31-16-118\" not found" Oct 2 18:48:30.797900 kubelet[2317]: I1002 18:48:30.797852 2317 kubelet_node_status.go:70] "Attempting to register node" node="ip-172-31-16-118" Oct 2 18:48:30.798827 kubelet[2317]: I1002 18:48:30.798758 2317 manager.go:447] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Oct 2 18:48:30.797000 audit[2317]: AVC avc: denied { mac_admin } for pid=2317 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:30.797000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 18:48:30.797000 audit[2317]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000dc7770 a1=4000f40300 a2=4000dc7740 a3=25 items=0 ppid=1 pid=2317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:48:30.797000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 18:48:30.799334 kubelet[2317]: E1002 18:48:30.799118 2317 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://172.31.16.118:6443/api/v1/nodes\": dial tcp 172.31.16.118:6443: connect: connection refused" node="ip-172-31-16-118" Oct 2 18:48:30.799334 kubelet[2317]: I1002 18:48:30.799173 2317 server.go:86] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Oct 2 18:48:30.799634 kubelet[2317]: I1002 18:48:30.799549 2317 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Oct 2 18:48:30.803751 kubelet[2317]: E1002 18:48:30.803548 2317 eviction_manager.go:256] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ip-172-31-16-118\" not found" Oct 2 18:48:30.808000 audit[2347]: NETFILTER_CFG table=nat:32 family=2 entries=1 op=nft_register_rule pid=2347 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:48:30.808000 audit[2347]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=216 a0=3 a1=ffffd5c495b0 a2=0 a3=1 items=0 ppid=2317 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:48:30.808000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D44524F50002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303038303030 Oct 2 18:48:30.820000 audit[2350]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=2350 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:48:30.820000 audit[2350]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=664 a0=3 a1=ffffcc96b960 a2=0 a3=1 items=0 ppid=2317 pid=2350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:48:30.820000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206669726577616C6C20666F722064726F7070696E67206D61726B6564207061636B657473002D6D006D61726B Oct 2 18:48:30.825000 audit[2351]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=2351 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:48:30.825000 audit[2351]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffd3845280 a2=0 a3=1 items=0 ppid=2317 pid=2351 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:48:30.825000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D4D415351002D74006E6174 Oct 2 18:48:30.828000 audit[2352]: NETFILTER_CFG table=nat:35 family=2 entries=1 op=nft_register_chain pid=2352 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:48:30.828000 audit[2352]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc1cd49a0 a2=0 a3=1 items=0 ppid=2317 pid=2352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:48:30.828000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Oct 2 18:48:30.836000 audit[2354]: NETFILTER_CFG table=nat:36 family=2 entries=1 op=nft_register_rule pid=2354 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:48:30.836000 audit[2354]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=216 a0=3 a1=fffff64570e0 a2=0 a3=1 items=0 ppid=2317 pid=2354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:48:30.836000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D4D415351002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303034303030 Oct 2 18:48:30.844000 audit[2356]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_rule pid=2356 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:48:30.844000 audit[2356]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=532 a0=3 a1=fffff8d7cb10 a2=0 a3=1 items=0 ppid=2317 pid=2356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:48:30.844000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Oct 2 18:48:30.851000 audit[2358]: NETFILTER_CFG table=nat:38 family=2 entries=1 op=nft_register_rule pid=2358 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:48:30.851000 audit[2358]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=364 a0=3 a1=ffffc86584d0 a2=0 a3=1 items=0 ppid=2317 pid=2358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:48:30.851000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D006D61726B0000002D2D6D61726B00307830303030343030302F30783030303034303030002D6A0052455455524E Oct 2 18:48:30.860000 audit[2360]: NETFILTER_CFG table=nat:39 family=2 entries=1 op=nft_register_rule pid=2360 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:48:30.860000 audit[2360]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=220 a0=3 a1=ffffcaeddef0 a2=0 a3=1 items=0 ppid=2317 pid=2360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:48:30.860000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6A004D41524B002D2D786F722D6D61726B0030783030303034303030 Oct 2 18:48:30.869000 audit[2362]: NETFILTER_CFG table=nat:40 family=2 entries=1 op=nft_register_rule pid=2362 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:48:30.869000 audit[2362]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=540 a0=3 a1=ffffe027fc80 a2=0 a3=1 items=0 ppid=2317 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:48:30.869000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732073657276696365207472616666696320726571756972696E6720534E4154002D6A004D415351554552414445 Oct 2 18:48:30.871271 kubelet[2317]: I1002 18:48:30.871242 2317 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Oct 2 18:48:30.872000 audit[2363]: NETFILTER_CFG table=mangle:41 family=10 entries=2 op=nft_register_chain pid=2363 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 18:48:30.872000 audit[2363]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffc47643a0 a2=0 a3=1 items=0 ppid=2317 pid=2363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:48:30.872000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Oct 2 18:48:30.873000 audit[2364]: NETFILTER_CFG table=mangle:42 family=2 entries=1 op=nft_register_chain pid=2364 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:48:30.873000 audit[2364]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc4fe0d10 a2=0 a3=1 items=0 ppid=2317 pid=2364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:48:30.873000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Oct 2 18:48:30.876000 audit[2365]: NETFILTER_CFG table=nat:43 family=2 entries=1 op=nft_register_chain pid=2365 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:48:30.876000 audit[2365]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff74dcaa0 a2=0 a3=1 items=0 ppid=2317 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:48:30.876000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Oct 2 18:48:30.877000 audit[2366]: NETFILTER_CFG table=nat:44 family=10 entries=2 op=nft_register_chain pid=2366 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 18:48:30.877000 audit[2366]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=124 a0=3 a1=ffffcf76da00 a2=0 a3=1 items=0 ppid=2317 pid=2366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:48:30.877000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D44524F50002D74006E6174 Oct 2 18:48:30.880000 audit[2367]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_chain pid=2367 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:48:30.880000 audit[2367]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd6e3e610 a2=0 a3=1 items=0 ppid=2317 pid=2367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:48:30.880000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Oct 2 18:48:30.885000 audit[2369]: NETFILTER_CFG table=nat:46 family=10 entries=1 op=nft_register_rule pid=2369 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 18:48:30.885000 audit[2369]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=216 a0=3 a1=fffff4ccbe00 a2=0 a3=1 items=0 ppid=2317 pid=2369 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:48:30.885000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D44524F50002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303038303030 Oct 2 18:48:30.888000 audit[2370]: NETFILTER_CFG table=filter:47 family=10 entries=2 op=nft_register_chain pid=2370 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 18:48:30.888000 audit[2370]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=132 a0=3 a1=fffffd4a45e0 a2=0 a3=1 items=0 ppid=2317 pid=2370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:48:30.888000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Oct 2 18:48:30.894546 kubelet[2317]: E1002 18:48:30.894498 2317 kubelet.go:2448] "Error getting node" err="node \"ip-172-31-16-118\" not found" Oct 2 18:48:30.897000 audit[2372]: NETFILTER_CFG table=filter:48 family=10 entries=1 op=nft_register_rule pid=2372 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 18:48:30.897000 audit[2372]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=664 a0=3 a1=ffffdd06cb60 a2=0 a3=1 items=0 ppid=2317 pid=2372 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:48:30.897000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206669726577616C6C20666F722064726F7070696E67206D61726B6564207061636B657473002D6D006D61726B Oct 2 18:48:30.900015 kubelet[2317]: E1002 18:48:30.899970 2317 controller.go:144] failed to ensure lease exists, will retry in 400ms, error: Get "https://172.31.16.118:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-16-118?timeout=10s": dial tcp 172.31.16.118:6443: connect: connection refused Oct 2 18:48:30.901000 audit[2373]: NETFILTER_CFG table=nat:49 family=10 entries=1 op=nft_register_chain pid=2373 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 18:48:30.901000 audit[2373]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffdcffbdc0 a2=0 a3=1 items=0 ppid=2317 pid=2373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:48:30.901000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D4D415351002D74006E6174 Oct 2 18:48:30.905000 audit[2374]: NETFILTER_CFG table=nat:50 family=10 entries=1 op=nft_register_chain pid=2374 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 18:48:30.905000 audit[2374]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd42d7600 a2=0 a3=1 items=0 ppid=2317 pid=2374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:48:30.905000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Oct 2 18:48:30.913000 audit[2376]: NETFILTER_CFG table=nat:51 family=10 entries=1 op=nft_register_rule pid=2376 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 18:48:30.913000 audit[2376]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=216 a0=3 a1=ffffe6a89a40 a2=0 a3=1 items=0 ppid=2317 pid=2376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:48:30.913000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D4D415351002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303034303030 Oct 2 18:48:30.921000 audit[2378]: NETFILTER_CFG table=nat:52 family=10 entries=2 op=nft_register_chain pid=2378 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 18:48:30.921000 audit[2378]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=fffff1645c50 a2=0 a3=1 items=0 ppid=2317 pid=2378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:48:30.921000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Oct 2 18:48:30.929000 audit[2380]: NETFILTER_CFG table=nat:53 family=10 entries=1 op=nft_register_rule pid=2380 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 18:48:30.929000 audit[2380]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=364 a0=3 a1=ffffc4ee03a0 a2=0 a3=1 items=0 ppid=2317 pid=2380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:48:30.929000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D006D61726B0000002D2D6D61726B00307830303030343030302F30783030303034303030002D6A0052455455524E Oct 2 18:48:30.937000 audit[2382]: NETFILTER_CFG table=nat:54 family=10 entries=1 op=nft_register_rule pid=2382 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 18:48:30.937000 audit[2382]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=220 a0=3 a1=ffffeaab8650 a2=0 a3=1 items=0 ppid=2317 pid=2382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:48:30.937000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6A004D41524B002D2D786F722D6D61726B0030783030303034303030 Oct 2 18:48:30.949000 audit[2384]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_rule pid=2384 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 18:48:30.949000 audit[2384]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=556 a0=3 a1=ffffd0f8ca20 a2=0 a3=1 items=0 ppid=2317 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:48:30.949000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732073657276696365207472616666696320726571756972696E6720534E4154002D6A004D415351554552414445 Oct 2 18:48:30.952801 kubelet[2317]: I1002 18:48:30.952758 2317 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Oct 2 18:48:30.953138 kubelet[2317]: I1002 18:48:30.953105 2317 status_manager.go:161] "Starting to sync pod status with apiserver" Oct 2 18:48:30.953228 kubelet[2317]: I1002 18:48:30.953147 2317 kubelet.go:2010] "Starting kubelet main sync loop" Oct 2 18:48:30.953228 kubelet[2317]: E1002 18:48:30.953219 2317 kubelet.go:2034] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Oct 2 18:48:30.953986 kubelet[2317]: W1002 18:48:30.953949 2317 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:134: failed to list *v1.RuntimeClass: Get "https://172.31.16.118:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.31.16.118:6443: connect: connection refused Oct 2 18:48:30.954185 kubelet[2317]: E1002 18:48:30.954162 2317 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:134: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://172.31.16.118:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.31.16.118:6443: connect: connection refused Oct 2 18:48:30.955000 audit[2385]: NETFILTER_CFG table=mangle:56 family=10 entries=1 op=nft_register_chain pid=2385 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 18:48:30.955000 audit[2385]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd5d58af0 a2=0 a3=1 items=0 ppid=2317 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:48:30.955000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Oct 2 18:48:30.960000 audit[2386]: NETFILTER_CFG table=nat:57 family=10 entries=1 op=nft_register_chain pid=2386 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 18:48:30.960000 audit[2386]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd350c300 a2=0 a3=1 items=0 ppid=2317 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:48:30.960000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Oct 2 18:48:30.964000 audit[2387]: NETFILTER_CFG table=filter:58 family=10 entries=1 op=nft_register_chain pid=2387 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 18:48:30.964000 audit[2387]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd652f980 a2=0 a3=1 items=0 ppid=2317 pid=2387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:48:30.964000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Oct 2 18:48:30.995451 kubelet[2317]: E1002 18:48:30.995398 2317 kubelet.go:2448] "Error getting node" err="node \"ip-172-31-16-118\" not found" Oct 2 18:48:31.001320 kubelet[2317]: I1002 18:48:31.001267 2317 kubelet_node_status.go:70] "Attempting to register node" node="ip-172-31-16-118" Oct 2 18:48:31.001908 kubelet[2317]: E1002 18:48:31.001883 2317 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://172.31.16.118:6443/api/v1/nodes\": dial tcp 172.31.16.118:6443: connect: connection refused" node="ip-172-31-16-118" Oct 2 18:48:31.054032 kubelet[2317]: I1002 18:48:31.053982 2317 topology_manager.go:205] "Topology Admit Handler" Oct 2 18:48:31.055802 kubelet[2317]: I1002 18:48:31.055771 2317 topology_manager.go:205] "Topology Admit Handler" Oct 2 18:48:31.058277 kubelet[2317]: I1002 18:48:31.058080 2317 topology_manager.go:205] "Topology Admit Handler" Oct 2 18:48:31.059438 kubelet[2317]: I1002 18:48:31.059402 2317 status_manager.go:667] "Failed to get status for pod" podUID=bec47679ad907554330cc5a46b33c849 pod="kube-system/kube-apiserver-ip-172-31-16-118" err="Get \"https://172.31.16.118:6443/api/v1/namespaces/kube-system/pods/kube-apiserver-ip-172-31-16-118\": dial tcp 172.31.16.118:6443: connect: connection refused" Oct 2 18:48:31.064163 kubelet[2317]: I1002 18:48:31.064127 2317 status_manager.go:667] "Failed to get status for pod" podUID=f7dc5d6959e20a0327bdb5f50fe76db4 pod="kube-system/kube-controller-manager-ip-172-31-16-118" err="Get \"https://172.31.16.118:6443/api/v1/namespaces/kube-system/pods/kube-controller-manager-ip-172-31-16-118\": dial tcp 172.31.16.118:6443: connect: connection refused" Oct 2 18:48:31.064881 kubelet[2317]: I1002 18:48:31.064852 2317 status_manager.go:667] "Failed to get status for pod" podUID=d6525af7e2adaf11d0b2a5918d5c9e10 pod="kube-system/kube-scheduler-ip-172-31-16-118" err="Get \"https://172.31.16.118:6443/api/v1/namespaces/kube-system/pods/kube-scheduler-ip-172-31-16-118\": dial tcp 172.31.16.118:6443: connect: connection refused" Oct 2 18:48:31.069762 systemd[1]: Created slice kubepods-burstable-podbec47679ad907554330cc5a46b33c849.slice. Oct 2 18:48:31.089260 systemd[1]: Created slice kubepods-burstable-podd6525af7e2adaf11d0b2a5918d5c9e10.slice. Oct 2 18:48:31.095943 kubelet[2317]: E1002 18:48:31.095832 2317 kubelet.go:2448] "Error getting node" err="node \"ip-172-31-16-118\" not found" Oct 2 18:48:31.096735 kubelet[2317]: I1002 18:48:31.096693 2317 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/bec47679ad907554330cc5a46b33c849-k8s-certs\") pod \"kube-apiserver-ip-172-31-16-118\" (UID: \"bec47679ad907554330cc5a46b33c849\") " pod="kube-system/kube-apiserver-ip-172-31-16-118" Oct 2 18:48:31.096997 kubelet[2317]: I1002 18:48:31.096974 2317 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/bec47679ad907554330cc5a46b33c849-usr-share-ca-certificates\") pod \"kube-apiserver-ip-172-31-16-118\" (UID: \"bec47679ad907554330cc5a46b33c849\") " pod="kube-system/kube-apiserver-ip-172-31-16-118" Oct 2 18:48:31.097146 kubelet[2317]: I1002 18:48:31.097125 2317 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/f7dc5d6959e20a0327bdb5f50fe76db4-flexvolume-dir\") pod \"kube-controller-manager-ip-172-31-16-118\" (UID: \"f7dc5d6959e20a0327bdb5f50fe76db4\") " pod="kube-system/kube-controller-manager-ip-172-31-16-118" Oct 2 18:48:31.097288 kubelet[2317]: I1002 18:48:31.097267 2317 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/f7dc5d6959e20a0327bdb5f50fe76db4-k8s-certs\") pod \"kube-controller-manager-ip-172-31-16-118\" (UID: \"f7dc5d6959e20a0327bdb5f50fe76db4\") " pod="kube-system/kube-controller-manager-ip-172-31-16-118" Oct 2 18:48:31.097432 kubelet[2317]: I1002 18:48:31.097411 2317 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/f7dc5d6959e20a0327bdb5f50fe76db4-kubeconfig\") pod \"kube-controller-manager-ip-172-31-16-118\" (UID: \"f7dc5d6959e20a0327bdb5f50fe76db4\") " pod="kube-system/kube-controller-manager-ip-172-31-16-118" Oct 2 18:48:31.097528 systemd[1]: Created slice kubepods-burstable-podf7dc5d6959e20a0327bdb5f50fe76db4.slice. Oct 2 18:48:31.098443 kubelet[2317]: I1002 18:48:31.098416 2317 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/f7dc5d6959e20a0327bdb5f50fe76db4-usr-share-ca-certificates\") pod \"kube-controller-manager-ip-172-31-16-118\" (UID: \"f7dc5d6959e20a0327bdb5f50fe76db4\") " pod="kube-system/kube-controller-manager-ip-172-31-16-118" Oct 2 18:48:31.098644 kubelet[2317]: I1002 18:48:31.098622 2317 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/bec47679ad907554330cc5a46b33c849-ca-certs\") pod \"kube-apiserver-ip-172-31-16-118\" (UID: \"bec47679ad907554330cc5a46b33c849\") " pod="kube-system/kube-apiserver-ip-172-31-16-118" Oct 2 18:48:31.098787 kubelet[2317]: I1002 18:48:31.098767 2317 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/d6525af7e2adaf11d0b2a5918d5c9e10-kubeconfig\") pod \"kube-scheduler-ip-172-31-16-118\" (UID: \"d6525af7e2adaf11d0b2a5918d5c9e10\") " pod="kube-system/kube-scheduler-ip-172-31-16-118" Oct 2 18:48:31.098942 kubelet[2317]: I1002 18:48:31.098922 2317 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/f7dc5d6959e20a0327bdb5f50fe76db4-ca-certs\") pod \"kube-controller-manager-ip-172-31-16-118\" (UID: \"f7dc5d6959e20a0327bdb5f50fe76db4\") " pod="kube-system/kube-controller-manager-ip-172-31-16-118" Oct 2 18:48:31.196451 kubelet[2317]: E1002 18:48:31.196348 2317 kubelet.go:2448] "Error getting node" err="node \"ip-172-31-16-118\" not found" Oct 2 18:48:31.297195 kubelet[2317]: E1002 18:48:31.297145 2317 kubelet.go:2448] "Error getting node" err="node \"ip-172-31-16-118\" not found" Oct 2 18:48:31.301151 kubelet[2317]: E1002 18:48:31.301112 2317 controller.go:144] failed to ensure lease exists, will retry in 800ms, error: Get "https://172.31.16.118:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-16-118?timeout=10s": dial tcp 172.31.16.118:6443: connect: connection refused Oct 2 18:48:31.387528 env[1656]: time="2023-10-02T18:48:31.387470545Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ip-172-31-16-118,Uid:bec47679ad907554330cc5a46b33c849,Namespace:kube-system,Attempt:0,}" Oct 2 18:48:31.395689 env[1656]: time="2023-10-02T18:48:31.395628687Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ip-172-31-16-118,Uid:d6525af7e2adaf11d0b2a5918d5c9e10,Namespace:kube-system,Attempt:0,}" Oct 2 18:48:31.397530 kubelet[2317]: E1002 18:48:31.397486 2317 kubelet.go:2448] "Error getting node" err="node \"ip-172-31-16-118\" not found" Oct 2 18:48:31.404346 env[1656]: time="2023-10-02T18:48:31.403961089Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ip-172-31-16-118,Uid:f7dc5d6959e20a0327bdb5f50fe76db4,Namespace:kube-system,Attempt:0,}" Oct 2 18:48:31.404491 kubelet[2317]: I1002 18:48:31.404252 2317 kubelet_node_status.go:70] "Attempting to register node" node="ip-172-31-16-118" Oct 2 18:48:31.404989 kubelet[2317]: E1002 18:48:31.404955 2317 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://172.31.16.118:6443/api/v1/nodes\": dial tcp 172.31.16.118:6443: connect: connection refused" node="ip-172-31-16-118" Oct 2 18:48:31.498480 kubelet[2317]: E1002 18:48:31.498332 2317 kubelet.go:2448] "Error getting node" err="node \"ip-172-31-16-118\" not found" Oct 2 18:48:31.566477 kubelet[2317]: W1002 18:48:31.566391 2317 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:134: failed to list *v1.CSIDriver: Get "https://172.31.16.118:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.31.16.118:6443: connect: connection refused Oct 2 18:48:31.566477 kubelet[2317]: E1002 18:48:31.566447 2317 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:134: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://172.31.16.118:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.31.16.118:6443: connect: connection refused Oct 2 18:48:31.599673 kubelet[2317]: E1002 18:48:31.599628 2317 kubelet.go:2448] "Error getting node" err="node \"ip-172-31-16-118\" not found" Oct 2 18:48:31.700244 kubelet[2317]: E1002 18:48:31.700189 2317 kubelet.go:2448] "Error getting node" err="node \"ip-172-31-16-118\" not found" Oct 2 18:48:31.801014 kubelet[2317]: E1002 18:48:31.800954 2317 kubelet.go:2448] "Error getting node" err="node \"ip-172-31-16-118\" not found" Oct 2 18:48:31.851019 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3611926155.mount: Deactivated successfully. Oct 2 18:48:31.859872 env[1656]: time="2023-10-02T18:48:31.859805884Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:48:31.861491 env[1656]: time="2023-10-02T18:48:31.861441451Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:48:31.862916 kubelet[2317]: W1002 18:48:31.862788 2317 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:134: failed to list *v1.Node: Get "https://172.31.16.118:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-16-118&limit=500&resourceVersion=0": dial tcp 172.31.16.118:6443: connect: connection refused Oct 2 18:48:31.862916 kubelet[2317]: E1002 18:48:31.862872 2317 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:134: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://172.31.16.118:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-16-118&limit=500&resourceVersion=0": dial tcp 172.31.16.118:6443: connect: connection refused Oct 2 18:48:31.864409 env[1656]: time="2023-10-02T18:48:31.864335180Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:48:31.868119 env[1656]: time="2023-10-02T18:48:31.868063900Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:48:31.870095 env[1656]: time="2023-10-02T18:48:31.870036576Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:48:31.872397 env[1656]: time="2023-10-02T18:48:31.872346709Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:48:31.875693 env[1656]: time="2023-10-02T18:48:31.875638265Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:48:31.877145 env[1656]: time="2023-10-02T18:48:31.877103496Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:48:31.882526 env[1656]: time="2023-10-02T18:48:31.882439523Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:48:31.883951 env[1656]: time="2023-10-02T18:48:31.883898129Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:48:31.889950 env[1656]: time="2023-10-02T18:48:31.889890579Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:48:31.891333 env[1656]: time="2023-10-02T18:48:31.891272279Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:48:31.901412 kubelet[2317]: E1002 18:48:31.901332 2317 kubelet.go:2448] "Error getting node" err="node \"ip-172-31-16-118\" not found" Oct 2 18:48:31.959465 env[1656]: time="2023-10-02T18:48:31.959338059Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 18:48:31.959688 env[1656]: time="2023-10-02T18:48:31.959462088Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 18:48:31.959688 env[1656]: time="2023-10-02T18:48:31.959541202Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 18:48:31.960513 env[1656]: time="2023-10-02T18:48:31.960375785Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/49674a301c43fd6e6f8c950da84a57eda3bc14ebfa2717ac4be12bea6c32daa2 pid=2397 runtime=io.containerd.runc.v2 Oct 2 18:48:31.983197 env[1656]: time="2023-10-02T18:48:31.983043851Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 18:48:31.983431 env[1656]: time="2023-10-02T18:48:31.983382448Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 18:48:31.983657 env[1656]: time="2023-10-02T18:48:31.983600700Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 18:48:31.984606 env[1656]: time="2023-10-02T18:48:31.984518873Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ecf0feeaef420c3249488da73b95d98abaf6ef3cd8228e828c05185f36954d42 pid=2409 runtime=io.containerd.runc.v2 Oct 2 18:48:32.001341 env[1656]: time="2023-10-02T18:48:32.001192029Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 18:48:32.001639 env[1656]: time="2023-10-02T18:48:32.001542686Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 18:48:32.001826 kubelet[2317]: E1002 18:48:32.001771 2317 kubelet.go:2448] "Error getting node" err="node \"ip-172-31-16-118\" not found" Oct 2 18:48:32.001961 env[1656]: time="2023-10-02T18:48:32.001777557Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 18:48:32.002860 env[1656]: time="2023-10-02T18:48:32.002706856Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/65259fbe12f1a378be6878f8157dc62b96be9ec4ca4a8688a3c85d9856a8259f pid=2432 runtime=io.containerd.runc.v2 Oct 2 18:48:32.028010 systemd[1]: Started cri-containerd-49674a301c43fd6e6f8c950da84a57eda3bc14ebfa2717ac4be12bea6c32daa2.scope. Oct 2 18:48:32.062741 systemd[1]: Started cri-containerd-65259fbe12f1a378be6878f8157dc62b96be9ec4ca4a8688a3c85d9856a8259f.scope. Oct 2 18:48:32.078405 systemd[1]: Started cri-containerd-ecf0feeaef420c3249488da73b95d98abaf6ef3cd8228e828c05185f36954d42.scope. Oct 2 18:48:32.091000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.091000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.091000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.091000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.091000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.091000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.091000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.091000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.091000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.092000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.092000 audit: BPF prog-id=73 op=LOAD Oct 2 18:48:32.093000 audit[2417]: AVC avc: denied { bpf } for pid=2417 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.093000 audit[2417]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2397 pid=2417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:48:32.093000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439363734613330316334336664366536663863393530646138346135 Oct 2 18:48:32.094000 audit[2417]: AVC avc: denied { perfmon } for pid=2417 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.094000 audit[2417]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2397 pid=2417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:48:32.094000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439363734613330316334336664366536663863393530646138346135 Oct 2 18:48:32.094000 audit[2417]: AVC avc: denied { bpf } for pid=2417 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.094000 audit[2417]: AVC avc: denied { bpf } for pid=2417 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.094000 audit[2417]: AVC avc: denied { bpf } for pid=2417 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.094000 audit[2417]: AVC avc: denied { perfmon } for pid=2417 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.094000 audit[2417]: AVC avc: denied { perfmon } for pid=2417 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.094000 audit[2417]: AVC avc: denied { perfmon } for pid=2417 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.094000 audit[2417]: AVC avc: denied { perfmon } for pid=2417 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.094000 audit[2417]: AVC avc: denied { perfmon } for pid=2417 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.094000 audit[2417]: AVC avc: denied { bpf } for pid=2417 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.094000 audit[2417]: AVC avc: denied { bpf } for pid=2417 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.094000 audit: BPF prog-id=74 op=LOAD Oct 2 18:48:32.094000 audit[2417]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2397 pid=2417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:48:32.094000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439363734613330316334336664366536663863393530646138346135 Oct 2 18:48:32.096000 audit[2417]: AVC avc: denied { bpf } for pid=2417 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.096000 audit[2417]: AVC avc: denied { bpf } for pid=2417 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.096000 audit[2417]: AVC avc: denied { perfmon } for pid=2417 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.096000 audit[2417]: AVC avc: denied { perfmon } for pid=2417 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.096000 audit[2417]: AVC avc: denied { perfmon } for pid=2417 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.096000 audit[2417]: AVC avc: denied { perfmon } for pid=2417 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.096000 audit[2417]: AVC avc: denied { perfmon } for pid=2417 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.096000 audit[2417]: AVC avc: denied { bpf } for pid=2417 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.096000 audit[2417]: AVC avc: denied { bpf } for pid=2417 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.096000 audit: BPF prog-id=75 op=LOAD Oct 2 18:48:32.096000 audit[2417]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2397 pid=2417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:48:32.096000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439363734613330316334336664366536663863393530646138346135 Oct 2 18:48:32.097000 audit: BPF prog-id=75 op=UNLOAD Oct 2 18:48:32.097000 audit: BPF prog-id=74 op=UNLOAD Oct 2 18:48:32.097000 audit[2417]: AVC avc: denied { bpf } for pid=2417 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.097000 audit[2417]: AVC avc: denied { bpf } for pid=2417 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.097000 audit[2417]: AVC avc: denied { bpf } for pid=2417 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.097000 audit[2417]: AVC avc: denied { perfmon } for pid=2417 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.097000 audit[2417]: AVC avc: denied { perfmon } for pid=2417 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.097000 audit[2417]: AVC avc: denied { perfmon } for pid=2417 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.097000 audit[2417]: AVC avc: denied { perfmon } for pid=2417 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.097000 audit[2417]: AVC avc: denied { perfmon } for pid=2417 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.097000 audit[2417]: AVC avc: denied { bpf } for pid=2417 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.097000 audit[2417]: AVC avc: denied { bpf } for pid=2417 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.097000 audit: BPF prog-id=76 op=LOAD Oct 2 18:48:32.103928 kubelet[2317]: E1002 18:48:32.102393 2317 kubelet.go:2448] "Error getting node" err="node \"ip-172-31-16-118\" not found" Oct 2 18:48:32.097000 audit[2417]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2397 pid=2417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:48:32.097000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439363734613330316334336664366536663863393530646138346135 Oct 2 18:48:32.105090 kubelet[2317]: E1002 18:48:32.104637 2317 controller.go:144] failed to ensure lease exists, will retry in 1.6s, error: Get "https://172.31.16.118:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-16-118?timeout=10s": dial tcp 172.31.16.118:6443: connect: connection refused Oct 2 18:48:32.133000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.133000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.133000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.133000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.133000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.133000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.133000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.133000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.133000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.133000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.133000 audit: BPF prog-id=77 op=LOAD Oct 2 18:48:32.134000 audit[2435]: AVC avc: denied { bpf } for pid=2435 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.134000 audit[2435]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2409 pid=2435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:48:32.134000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563663066656561656634323063333234393438386461373362393564 Oct 2 18:48:32.134000 audit[2435]: AVC avc: denied { perfmon } for pid=2435 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.134000 audit[2435]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2409 pid=2435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:48:32.134000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563663066656561656634323063333234393438386461373362393564 Oct 2 18:48:32.134000 audit[2435]: AVC avc: denied { bpf } for pid=2435 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.134000 audit[2435]: AVC avc: denied { bpf } for pid=2435 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.134000 audit[2435]: AVC avc: denied { bpf } for pid=2435 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.134000 audit[2435]: AVC avc: denied { perfmon } for pid=2435 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.134000 audit[2435]: AVC avc: denied { perfmon } for pid=2435 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.134000 audit[2435]: AVC avc: denied { perfmon } for pid=2435 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.134000 audit[2435]: AVC avc: denied { perfmon } for pid=2435 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.134000 audit[2435]: AVC avc: denied { perfmon } for pid=2435 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.134000 audit[2435]: AVC avc: denied { bpf } for pid=2435 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.134000 audit[2435]: AVC avc: denied { bpf } for pid=2435 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.134000 audit: BPF prog-id=78 op=LOAD Oct 2 18:48:32.134000 audit[2435]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2409 pid=2435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:48:32.134000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563663066656561656634323063333234393438386461373362393564 Oct 2 18:48:32.134000 audit[2435]: AVC avc: denied { bpf } for pid=2435 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.134000 audit[2435]: AVC avc: denied { bpf } for pid=2435 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.134000 audit[2435]: AVC avc: denied { perfmon } for pid=2435 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.134000 audit[2435]: AVC avc: denied { perfmon } for pid=2435 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.134000 audit[2435]: AVC avc: denied { perfmon } for pid=2435 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.134000 audit[2435]: AVC avc: denied { perfmon } for pid=2435 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.134000 audit[2435]: AVC avc: denied { perfmon } for pid=2435 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.134000 audit[2435]: AVC avc: denied { bpf } for pid=2435 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.134000 audit[2435]: AVC avc: denied { bpf } for pid=2435 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.134000 audit: BPF prog-id=79 op=LOAD Oct 2 18:48:32.134000 audit[2435]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2409 pid=2435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:48:32.134000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563663066656561656634323063333234393438386461373362393564 Oct 2 18:48:32.134000 audit: BPF prog-id=79 op=UNLOAD Oct 2 18:48:32.134000 audit: BPF prog-id=78 op=UNLOAD Oct 2 18:48:32.134000 audit[2435]: AVC avc: denied { bpf } for pid=2435 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.134000 audit[2435]: AVC avc: denied { bpf } for pid=2435 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.134000 audit[2435]: AVC avc: denied { bpf } for pid=2435 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.134000 audit[2435]: AVC avc: denied { perfmon } for pid=2435 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.134000 audit[2435]: AVC avc: denied { perfmon } for pid=2435 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.134000 audit[2435]: AVC avc: denied { perfmon } for pid=2435 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.134000 audit[2435]: AVC avc: denied { perfmon } for pid=2435 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.134000 audit[2435]: AVC avc: denied { perfmon } for pid=2435 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.134000 audit[2435]: AVC avc: denied { bpf } for pid=2435 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.134000 audit[2435]: AVC avc: denied { bpf } for pid=2435 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.134000 audit: BPF prog-id=80 op=LOAD Oct 2 18:48:32.134000 audit[2435]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2409 pid=2435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:48:32.134000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563663066656561656634323063333234393438386461373362393564 Oct 2 18:48:32.167483 kubelet[2317]: W1002 18:48:32.167398 2317 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:134: failed to list *v1.Service: Get "https://172.31.16.118:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.31.16.118:6443: connect: connection refused Oct 2 18:48:32.167653 kubelet[2317]: E1002 18:48:32.167506 2317 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:134: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://172.31.16.118:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.31.16.118:6443: connect: connection refused Oct 2 18:48:32.180000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.180000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.180000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.180000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.180000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.180000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.180000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.180000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.180000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.180000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.180000 audit: BPF prog-id=81 op=LOAD Oct 2 18:48:32.181000 audit[2453]: AVC avc: denied { bpf } for pid=2453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.181000 audit[2453]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001c5b38 a2=10 a3=0 items=0 ppid=2432 pid=2453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:48:32.181000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635323539666265313266316133373862653638373866383135376463 Oct 2 18:48:32.181000 audit[2453]: AVC avc: denied { perfmon } for pid=2453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.181000 audit[2453]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001c55a0 a2=3c a3=0 items=0 ppid=2432 pid=2453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:48:32.181000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635323539666265313266316133373862653638373866383135376463 Oct 2 18:48:32.181000 audit[2453]: AVC avc: denied { bpf } for pid=2453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.181000 audit[2453]: AVC avc: denied { bpf } for pid=2453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.181000 audit[2453]: AVC avc: denied { bpf } for pid=2453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.181000 audit[2453]: AVC avc: denied { perfmon } for pid=2453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.181000 audit[2453]: AVC avc: denied { perfmon } for pid=2453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.181000 audit[2453]: AVC avc: denied { perfmon } for pid=2453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.181000 audit[2453]: AVC avc: denied { perfmon } for pid=2453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.181000 audit[2453]: AVC avc: denied { perfmon } for pid=2453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.181000 audit[2453]: AVC avc: denied { bpf } for pid=2453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.181000 audit[2453]: AVC avc: denied { bpf } for pid=2453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.181000 audit: BPF prog-id=82 op=LOAD Oct 2 18:48:32.181000 audit[2453]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001c58e0 a2=78 a3=0 items=0 ppid=2432 pid=2453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:48:32.181000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635323539666265313266316133373862653638373866383135376463 Oct 2 18:48:32.182000 audit[2453]: AVC avc: denied { bpf } for pid=2453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.182000 audit[2453]: AVC avc: denied { bpf } for pid=2453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.182000 audit[2453]: AVC avc: denied { perfmon } for pid=2453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.182000 audit[2453]: AVC avc: denied { perfmon } for pid=2453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.182000 audit[2453]: AVC avc: denied { perfmon } for pid=2453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.182000 audit[2453]: AVC avc: denied { perfmon } for pid=2453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.182000 audit[2453]: AVC avc: denied { perfmon } for pid=2453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.182000 audit[2453]: AVC avc: denied { bpf } for pid=2453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.182000 audit[2453]: AVC avc: denied { bpf } for pid=2453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.182000 audit: BPF prog-id=83 op=LOAD Oct 2 18:48:32.182000 audit[2453]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001c5670 a2=78 a3=0 items=0 ppid=2432 pid=2453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:48:32.182000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635323539666265313266316133373862653638373866383135376463 Oct 2 18:48:32.182000 audit: BPF prog-id=83 op=UNLOAD Oct 2 18:48:32.182000 audit: BPF prog-id=82 op=UNLOAD Oct 2 18:48:32.182000 audit[2453]: AVC avc: denied { bpf } for pid=2453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.182000 audit[2453]: AVC avc: denied { bpf } for pid=2453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.182000 audit[2453]: AVC avc: denied { bpf } for pid=2453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.182000 audit[2453]: AVC avc: denied { perfmon } for pid=2453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.182000 audit[2453]: AVC avc: denied { perfmon } for pid=2453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.182000 audit[2453]: AVC avc: denied { perfmon } for pid=2453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.182000 audit[2453]: AVC avc: denied { perfmon } for pid=2453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.182000 audit[2453]: AVC avc: denied { perfmon } for pid=2453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.182000 audit[2453]: AVC avc: denied { bpf } for pid=2453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.182000 audit[2453]: AVC avc: denied { bpf } for pid=2453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.182000 audit: BPF prog-id=84 op=LOAD Oct 2 18:48:32.182000 audit[2453]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001c5b40 a2=78 a3=0 items=0 ppid=2432 pid=2453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:48:32.182000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635323539666265313266316133373862653638373866383135376463 Oct 2 18:48:32.201767 env[1656]: time="2023-10-02T18:48:32.201708315Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ip-172-31-16-118,Uid:bec47679ad907554330cc5a46b33c849,Namespace:kube-system,Attempt:0,} returns sandbox id \"49674a301c43fd6e6f8c950da84a57eda3bc14ebfa2717ac4be12bea6c32daa2\"" Oct 2 18:48:32.202675 kubelet[2317]: E1002 18:48:32.202629 2317 kubelet.go:2448] "Error getting node" err="node \"ip-172-31-16-118\" not found" Oct 2 18:48:32.208823 env[1656]: time="2023-10-02T18:48:32.208762416Z" level=info msg="CreateContainer within sandbox \"49674a301c43fd6e6f8c950da84a57eda3bc14ebfa2717ac4be12bea6c32daa2\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Oct 2 18:48:32.209852 kubelet[2317]: I1002 18:48:32.209477 2317 kubelet_node_status.go:70] "Attempting to register node" node="ip-172-31-16-118" Oct 2 18:48:32.210024 kubelet[2317]: E1002 18:48:32.209987 2317 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://172.31.16.118:6443/api/v1/nodes\": dial tcp 172.31.16.118:6443: connect: connection refused" node="ip-172-31-16-118" Oct 2 18:48:32.235891 env[1656]: time="2023-10-02T18:48:32.234664065Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ip-172-31-16-118,Uid:f7dc5d6959e20a0327bdb5f50fe76db4,Namespace:kube-system,Attempt:0,} returns sandbox id \"ecf0feeaef420c3249488da73b95d98abaf6ef3cd8228e828c05185f36954d42\"" Oct 2 18:48:32.241543 env[1656]: time="2023-10-02T18:48:32.241487422Z" level=info msg="CreateContainer within sandbox \"ecf0feeaef420c3249488da73b95d98abaf6ef3cd8228e828c05185f36954d42\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Oct 2 18:48:32.259297 env[1656]: time="2023-10-02T18:48:32.259222651Z" level=info msg="CreateContainer within sandbox \"49674a301c43fd6e6f8c950da84a57eda3bc14ebfa2717ac4be12bea6c32daa2\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"6e2c0c27914f8992066bf88975f7c3d1db81c9151d4ed5df1ea094453bae2d1d\"" Oct 2 18:48:32.260352 env[1656]: time="2023-10-02T18:48:32.260300759Z" level=info msg="StartContainer for \"6e2c0c27914f8992066bf88975f7c3d1db81c9151d4ed5df1ea094453bae2d1d\"" Oct 2 18:48:32.271281 env[1656]: time="2023-10-02T18:48:32.271215582Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ip-172-31-16-118,Uid:d6525af7e2adaf11d0b2a5918d5c9e10,Namespace:kube-system,Attempt:0,} returns sandbox id \"65259fbe12f1a378be6878f8157dc62b96be9ec4ca4a8688a3c85d9856a8259f\"" Oct 2 18:48:32.281009 env[1656]: time="2023-10-02T18:48:32.280950816Z" level=info msg="CreateContainer within sandbox \"65259fbe12f1a378be6878f8157dc62b96be9ec4ca4a8688a3c85d9856a8259f\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Oct 2 18:48:32.283944 env[1656]: time="2023-10-02T18:48:32.283867444Z" level=info msg="CreateContainer within sandbox \"ecf0feeaef420c3249488da73b95d98abaf6ef3cd8228e828c05185f36954d42\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"5622b06389b79930179b4402e0d20e5a3f02aa23fa05a720e83e25779a87394c\"" Oct 2 18:48:32.284689 env[1656]: time="2023-10-02T18:48:32.284629981Z" level=info msg="StartContainer for \"5622b06389b79930179b4402e0d20e5a3f02aa23fa05a720e83e25779a87394c\"" Oct 2 18:48:32.303284 kubelet[2317]: E1002 18:48:32.303233 2317 kubelet.go:2448] "Error getting node" err="node \"ip-172-31-16-118\" not found" Oct 2 18:48:32.307919 env[1656]: time="2023-10-02T18:48:32.307832642Z" level=info msg="CreateContainer within sandbox \"65259fbe12f1a378be6878f8157dc62b96be9ec4ca4a8688a3c85d9856a8259f\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"df8a5be89a2b0a710d2538b300c9d28062cdc943d8343f74cd081e22d9ffc94a\"" Oct 2 18:48:32.308954 env[1656]: time="2023-10-02T18:48:32.308881794Z" level=info msg="StartContainer for \"df8a5be89a2b0a710d2538b300c9d28062cdc943d8343f74cd081e22d9ffc94a\"" Oct 2 18:48:32.350005 systemd[1]: Started cri-containerd-5622b06389b79930179b4402e0d20e5a3f02aa23fa05a720e83e25779a87394c.scope. Oct 2 18:48:32.382212 systemd[1]: Started cri-containerd-6e2c0c27914f8992066bf88975f7c3d1db81c9151d4ed5df1ea094453bae2d1d.scope. Oct 2 18:48:32.403610 kubelet[2317]: E1002 18:48:32.403549 2317 kubelet.go:2448] "Error getting node" err="node \"ip-172-31-16-118\" not found" Oct 2 18:48:32.411308 systemd[1]: Started cri-containerd-df8a5be89a2b0a710d2538b300c9d28062cdc943d8343f74cd081e22d9ffc94a.scope. Oct 2 18:48:32.441874 kubelet[2317]: W1002 18:48:32.441779 2317 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:134: failed to list *v1.RuntimeClass: Get "https://172.31.16.118:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.31.16.118:6443: connect: connection refused Oct 2 18:48:32.442016 kubelet[2317]: E1002 18:48:32.441882 2317 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:134: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://172.31.16.118:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.31.16.118:6443: connect: connection refused Oct 2 18:48:32.444000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.444000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.444000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.444000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.444000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.444000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.444000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.444000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.444000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.445000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.445000 audit: BPF prog-id=85 op=LOAD Oct 2 18:48:32.447000 audit[2533]: AVC avc: denied { bpf } for pid=2533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.447000 audit[2533]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000147b38 a2=10 a3=0 items=0 ppid=2409 pid=2533 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:48:32.447000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536323262303633383962373939333031373962343430326530643230 Oct 2 18:48:32.447000 audit[2533]: AVC avc: denied { perfmon } for pid=2533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.447000 audit[2533]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001475a0 a2=3c a3=0 items=0 ppid=2409 pid=2533 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:48:32.447000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536323262303633383962373939333031373962343430326530643230 Oct 2 18:48:32.447000 audit[2533]: AVC avc: denied { bpf } for pid=2533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.447000 audit[2533]: AVC avc: denied { bpf } for pid=2533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.447000 audit[2533]: AVC avc: denied { bpf } for pid=2533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.447000 audit[2533]: AVC avc: denied { perfmon } for pid=2533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.447000 audit[2533]: AVC avc: denied { perfmon } for pid=2533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.447000 audit[2533]: AVC avc: denied { perfmon } for pid=2533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.447000 audit[2533]: AVC avc: denied { perfmon } for pid=2533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.447000 audit[2533]: AVC avc: denied { perfmon } for pid=2533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.447000 audit[2533]: AVC avc: denied { bpf } for pid=2533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.447000 audit[2533]: AVC avc: denied { bpf } for pid=2533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.447000 audit: BPF prog-id=86 op=LOAD Oct 2 18:48:32.447000 audit[2533]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001478e0 a2=78 a3=0 items=0 ppid=2409 pid=2533 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:48:32.447000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536323262303633383962373939333031373962343430326530643230 Oct 2 18:48:32.449000 audit[2533]: AVC avc: denied { bpf } for pid=2533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.449000 audit[2533]: AVC avc: denied { bpf } for pid=2533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.449000 audit[2533]: AVC avc: denied { perfmon } for pid=2533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.449000 audit[2533]: AVC avc: denied { perfmon } for pid=2533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.449000 audit[2533]: AVC avc: denied { perfmon } for pid=2533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.449000 audit[2533]: AVC avc: denied { perfmon } for pid=2533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.449000 audit[2533]: AVC avc: denied { perfmon } for pid=2533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.449000 audit[2533]: AVC avc: denied { bpf } for pid=2533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.449000 audit[2533]: AVC avc: denied { bpf } for pid=2533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.449000 audit: BPF prog-id=87 op=LOAD Oct 2 18:48:32.449000 audit[2533]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000147670 a2=78 a3=0 items=0 ppid=2409 pid=2533 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:48:32.449000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536323262303633383962373939333031373962343430326530643230 Oct 2 18:48:32.450000 audit: BPF prog-id=87 op=UNLOAD Oct 2 18:48:32.453000 audit: BPF prog-id=86 op=UNLOAD Oct 2 18:48:32.453000 audit[2533]: AVC avc: denied { bpf } for pid=2533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.453000 audit[2533]: AVC avc: denied { bpf } for pid=2533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.453000 audit[2533]: AVC avc: denied { bpf } for pid=2533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.453000 audit[2533]: AVC avc: denied { perfmon } for pid=2533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.453000 audit[2533]: AVC avc: denied { perfmon } for pid=2533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.453000 audit[2533]: AVC avc: denied { perfmon } for pid=2533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.453000 audit[2533]: AVC avc: denied { perfmon } for pid=2533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.453000 audit[2533]: AVC avc: denied { perfmon } for pid=2533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.453000 audit[2533]: AVC avc: denied { bpf } for pid=2533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.453000 audit[2533]: AVC avc: denied { bpf } for pid=2533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.453000 audit: BPF prog-id=88 op=LOAD Oct 2 18:48:32.453000 audit[2533]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000147b40 a2=78 a3=0 items=0 ppid=2409 pid=2533 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:48:32.453000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536323262303633383962373939333031373962343430326530643230 Oct 2 18:48:32.485000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.485000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.485000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.485000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.485000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.485000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.485000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.485000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.485000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.486000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.486000 audit: BPF prog-id=89 op=LOAD Oct 2 18:48:32.487000 audit[2554]: AVC avc: denied { bpf } for pid=2554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.487000 audit[2554]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2432 pid=2554 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:48:32.487000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466386135626538396132623061373130643235333862333030633964 Oct 2 18:48:32.488000 audit[2554]: AVC avc: denied { perfmon } for pid=2554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.488000 audit[2554]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2432 pid=2554 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:48:32.488000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466386135626538396132623061373130643235333862333030633964 Oct 2 18:48:32.488000 audit[2554]: AVC avc: denied { bpf } for pid=2554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.488000 audit[2554]: AVC avc: denied { bpf } for pid=2554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.488000 audit[2554]: AVC avc: denied { bpf } for pid=2554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.488000 audit[2554]: AVC avc: denied { perfmon } for pid=2554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.488000 audit[2554]: AVC avc: denied { perfmon } for pid=2554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.488000 audit[2554]: AVC avc: denied { perfmon } for pid=2554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.488000 audit[2554]: AVC avc: denied { perfmon } for pid=2554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.488000 audit[2554]: AVC avc: denied { perfmon } for pid=2554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.488000 audit[2554]: AVC avc: denied { bpf } for pid=2554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.488000 audit[2554]: AVC avc: denied { bpf } for pid=2554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.488000 audit: BPF prog-id=90 op=LOAD Oct 2 18:48:32.488000 audit[2554]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2432 pid=2554 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:48:32.488000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466386135626538396132623061373130643235333862333030633964 Oct 2 18:48:32.489000 audit[2554]: AVC avc: denied { bpf } for pid=2554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.489000 audit[2554]: AVC avc: denied { bpf } for pid=2554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.489000 audit[2554]: AVC avc: denied { perfmon } for pid=2554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.489000 audit[2554]: AVC avc: denied { perfmon } for pid=2554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.489000 audit[2554]: AVC avc: denied { perfmon } for pid=2554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.489000 audit[2554]: AVC avc: denied { perfmon } for pid=2554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.489000 audit[2554]: AVC avc: denied { perfmon } for pid=2554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.489000 audit[2554]: AVC avc: denied { bpf } for pid=2554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.489000 audit[2554]: AVC avc: denied { bpf } for pid=2554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.489000 audit: BPF prog-id=91 op=LOAD Oct 2 18:48:32.489000 audit[2554]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2432 pid=2554 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:48:32.489000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466386135626538396132623061373130643235333862333030633964 Oct 2 18:48:32.490000 audit: BPF prog-id=91 op=UNLOAD Oct 2 18:48:32.490000 audit: BPF prog-id=90 op=UNLOAD Oct 2 18:48:32.491000 audit[2554]: AVC avc: denied { bpf } for pid=2554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.491000 audit[2554]: AVC avc: denied { bpf } for pid=2554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.491000 audit[2554]: AVC avc: denied { bpf } for pid=2554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.491000 audit[2554]: AVC avc: denied { perfmon } for pid=2554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.491000 audit[2554]: AVC avc: denied { perfmon } for pid=2554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.491000 audit[2554]: AVC avc: denied { perfmon } for pid=2554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.491000 audit[2554]: AVC avc: denied { perfmon } for pid=2554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.491000 audit[2554]: AVC avc: denied { perfmon } for pid=2554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.491000 audit[2554]: AVC avc: denied { bpf } for pid=2554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.491000 audit[2554]: AVC avc: denied { bpf } for pid=2554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.491000 audit: BPF prog-id=92 op=LOAD Oct 2 18:48:32.491000 audit[2554]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2432 pid=2554 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:48:32.491000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466386135626538396132623061373130643235333862333030633964 Oct 2 18:48:32.504178 kubelet[2317]: E1002 18:48:32.504120 2317 kubelet.go:2448] "Error getting node" err="node \"ip-172-31-16-118\" not found" Oct 2 18:48:32.510000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.510000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.510000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.510000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.510000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.510000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.510000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.510000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.510000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.510000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.510000 audit: BPF prog-id=93 op=LOAD Oct 2 18:48:32.512000 audit[2532]: AVC avc: denied { bpf } for pid=2532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.512000 audit[2532]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=2397 pid=2532 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:48:32.512000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665326330633237393134663839393230363662663838393735663763 Oct 2 18:48:32.512000 audit[2532]: AVC avc: denied { perfmon } for pid=2532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.512000 audit[2532]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=2397 pid=2532 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:48:32.512000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665326330633237393134663839393230363662663838393735663763 Oct 2 18:48:32.513000 audit[2532]: AVC avc: denied { bpf } for pid=2532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.513000 audit[2532]: AVC avc: denied { bpf } for pid=2532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.513000 audit[2532]: AVC avc: denied { bpf } for pid=2532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.513000 audit[2532]: AVC avc: denied { perfmon } for pid=2532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.513000 audit[2532]: AVC avc: denied { perfmon } for pid=2532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.513000 audit[2532]: AVC avc: denied { perfmon } for pid=2532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.513000 audit[2532]: AVC avc: denied { perfmon } for pid=2532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.513000 audit[2532]: AVC avc: denied { perfmon } for pid=2532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.513000 audit[2532]: AVC avc: denied { bpf } for pid=2532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.513000 audit[2532]: AVC avc: denied { bpf } for pid=2532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.513000 audit: BPF prog-id=94 op=LOAD Oct 2 18:48:32.513000 audit[2532]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=2397 pid=2532 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:48:32.513000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665326330633237393134663839393230363662663838393735663763 Oct 2 18:48:32.514000 audit[2532]: AVC avc: denied { bpf } for pid=2532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.514000 audit[2532]: AVC avc: denied { bpf } for pid=2532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.514000 audit[2532]: AVC avc: denied { perfmon } for pid=2532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.514000 audit[2532]: AVC avc: denied { perfmon } for pid=2532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.514000 audit[2532]: AVC avc: denied { perfmon } for pid=2532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.514000 audit[2532]: AVC avc: denied { perfmon } for pid=2532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.514000 audit[2532]: AVC avc: denied { perfmon } for pid=2532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.514000 audit[2532]: AVC avc: denied { bpf } for pid=2532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.514000 audit[2532]: AVC avc: denied { bpf } for pid=2532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.514000 audit: BPF prog-id=95 op=LOAD Oct 2 18:48:32.514000 audit[2532]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=2397 pid=2532 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:48:32.514000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665326330633237393134663839393230363662663838393735663763 Oct 2 18:48:32.515000 audit: BPF prog-id=95 op=UNLOAD Oct 2 18:48:32.519000 audit: BPF prog-id=94 op=UNLOAD Oct 2 18:48:32.519000 audit[2532]: AVC avc: denied { bpf } for pid=2532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.519000 audit[2532]: AVC avc: denied { bpf } for pid=2532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.519000 audit[2532]: AVC avc: denied { bpf } for pid=2532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.519000 audit[2532]: AVC avc: denied { perfmon } for pid=2532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.519000 audit[2532]: AVC avc: denied { perfmon } for pid=2532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.519000 audit[2532]: AVC avc: denied { perfmon } for pid=2532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.519000 audit[2532]: AVC avc: denied { perfmon } for pid=2532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.519000 audit[2532]: AVC avc: denied { perfmon } for pid=2532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.519000 audit[2532]: AVC avc: denied { bpf } for pid=2532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.519000 audit[2532]: AVC avc: denied { bpf } for pid=2532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:32.519000 audit: BPF prog-id=96 op=LOAD Oct 2 18:48:32.519000 audit[2532]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=2397 pid=2532 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:48:32.519000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665326330633237393134663839393230363662663838393735663763 Oct 2 18:48:32.545705 env[1656]: time="2023-10-02T18:48:32.545635143Z" level=info msg="StartContainer for \"5622b06389b79930179b4402e0d20e5a3f02aa23fa05a720e83e25779a87394c\" returns successfully" Oct 2 18:48:32.604364 kubelet[2317]: E1002 18:48:32.604312 2317 kubelet.go:2448] "Error getting node" err="node \"ip-172-31-16-118\" not found" Oct 2 18:48:32.622030 env[1656]: time="2023-10-02T18:48:32.612272101Z" level=info msg="StartContainer for \"6e2c0c27914f8992066bf88975f7c3d1db81c9151d4ed5df1ea094453bae2d1d\" returns successfully" Oct 2 18:48:32.645127 env[1656]: time="2023-10-02T18:48:32.645065062Z" level=info msg="StartContainer for \"df8a5be89a2b0a710d2538b300c9d28062cdc943d8343f74cd081e22d9ffc94a\" returns successfully" Oct 2 18:48:32.664913 kubelet[2317]: E1002 18:48:32.664856 2317 certificate_manager.go:471] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://172.31.16.118:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 172.31.16.118:6443: connect: connection refused Oct 2 18:48:32.705017 kubelet[2317]: E1002 18:48:32.704900 2317 kubelet.go:2448] "Error getting node" err="node \"ip-172-31-16-118\" not found" Oct 2 18:48:32.805348 kubelet[2317]: E1002 18:48:32.805226 2317 kubelet.go:2448] "Error getting node" err="node \"ip-172-31-16-118\" not found" Oct 2 18:48:32.905957 kubelet[2317]: E1002 18:48:32.905828 2317 kubelet.go:2448] "Error getting node" err="node \"ip-172-31-16-118\" not found" Oct 2 18:48:33.006120 kubelet[2317]: E1002 18:48:33.006067 2317 kubelet.go:2448] "Error getting node" err="node \"ip-172-31-16-118\" not found" Oct 2 18:48:33.106737 kubelet[2317]: E1002 18:48:33.106684 2317 kubelet.go:2448] "Error getting node" err="node \"ip-172-31-16-118\" not found" Oct 2 18:48:33.207650 kubelet[2317]: E1002 18:48:33.207519 2317 kubelet.go:2448] "Error getting node" err="node \"ip-172-31-16-118\" not found" Oct 2 18:48:33.308222 kubelet[2317]: E1002 18:48:33.308168 2317 kubelet.go:2448] "Error getting node" err="node \"ip-172-31-16-118\" not found" Oct 2 18:48:33.408886 kubelet[2317]: E1002 18:48:33.408829 2317 kubelet.go:2448] "Error getting node" err="node \"ip-172-31-16-118\" not found" Oct 2 18:48:33.509800 kubelet[2317]: E1002 18:48:33.509678 2317 kubelet.go:2448] "Error getting node" err="node \"ip-172-31-16-118\" not found" Oct 2 18:48:33.610442 kubelet[2317]: E1002 18:48:33.610387 2317 kubelet.go:2448] "Error getting node" err="node \"ip-172-31-16-118\" not found" Oct 2 18:48:33.711022 kubelet[2317]: E1002 18:48:33.710975 2317 kubelet.go:2448] "Error getting node" err="node \"ip-172-31-16-118\" not found" Oct 2 18:48:33.811607 kubelet[2317]: E1002 18:48:33.811541 2317 kubelet.go:2448] "Error getting node" err="node \"ip-172-31-16-118\" not found" Oct 2 18:48:33.812512 kubelet[2317]: I1002 18:48:33.812472 2317 kubelet_node_status.go:70] "Attempting to register node" node="ip-172-31-16-118" Oct 2 18:48:33.911975 kubelet[2317]: E1002 18:48:33.911926 2317 kubelet.go:2448] "Error getting node" err="node \"ip-172-31-16-118\" not found" Oct 2 18:48:34.012569 kubelet[2317]: E1002 18:48:34.012507 2317 kubelet.go:2448] "Error getting node" err="node \"ip-172-31-16-118\" not found" Oct 2 18:48:34.113236 kubelet[2317]: E1002 18:48:34.113102 2317 kubelet.go:2448] "Error getting node" err="node \"ip-172-31-16-118\" not found" Oct 2 18:48:34.214100 kubelet[2317]: E1002 18:48:34.214043 2317 kubelet.go:2448] "Error getting node" err="node \"ip-172-31-16-118\" not found" Oct 2 18:48:34.315228 kubelet[2317]: E1002 18:48:34.315178 2317 kubelet.go:2448] "Error getting node" err="node \"ip-172-31-16-118\" not found" Oct 2 18:48:34.415604 kubelet[2317]: E1002 18:48:34.415457 2317 kubelet.go:2448] "Error getting node" err="node \"ip-172-31-16-118\" not found" Oct 2 18:48:34.516298 kubelet[2317]: E1002 18:48:34.516238 2317 kubelet.go:2448] "Error getting node" err="node \"ip-172-31-16-118\" not found" Oct 2 18:48:34.617103 kubelet[2317]: E1002 18:48:34.617042 2317 kubelet.go:2448] "Error getting node" err="node \"ip-172-31-16-118\" not found" Oct 2 18:48:34.717620 kubelet[2317]: E1002 18:48:34.717405 2317 kubelet.go:2448] "Error getting node" err="node \"ip-172-31-16-118\" not found" Oct 2 18:48:34.818507 kubelet[2317]: E1002 18:48:34.818440 2317 kubelet.go:2448] "Error getting node" err="node \"ip-172-31-16-118\" not found" Oct 2 18:48:34.919226 kubelet[2317]: E1002 18:48:34.919167 2317 kubelet.go:2448] "Error getting node" err="node \"ip-172-31-16-118\" not found" Oct 2 18:48:35.020304 kubelet[2317]: E1002 18:48:35.020236 2317 kubelet.go:2448] "Error getting node" err="node \"ip-172-31-16-118\" not found" Oct 2 18:48:35.121163 kubelet[2317]: E1002 18:48:35.121104 2317 kubelet.go:2448] "Error getting node" err="node \"ip-172-31-16-118\" not found" Oct 2 18:48:35.221958 kubelet[2317]: E1002 18:48:35.221902 2317 kubelet.go:2448] "Error getting node" err="node \"ip-172-31-16-118\" not found" Oct 2 18:48:35.322656 kubelet[2317]: E1002 18:48:35.322514 2317 kubelet.go:2448] "Error getting node" err="node \"ip-172-31-16-118\" not found" Oct 2 18:48:35.423164 kubelet[2317]: E1002 18:48:35.423108 2317 kubelet.go:2448] "Error getting node" err="node \"ip-172-31-16-118\" not found" Oct 2 18:48:35.523978 kubelet[2317]: E1002 18:48:35.523919 2317 kubelet.go:2448] "Error getting node" err="node \"ip-172-31-16-118\" not found" Oct 2 18:48:35.624719 kubelet[2317]: E1002 18:48:35.624584 2317 kubelet.go:2448] "Error getting node" err="node \"ip-172-31-16-118\" not found" Oct 2 18:48:35.725779 kubelet[2317]: E1002 18:48:35.725721 2317 kubelet.go:2448] "Error getting node" err="node \"ip-172-31-16-118\" not found" Oct 2 18:48:35.727000 audit[2568]: AVC avc: denied { watch } for pid=2568 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=7083 scontext=system_u:system_r:svirt_lxc_net_t:s0:c112,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 18:48:35.731551 kernel: kauditd_printk_skb: 658 callbacks suppressed Oct 2 18:48:35.731638 kernel: audit: type=1400 audit(1696272515.727:729): avc: denied { watch } for pid=2568 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=7083 scontext=system_u:system_r:svirt_lxc_net_t:s0:c112,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 18:48:35.738000 audit[2568]: AVC avc: denied { watch } for pid=2568 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=6812 scontext=system_u:system_r:svirt_lxc_net_t:s0:c112,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 18:48:35.753648 kernel: audit: type=1400 audit(1696272515.738:730): avc: denied { watch } for pid=2568 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=6812 scontext=system_u:system_r:svirt_lxc_net_t:s0:c112,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 18:48:35.738000 audit[2568]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=c a1=40003f4900 a2=fc6 a3=0 items=0 ppid=2409 pid=2568 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c112,c621 key=(null) Oct 2 18:48:35.766901 kernel: audit: type=1300 audit(1696272515.738:730): arch=c00000b7 syscall=27 success=no exit=-13 a0=c a1=40003f4900 a2=fc6 a3=0 items=0 ppid=2409 pid=2568 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c112,c621 key=(null) Oct 2 18:48:35.738000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 18:48:35.780120 kernel: audit: type=1327 audit(1696272515.738:730): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 18:48:35.727000 audit[2568]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=400013a450 a2=fc6 a3=0 items=0 ppid=2409 pid=2568 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c112,c621 key=(null) Oct 2 18:48:35.796595 kernel: audit: type=1300 audit(1696272515.727:729): arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=400013a450 a2=fc6 a3=0 items=0 ppid=2409 pid=2568 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c112,c621 key=(null) Oct 2 18:48:35.796712 kernel: audit: type=1327 audit(1696272515.727:729): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 18:48:35.727000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 18:48:35.800551 kubelet[2317]: E1002 18:48:35.800482 2317 kubelet.go:2373] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 18:48:35.826682 kubelet[2317]: E1002 18:48:35.826624 2317 kubelet.go:2448] "Error getting node" err="node \"ip-172-31-16-118\" not found" Oct 2 18:48:35.927603 kubelet[2317]: E1002 18:48:35.927424 2317 kubelet.go:2448] "Error getting node" err="node \"ip-172-31-16-118\" not found" Oct 2 18:48:35.944677 update_engine[1642]: I1002 18:48:35.944612 1642 update_attempter.cc:505] Updating boot flags... Oct 2 18:48:36.028438 kubelet[2317]: E1002 18:48:36.028348 2317 kubelet.go:2448] "Error getting node" err="node \"ip-172-31-16-118\" not found" Oct 2 18:48:36.130697 kubelet[2317]: E1002 18:48:36.130642 2317 kubelet.go:2448] "Error getting node" err="node \"ip-172-31-16-118\" not found" Oct 2 18:48:36.236022 kubelet[2317]: E1002 18:48:36.231279 2317 kubelet.go:2448] "Error getting node" err="node \"ip-172-31-16-118\" not found" Oct 2 18:48:36.332876 kubelet[2317]: E1002 18:48:36.332777 2317 kubelet.go:2448] "Error getting node" err="node \"ip-172-31-16-118\" not found" Oct 2 18:48:36.433843 kubelet[2317]: E1002 18:48:36.433774 2317 kubelet.go:2448] "Error getting node" err="node \"ip-172-31-16-118\" not found" Oct 2 18:48:36.534078 kubelet[2317]: E1002 18:48:36.533979 2317 kubelet.go:2448] "Error getting node" err="node \"ip-172-31-16-118\" not found" Oct 2 18:48:36.636744 kubelet[2317]: E1002 18:48:36.636667 2317 kubelet.go:2448] "Error getting node" err="node \"ip-172-31-16-118\" not found" Oct 2 18:48:36.737337 kubelet[2317]: E1002 18:48:36.737282 2317 kubelet.go:2448] "Error getting node" err="node \"ip-172-31-16-118\" not found" Oct 2 18:48:36.838615 kubelet[2317]: E1002 18:48:36.838105 2317 kubelet.go:2448] "Error getting node" err="node \"ip-172-31-16-118\" not found" Oct 2 18:48:36.938383 kubelet[2317]: E1002 18:48:36.938310 2317 kubelet.go:2448] "Error getting node" err="node \"ip-172-31-16-118\" not found" Oct 2 18:48:37.038733 kubelet[2317]: E1002 18:48:37.038673 2317 kubelet.go:2448] "Error getting node" err="node \"ip-172-31-16-118\" not found" Oct 2 18:48:37.139733 kubelet[2317]: E1002 18:48:37.139585 2317 kubelet.go:2448] "Error getting node" err="node \"ip-172-31-16-118\" not found" Oct 2 18:48:37.240686 kubelet[2317]: E1002 18:48:37.240621 2317 kubelet.go:2448] "Error getting node" err="node \"ip-172-31-16-118\" not found" Oct 2 18:48:37.341243 kubelet[2317]: E1002 18:48:37.341197 2317 kubelet.go:2448] "Error getting node" err="node \"ip-172-31-16-118\" not found" Oct 2 18:48:37.441958 kubelet[2317]: E1002 18:48:37.441820 2317 kubelet.go:2448] "Error getting node" err="node \"ip-172-31-16-118\" not found" Oct 2 18:48:37.542714 kubelet[2317]: E1002 18:48:37.542668 2317 kubelet.go:2448] "Error getting node" err="node \"ip-172-31-16-118\" not found" Oct 2 18:48:37.643329 kubelet[2317]: E1002 18:48:37.643265 2317 kubelet.go:2448] "Error getting node" err="node \"ip-172-31-16-118\" not found" Oct 2 18:48:37.744439 kubelet[2317]: E1002 18:48:37.744303 2317 kubelet.go:2448] "Error getting node" err="node \"ip-172-31-16-118\" not found" Oct 2 18:48:37.846146 kubelet[2317]: E1002 18:48:37.846081 2317 kubelet.go:2448] "Error getting node" err="node \"ip-172-31-16-118\" not found" Oct 2 18:48:37.946773 kubelet[2317]: E1002 18:48:37.946718 2317 kubelet.go:2448] "Error getting node" err="node \"ip-172-31-16-118\" not found" Oct 2 18:48:38.047214 kubelet[2317]: E1002 18:48:38.047139 2317 kubelet.go:2448] "Error getting node" err="node \"ip-172-31-16-118\" not found" Oct 2 18:48:38.147919 kubelet[2317]: E1002 18:48:38.147847 2317 kubelet.go:2448] "Error getting node" err="node \"ip-172-31-16-118\" not found" Oct 2 18:48:38.248787 kubelet[2317]: E1002 18:48:38.248725 2317 kubelet.go:2448] "Error getting node" err="node \"ip-172-31-16-118\" not found" Oct 2 18:48:38.349728 kubelet[2317]: E1002 18:48:38.349583 2317 kubelet.go:2448] "Error getting node" err="node \"ip-172-31-16-118\" not found" Oct 2 18:48:38.450447 kubelet[2317]: E1002 18:48:38.450380 2317 kubelet.go:2448] "Error getting node" err="node \"ip-172-31-16-118\" not found" Oct 2 18:48:38.551449 kubelet[2317]: E1002 18:48:38.551381 2317 kubelet.go:2448] "Error getting node" err="node \"ip-172-31-16-118\" not found" Oct 2 18:48:38.652290 kubelet[2317]: E1002 18:48:38.652149 2317 kubelet.go:2448] "Error getting node" err="node \"ip-172-31-16-118\" not found" Oct 2 18:48:38.753363 kubelet[2317]: E1002 18:48:38.753306 2317 kubelet.go:2448] "Error getting node" err="node \"ip-172-31-16-118\" not found" Oct 2 18:48:38.854197 kubelet[2317]: E1002 18:48:38.854139 2317 kubelet.go:2448] "Error getting node" err="node \"ip-172-31-16-118\" not found" Oct 2 18:48:38.955090 kubelet[2317]: E1002 18:48:38.954949 2317 kubelet.go:2448] "Error getting node" err="node \"ip-172-31-16-118\" not found" Oct 2 18:48:38.962000 audit[2576]: AVC avc: denied { watch } for pid=2576 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=7083 scontext=system_u:system_r:svirt_lxc_net_t:s0:c376,c943 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 18:48:38.962000 audit[2576]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=43 a1=4009348b10 a2=fc6 a3=0 items=0 ppid=2397 pid=2576 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c376,c943 key=(null) Oct 2 18:48:38.988623 kernel: audit: type=1400 audit(1696272518.962:731): avc: denied { watch } for pid=2576 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=7083 scontext=system_u:system_r:svirt_lxc_net_t:s0:c376,c943 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 18:48:38.988745 kernel: audit: type=1300 audit(1696272518.962:731): arch=c00000b7 syscall=27 success=no exit=-13 a0=43 a1=4009348b10 a2=fc6 a3=0 items=0 ppid=2397 pid=2576 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c376,c943 key=(null) Oct 2 18:48:38.962000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31362E313138002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 18:48:39.006264 kernel: audit: type=1327 audit(1696272518.962:731): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31362E313138002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 18:48:38.963000 audit[2576]: AVC avc: denied { watch } for pid=2576 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=7078 scontext=system_u:system_r:svirt_lxc_net_t:s0:c376,c943 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 18:48:39.021471 kernel: audit: type=1400 audit(1696272518.963:732): avc: denied { watch } for pid=2576 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=7078 scontext=system_u:system_r:svirt_lxc_net_t:s0:c376,c943 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 18:48:38.963000 audit[2576]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=43 a1=4009348b70 a2=fc6 a3=0 items=0 ppid=2397 pid=2576 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c376,c943 key=(null) Oct 2 18:48:38.963000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31362E313138002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 18:48:38.982000 audit[2576]: AVC avc: denied { watch } for pid=2576 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=7085 scontext=system_u:system_r:svirt_lxc_net_t:s0:c376,c943 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 18:48:38.982000 audit[2576]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=51 a1=40093499b0 a2=fc6 a3=0 items=0 ppid=2397 pid=2576 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c376,c943 key=(null) Oct 2 18:48:38.982000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31362E313138002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 18:48:38.982000 audit[2576]: AVC avc: denied { watch } for pid=2576 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=6812 scontext=system_u:system_r:svirt_lxc_net_t:s0:c376,c943 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 18:48:38.982000 audit[2576]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=51 a1=40028055c0 a2=fc6 a3=0 items=0 ppid=2397 pid=2576 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c376,c943 key=(null) Oct 2 18:48:38.982000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31362E313138002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 18:48:39.059090 kubelet[2317]: E1002 18:48:39.059052 2317 kubelet.go:2448] "Error getting node" err="node \"ip-172-31-16-118\" not found" Oct 2 18:48:39.124000 audit[2576]: AVC avc: denied { watch } for pid=2576 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=6812 scontext=system_u:system_r:svirt_lxc_net_t:s0:c376,c943 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 18:48:39.124000 audit[2576]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=45 a1=4002d5e4c0 a2=fc6 a3=0 items=0 ppid=2397 pid=2576 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c376,c943 key=(null) Oct 2 18:48:39.124000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31362E313138002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 18:48:39.125000 audit[2576]: AVC avc: denied { watch } for pid=2576 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=7083 scontext=system_u:system_r:svirt_lxc_net_t:s0:c376,c943 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 18:48:39.125000 audit[2576]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=45 a1=40053d2690 a2=fc6 a3=0 items=0 ppid=2397 pid=2576 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c376,c943 key=(null) Oct 2 18:48:39.125000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31362E313138002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 18:48:39.159751 kubelet[2317]: E1002 18:48:39.159712 2317 kubelet.go:2448] "Error getting node" err="node \"ip-172-31-16-118\" not found" Oct 2 18:48:39.170466 kubelet[2317]: I1002 18:48:39.170398 2317 kubelet_node_status.go:73] "Successfully registered node" node="ip-172-31-16-118" Oct 2 18:48:39.262028 kubelet[2317]: E1002 18:48:39.261442 2317 controller.go:144] failed to ensure lease exists, will retry in 3.2s, error: namespaces "kube-node-lease" not found Oct 2 18:48:39.682752 kubelet[2317]: I1002 18:48:39.682603 2317 apiserver.go:52] "Watching apiserver" Oct 2 18:48:39.785315 kubelet[2317]: I1002 18:48:39.785273 2317 reconciler.go:169] "Reconciler: start to sync state" Oct 2 18:48:39.844826 kubelet[2317]: E1002 18:48:39.844700 2317 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ip-172-31-16-118.178a5edc7905a4bf", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ip-172-31-16-118", UID:"ip-172-31-16-118", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"ip-172-31-16-118"}, FirstTimestamp:time.Date(2023, time.October, 2, 18, 48, 30, 674642111, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 18, 48, 30, 674642111, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Oct 2 18:48:39.901939 kubelet[2317]: E1002 18:48:39.901818 2317 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ip-172-31-16-118.178a5edc796959d5", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ip-172-31-16-118", UID:"ip-172-31-16-118", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"InvalidDiskCapacity", Message:"invalid capacity 0 on image filesystem", Source:v1.EventSource{Component:"kubelet", Host:"ip-172-31-16-118"}, FirstTimestamp:time.Date(2023, time.October, 2, 18, 48, 30, 681176533, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 18, 48, 30, 681176533, time.Local), Count:1, Type:"Warning", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Oct 2 18:48:39.957768 kubelet[2317]: E1002 18:48:39.957568 2317 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ip-172-31-16-118.178a5edc7e036399", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ip-172-31-16-118", UID:"ip-172-31-16-118", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node ip-172-31-16-118 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"ip-172-31-16-118"}, FirstTimestamp:time.Date(2023, time.October, 2, 18, 48, 30, 758380441, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 18, 48, 30, 758380441, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Oct 2 18:48:40.018141 kubelet[2317]: E1002 18:48:40.018015 2317 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ip-172-31-16-118.178a5edc7e038715", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ip-172-31-16-118", UID:"ip-172-31-16-118", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node ip-172-31-16-118 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"ip-172-31-16-118"}, FirstTimestamp:time.Date(2023, time.October, 2, 18, 48, 30, 758389525, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 18, 48, 30, 758389525, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Oct 2 18:48:40.073882 kubelet[2317]: E1002 18:48:40.073700 2317 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ip-172-31-16-118.178a5edc7e03a01d", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ip-172-31-16-118", UID:"ip-172-31-16-118", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node ip-172-31-16-118 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"ip-172-31-16-118"}, FirstTimestamp:time.Date(2023, time.October, 2, 18, 48, 30, 758395933, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 18, 48, 30, 758395933, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Oct 2 18:48:40.134859 kubelet[2317]: E1002 18:48:40.134727 2317 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ip-172-31-16-118.178a5edc7e036399", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ip-172-31-16-118", UID:"ip-172-31-16-118", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node ip-172-31-16-118 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"ip-172-31-16-118"}, FirstTimestamp:time.Date(2023, time.October, 2, 18, 48, 30, 758380441, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 18, 48, 30, 797772993, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Oct 2 18:48:40.196406 kubelet[2317]: E1002 18:48:40.196211 2317 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ip-172-31-16-118.178a5edc7e038715", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ip-172-31-16-118", UID:"ip-172-31-16-118", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node ip-172-31-16-118 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"ip-172-31-16-118"}, FirstTimestamp:time.Date(2023, time.October, 2, 18, 48, 30, 758389525, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 18, 48, 30, 797780624, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Oct 2 18:48:40.256361 kubelet[2317]: E1002 18:48:40.256134 2317 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ip-172-31-16-118.178a5edc7e03a01d", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ip-172-31-16-118", UID:"ip-172-31-16-118", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node ip-172-31-16-118 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"ip-172-31-16-118"}, FirstTimestamp:time.Date(2023, time.October, 2, 18, 48, 30, 758395933, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 18, 48, 30, 797790524, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Oct 2 18:48:40.312801 kubelet[2317]: E1002 18:48:40.312669 2317 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ip-172-31-16-118.178a5edc80d736ea", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ip-172-31-16-118", UID:"ip-172-31-16-118", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeAllocatableEnforced", Message:"Updated Node Allocatable limit across pods", Source:v1.EventSource{Component:"kubelet", Host:"ip-172-31-16-118"}, FirstTimestamp:time.Date(2023, time.October, 2, 18, 48, 30, 805817066, time.Local), LastTimestamp:time.Date(2023, time.October, 2, 18, 48, 30, 805817066, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Oct 2 18:48:40.802250 kubelet[2317]: E1002 18:48:40.802177 2317 kubelet.go:2373] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 18:48:41.351000 audit[2568]: AVC avc: denied { watch } for pid=2568 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="nvme0n1p9" ino=7112 scontext=system_u:system_r:svirt_lxc_net_t:s0:c112,c621 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Oct 2 18:48:41.354930 kernel: kauditd_printk_skb: 14 callbacks suppressed Oct 2 18:48:41.355028 kernel: audit: type=1400 audit(1696272521.351:737): avc: denied { watch } for pid=2568 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="nvme0n1p9" ino=7112 scontext=system_u:system_r:svirt_lxc_net_t:s0:c112,c621 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Oct 2 18:48:41.351000 audit[2568]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000c53040 a2=fc6 a3=0 items=0 ppid=2409 pid=2568 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c112,c621 key=(null) Oct 2 18:48:41.378045 kernel: audit: type=1300 audit(1696272521.351:737): arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000c53040 a2=fc6 a3=0 items=0 ppid=2409 pid=2568 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c112,c621 key=(null) Oct 2 18:48:41.351000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 18:48:41.388970 kernel: audit: type=1327 audit(1696272521.351:737): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 18:48:42.162338 systemd[1]: Reloading. Oct 2 18:48:42.359119 /usr/lib/systemd/system-generators/torcx-generator[2831]: time="2023-10-02T18:48:42Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.0 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.0 /var/lib/torcx/store]" Oct 2 18:48:42.359180 /usr/lib/systemd/system-generators/torcx-generator[2831]: time="2023-10-02T18:48:42Z" level=info msg="torcx already run" Oct 2 18:48:42.624521 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 2 18:48:42.624749 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 2 18:48:42.666496 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 2 18:48:42.887000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.895000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.905361 kernel: audit: type=1400 audit(1696272522.887:738): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.905437 kernel: audit: type=1400 audit(1696272522.895:739): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.895000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.913494 kernel: audit: type=1400 audit(1696272522.895:740): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.895000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.921737 kernel: audit: type=1400 audit(1696272522.895:741): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.921811 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Oct 2 18:48:42.895000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.931506 kernel: audit: type=1400 audit(1696272522.895:742): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.931599 kernel: audit: audit_lost=21 audit_rate_limit=0 audit_backlog_limit=64 Oct 2 18:48:42.895000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.895000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.895000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.895000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.895000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.895000 audit: BPF prog-id=97 op=LOAD Oct 2 18:48:42.895000 audit: BPF prog-id=58 op=UNLOAD Oct 2 18:48:42.895000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.895000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.895000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.895000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.895000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.895000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.895000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.895000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.895000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.895000 audit: BPF prog-id=98 op=LOAD Oct 2 18:48:42.895000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.895000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.895000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.895000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.895000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.895000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.895000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.895000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.895000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.895000 audit: BPF prog-id=99 op=LOAD Oct 2 18:48:42.895000 audit: BPF prog-id=59 op=UNLOAD Oct 2 18:48:42.895000 audit: BPF prog-id=60 op=UNLOAD Oct 2 18:48:42.898000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.898000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.898000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.898000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.898000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.898000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.898000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.898000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.898000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.903000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.903000 audit: BPF prog-id=100 op=LOAD Oct 2 18:48:42.903000 audit: BPF prog-id=73 op=UNLOAD Oct 2 18:48:42.905000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.905000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.905000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.905000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.905000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.905000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.905000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.905000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.905000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.911000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.911000 audit: BPF prog-id=101 op=LOAD Oct 2 18:48:42.911000 audit: BPF prog-id=85 op=UNLOAD Oct 2 18:48:42.914000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.914000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.914000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.914000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.914000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.914000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.914000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.914000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.914000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.920000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.920000 audit: BPF prog-id=102 op=LOAD Oct 2 18:48:42.933000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.933000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.933000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.933000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.933000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.933000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.933000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.933000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.933000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.933000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.933000 audit: BPF prog-id=103 op=LOAD Oct 2 18:48:42.933000 audit: BPF prog-id=77 op=UNLOAD Oct 2 18:48:42.935000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.935000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.935000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.935000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.935000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.935000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.935000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.935000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.935000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.935000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.935000 audit: BPF prog-id=104 op=LOAD Oct 2 18:48:42.935000 audit: BPF prog-id=81 op=UNLOAD Oct 2 18:48:42.937000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.937000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.937000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.937000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.937000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.937000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.937000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.937000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.937000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.937000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.937000 audit: BPF prog-id=105 op=LOAD Oct 2 18:48:42.937000 audit: BPF prog-id=62 op=UNLOAD Oct 2 18:48:42.938000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.938000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.938000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.938000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.938000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.938000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.938000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.938000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.938000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.938000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.938000 audit: BPF prog-id=106 op=LOAD Oct 2 18:48:42.938000 audit: BPF prog-id=63 op=UNLOAD Oct 2 18:48:42.942000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.942000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.942000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.942000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.942000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.942000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.942000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.942000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.942000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.942000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.942000 audit: BPF prog-id=107 op=LOAD Oct 2 18:48:42.942000 audit: BPF prog-id=89 op=UNLOAD Oct 2 18:48:42.944000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.945000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.945000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.945000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.945000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.945000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.945000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.945000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.945000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.945000 audit: BPF prog-id=108 op=LOAD Oct 2 18:48:42.945000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.945000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.945000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.945000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.945000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.945000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.945000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.945000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.945000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.945000 audit: BPF prog-id=109 op=LOAD Oct 2 18:48:42.945000 audit: BPF prog-id=64 op=UNLOAD Oct 2 18:48:42.945000 audit: BPF prog-id=65 op=UNLOAD Oct 2 18:48:42.946000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.946000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.946000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.946000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.946000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.946000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.946000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.946000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.946000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.947000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.947000 audit: BPF prog-id=110 op=LOAD Oct 2 18:48:42.947000 audit: BPF prog-id=93 op=UNLOAD Oct 2 18:48:42.950000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.950000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.950000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.950000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.950000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.950000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.950000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.950000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.950000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.950000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.950000 audit: BPF prog-id=111 op=LOAD Oct 2 18:48:42.950000 audit: BPF prog-id=66 op=UNLOAD Oct 2 18:48:42.951000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.951000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.951000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.951000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.951000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.951000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.951000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.951000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.951000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.951000 audit: BPF prog-id=112 op=LOAD Oct 2 18:48:42.951000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.951000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.951000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.951000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.951000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.951000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.951000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.951000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.951000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.951000 audit: BPF prog-id=113 op=LOAD Oct 2 18:48:42.951000 audit: BPF prog-id=67 op=UNLOAD Oct 2 18:48:42.951000 audit: BPF prog-id=68 op=UNLOAD Oct 2 18:48:42.954000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.954000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.954000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.954000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.954000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.954000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.954000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.954000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.954000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.954000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.954000 audit: BPF prog-id=114 op=LOAD Oct 2 18:48:42.954000 audit: BPF prog-id=69 op=UNLOAD Oct 2 18:48:42.955000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.955000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.955000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.955000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.955000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.955000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.955000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.955000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.955000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.955000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.955000 audit: BPF prog-id=115 op=LOAD Oct 2 18:48:42.955000 audit: BPF prog-id=70 op=UNLOAD Oct 2 18:48:42.956000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.956000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.956000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.956000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.956000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.956000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.956000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.956000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.956000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.956000 audit: BPF prog-id=116 op=LOAD Oct 2 18:48:42.956000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.956000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.956000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.956000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.956000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.956000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.956000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.956000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.956000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:42.956000 audit: BPF prog-id=117 op=LOAD Oct 2 18:48:42.956000 audit: BPF prog-id=71 op=UNLOAD Oct 2 18:48:42.956000 audit: BPF prog-id=72 op=UNLOAD Oct 2 18:48:43.016032 systemd[1]: Stopping kubelet.service... Oct 2 18:48:43.016891 kubelet[2317]: I1002 18:48:43.016837 2317 dynamic_cafile_content.go:171] "Shutting down controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Oct 2 18:48:43.043312 systemd[1]: kubelet.service: Deactivated successfully. Oct 2 18:48:43.043758 systemd[1]: Stopped kubelet.service. Oct 2 18:48:43.043855 systemd[1]: kubelet.service: Consumed 2.435s CPU time. Oct 2 18:48:43.042000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:48:43.047000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:48:43.049117 systemd[1]: Started kubelet.service. Oct 2 18:48:43.266283 kubelet[2886]: Flag --container-runtime has been deprecated, will be removed in 1.27 as the only valid value is 'remote' Oct 2 18:48:43.266835 kubelet[2886]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Oct 2 18:48:43.266935 kubelet[2886]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Oct 2 18:48:43.267241 kubelet[2886]: I1002 18:48:43.267187 2886 server.go:200] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Oct 2 18:48:43.270094 kubelet[2886]: Flag --container-runtime has been deprecated, will be removed in 1.27 as the only valid value is 'remote' Oct 2 18:48:43.270283 kubelet[2886]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Oct 2 18:48:43.270382 kubelet[2886]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Oct 2 18:48:43.288921 kubelet[2886]: I1002 18:48:43.288872 2886 server.go:413] "Kubelet version" kubeletVersion="v1.25.10" Oct 2 18:48:43.289122 kubelet[2886]: I1002 18:48:43.289099 2886 server.go:415] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Oct 2 18:48:43.289606 kubelet[2886]: I1002 18:48:43.289581 2886 server.go:825] "Client rotation is on, will bootstrap in background" Oct 2 18:48:43.301207 kubelet[2886]: I1002 18:48:43.301151 2886 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Oct 2 18:48:43.305930 kubelet[2886]: I1002 18:48:43.305875 2886 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Oct 2 18:48:43.312493 kubelet[2886]: W1002 18:48:43.312455 2886 machine.go:65] Cannot read vendor id correctly, set empty. Oct 2 18:48:43.314067 kubelet[2886]: I1002 18:48:43.314031 2886 server.go:660] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Oct 2 18:48:43.314604 kubelet[2886]: I1002 18:48:43.314577 2886 container_manager_linux.go:262] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Oct 2 18:48:43.314909 kubelet[2886]: I1002 18:48:43.314883 2886 container_manager_linux.go:267] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:} {Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:} {Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] ExperimentalCPUManagerPolicy:none ExperimentalCPUManagerPolicyOptions:map[] ExperimentalTopologyManagerScope:container ExperimentalCPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] ExperimentalPodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms ExperimentalTopologyManagerPolicy:none} Oct 2 18:48:43.315171 kubelet[2886]: I1002 18:48:43.315145 2886 topology_manager.go:134] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Oct 2 18:48:43.315297 kubelet[2886]: I1002 18:48:43.315274 2886 container_manager_linux.go:302] "Creating device plugin manager" devicePluginEnabled=true Oct 2 18:48:43.315502 kubelet[2886]: I1002 18:48:43.315481 2886 state_mem.go:36] "Initialized new in-memory state store" Oct 2 18:48:43.323297 kubelet[2886]: I1002 18:48:43.323260 2886 kubelet.go:381] "Attempting to sync node with API server" Oct 2 18:48:43.323551 kubelet[2886]: I1002 18:48:43.323529 2886 kubelet.go:270] "Adding static pod path" path="/etc/kubernetes/manifests" Oct 2 18:48:43.323727 kubelet[2886]: I1002 18:48:43.323705 2886 kubelet.go:281] "Adding apiserver pod source" Oct 2 18:48:43.323877 kubelet[2886]: I1002 18:48:43.323856 2886 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Oct 2 18:48:43.326109 kubelet[2886]: I1002 18:48:43.326063 2886 kuberuntime_manager.go:240] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Oct 2 18:48:43.332154 kubelet[2886]: I1002 18:48:43.332107 2886 server.go:1175] "Started kubelet" Oct 2 18:48:43.352718 kubelet[2886]: E1002 18:48:43.352651 2886 cri_stats_provider.go:452] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Oct 2 18:48:43.352953 kubelet[2886]: E1002 18:48:43.352930 2886 kubelet.go:1317] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Oct 2 18:48:43.356000 audit[2886]: AVC avc: denied { mac_admin } for pid=2886 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:43.356000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 18:48:43.356000 audit[2886]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=400075dcb0 a1=4000732ac8 a2=400075dc80 a3=25 items=0 ppid=1 pid=2886 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:48:43.356000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 18:48:43.363910 kubelet[2886]: I1002 18:48:43.362976 2886 server.go:155] "Starting to listen" address="0.0.0.0" port=10250 Oct 2 18:48:43.367468 kubelet[2886]: I1002 18:48:43.364150 2886 server.go:438] "Adding debug handlers to kubelet server" Oct 2 18:48:43.368138 kubelet[2886]: I1002 18:48:43.368046 2886 kubelet.go:1274] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Oct 2 18:48:43.366000 audit[2886]: AVC avc: denied { mac_admin } for pid=2886 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:43.366000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 18:48:43.366000 audit[2886]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000aff7c0 a1=4000c466d8 a2=4000af2c90 a3=25 items=0 ppid=1 pid=2886 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:48:43.366000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 18:48:43.368896 kubelet[2886]: I1002 18:48:43.368868 2886 kubelet.go:1278] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Oct 2 18:48:43.369168 kubelet[2886]: I1002 18:48:43.369146 2886 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Oct 2 18:48:43.382411 kubelet[2886]: I1002 18:48:43.382356 2886 volume_manager.go:293] "Starting Kubelet Volume Manager" Oct 2 18:48:43.389137 kubelet[2886]: I1002 18:48:43.389088 2886 desired_state_of_world_populator.go:149] "Desired state populator starts to run" Oct 2 18:48:43.432187 kubelet[2886]: E1002 18:48:43.432147 2886 kubelet.go:2373] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 18:48:43.482750 kubelet[2886]: E1002 18:48:43.482712 2886 kubelet.go:2448] "Error getting node" err="node \"ip-172-31-16-118\" not found" Oct 2 18:48:43.517059 kubelet[2886]: I1002 18:48:43.516942 2886 kubelet_node_status.go:70] "Attempting to register node" node="ip-172-31-16-118" Oct 2 18:48:43.550948 kubelet[2886]: I1002 18:48:43.550902 2886 kubelet_node_status.go:108] "Node was previously registered" node="ip-172-31-16-118" Oct 2 18:48:43.551092 kubelet[2886]: I1002 18:48:43.551027 2886 kubelet_node_status.go:73] "Successfully registered node" node="ip-172-31-16-118" Oct 2 18:48:43.683122 kubelet[2886]: I1002 18:48:43.683066 2886 cpu_manager.go:213] "Starting CPU manager" policy="none" Oct 2 18:48:43.683122 kubelet[2886]: I1002 18:48:43.683107 2886 cpu_manager.go:214] "Reconciling" reconcilePeriod="10s" Oct 2 18:48:43.683346 kubelet[2886]: I1002 18:48:43.683142 2886 state_mem.go:36] "Initialized new in-memory state store" Oct 2 18:48:43.683410 kubelet[2886]: I1002 18:48:43.683380 2886 state_mem.go:88] "Updated default CPUSet" cpuSet="" Oct 2 18:48:43.683410 kubelet[2886]: I1002 18:48:43.683405 2886 state_mem.go:96] "Updated CPUSet assignments" assignments=map[] Oct 2 18:48:43.683515 kubelet[2886]: I1002 18:48:43.683421 2886 policy_none.go:49] "None policy: Start" Oct 2 18:48:43.685186 kubelet[2886]: I1002 18:48:43.685134 2886 memory_manager.go:168] "Starting memorymanager" policy="None" Oct 2 18:48:43.685186 kubelet[2886]: I1002 18:48:43.685188 2886 state_mem.go:35] "Initializing new in-memory state store" Oct 2 18:48:43.685471 kubelet[2886]: I1002 18:48:43.685431 2886 state_mem.go:75] "Updated machine memory state" Oct 2 18:48:43.691000 audit[2886]: AVC avc: denied { mac_admin } for pid=2886 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:43.691000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 2 18:48:43.691000 audit[2886]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=40011bd6e0 a1=400129f038 a2=40011bd6b0 a3=25 items=0 ppid=1 pid=2886 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:48:43.691000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 2 18:48:43.697050 kubelet[2886]: I1002 18:48:43.693137 2886 manager.go:447] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Oct 2 18:48:43.697050 kubelet[2886]: I1002 18:48:43.693302 2886 server.go:86] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Oct 2 18:48:43.697050 kubelet[2886]: I1002 18:48:43.693673 2886 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Oct 2 18:48:43.728617 kubelet[2886]: I1002 18:48:43.727409 2886 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Oct 2 18:48:43.800106 kubelet[2886]: I1002 18:48:43.799971 2886 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Oct 2 18:48:43.803171 kubelet[2886]: I1002 18:48:43.800083 2886 status_manager.go:161] "Starting to sync pod status with apiserver" Oct 2 18:48:43.803316 kubelet[2886]: I1002 18:48:43.803193 2886 kubelet.go:2010] "Starting kubelet main sync loop" Oct 2 18:48:43.803316 kubelet[2886]: E1002 18:48:43.803282 2886 kubelet.go:2034] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Oct 2 18:48:43.904082 kubelet[2886]: I1002 18:48:43.904000 2886 topology_manager.go:205] "Topology Admit Handler" Oct 2 18:48:43.904241 kubelet[2886]: I1002 18:48:43.904129 2886 topology_manager.go:205] "Topology Admit Handler" Oct 2 18:48:43.904241 kubelet[2886]: I1002 18:48:43.904238 2886 topology_manager.go:205] "Topology Admit Handler" Oct 2 18:48:43.921606 kubelet[2886]: E1002 18:48:43.921536 2886 kubelet.go:1712] "Failed creating a mirror pod for" err="pods \"kube-scheduler-ip-172-31-16-118\" already exists" pod="kube-system/kube-scheduler-ip-172-31-16-118" Oct 2 18:48:43.999855 kubelet[2886]: I1002 18:48:43.999813 2886 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/f7dc5d6959e20a0327bdb5f50fe76db4-k8s-certs\") pod \"kube-controller-manager-ip-172-31-16-118\" (UID: \"f7dc5d6959e20a0327bdb5f50fe76db4\") " pod="kube-system/kube-controller-manager-ip-172-31-16-118" Oct 2 18:48:44.000245 kubelet[2886]: I1002 18:48:44.000200 2886 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/f7dc5d6959e20a0327bdb5f50fe76db4-kubeconfig\") pod \"kube-controller-manager-ip-172-31-16-118\" (UID: \"f7dc5d6959e20a0327bdb5f50fe76db4\") " pod="kube-system/kube-controller-manager-ip-172-31-16-118" Oct 2 18:48:44.000490 kubelet[2886]: I1002 18:48:44.000447 2886 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/f7dc5d6959e20a0327bdb5f50fe76db4-ca-certs\") pod \"kube-controller-manager-ip-172-31-16-118\" (UID: \"f7dc5d6959e20a0327bdb5f50fe76db4\") " pod="kube-system/kube-controller-manager-ip-172-31-16-118" Oct 2 18:48:44.000701 kubelet[2886]: I1002 18:48:44.000661 2886 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/f7dc5d6959e20a0327bdb5f50fe76db4-flexvolume-dir\") pod \"kube-controller-manager-ip-172-31-16-118\" (UID: \"f7dc5d6959e20a0327bdb5f50fe76db4\") " pod="kube-system/kube-controller-manager-ip-172-31-16-118" Oct 2 18:48:44.000890 kubelet[2886]: I1002 18:48:44.000858 2886 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/bec47679ad907554330cc5a46b33c849-ca-certs\") pod \"kube-apiserver-ip-172-31-16-118\" (UID: \"bec47679ad907554330cc5a46b33c849\") " pod="kube-system/kube-apiserver-ip-172-31-16-118" Oct 2 18:48:44.001074 kubelet[2886]: I1002 18:48:44.001033 2886 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/bec47679ad907554330cc5a46b33c849-k8s-certs\") pod \"kube-apiserver-ip-172-31-16-118\" (UID: \"bec47679ad907554330cc5a46b33c849\") " pod="kube-system/kube-apiserver-ip-172-31-16-118" Oct 2 18:48:44.001291 kubelet[2886]: I1002 18:48:44.001268 2886 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/bec47679ad907554330cc5a46b33c849-usr-share-ca-certificates\") pod \"kube-apiserver-ip-172-31-16-118\" (UID: \"bec47679ad907554330cc5a46b33c849\") " pod="kube-system/kube-apiserver-ip-172-31-16-118" Oct 2 18:48:44.001511 kubelet[2886]: I1002 18:48:44.001472 2886 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/f7dc5d6959e20a0327bdb5f50fe76db4-usr-share-ca-certificates\") pod \"kube-controller-manager-ip-172-31-16-118\" (UID: \"f7dc5d6959e20a0327bdb5f50fe76db4\") " pod="kube-system/kube-controller-manager-ip-172-31-16-118" Oct 2 18:48:44.001725 kubelet[2886]: I1002 18:48:44.001677 2886 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/d6525af7e2adaf11d0b2a5918d5c9e10-kubeconfig\") pod \"kube-scheduler-ip-172-31-16-118\" (UID: \"d6525af7e2adaf11d0b2a5918d5c9e10\") " pod="kube-system/kube-scheduler-ip-172-31-16-118" Oct 2 18:48:44.349686 kubelet[2886]: I1002 18:48:44.349618 2886 apiserver.go:52] "Watching apiserver" Oct 2 18:48:44.404837 kubelet[2886]: I1002 18:48:44.404790 2886 reconciler.go:169] "Reconciler: start to sync state" Oct 2 18:48:44.503000 audit[2568]: AVC avc: denied { watch } for pid=2568 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=6812 scontext=system_u:system_r:svirt_lxc_net_t:s0:c112,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 18:48:44.503000 audit[2568]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=f a1=4000ca3bc0 a2=fc6 a3=0 items=0 ppid=2409 pid=2568 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c112,c621 key=(null) Oct 2 18:48:44.503000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 18:48:44.509000 audit[2568]: AVC avc: denied { watch } for pid=2568 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=6812 scontext=system_u:system_r:svirt_lxc_net_t:s0:c112,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 18:48:44.509000 audit[2568]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=4000c2e1c0 a2=fc6 a3=0 items=0 ppid=2409 pid=2568 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c112,c621 key=(null) Oct 2 18:48:44.509000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 18:48:44.514000 audit[2568]: AVC avc: denied { watch } for pid=2568 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=6812 scontext=system_u:system_r:svirt_lxc_net_t:s0:c112,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 18:48:44.514000 audit[2568]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=f a1=4000c2e360 a2=fc6 a3=0 items=0 ppid=2409 pid=2568 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c112,c621 key=(null) Oct 2 18:48:44.514000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 18:48:44.517000 audit[2568]: AVC avc: denied { watch } for pid=2568 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=6812 scontext=system_u:system_r:svirt_lxc_net_t:s0:c112,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 18:48:44.517000 audit[2568]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=4000c7c120 a2=fc6 a3=0 items=0 ppid=2409 pid=2568 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c112,c621 key=(null) Oct 2 18:48:44.517000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 18:48:44.838572 kubelet[2886]: E1002 18:48:44.838516 2886 kubelet.go:1712] "Failed creating a mirror pod for" err="pods \"kube-apiserver-ip-172-31-16-118\" already exists" pod="kube-system/kube-apiserver-ip-172-31-16-118" Oct 2 18:48:44.844865 kubelet[2886]: E1002 18:48:44.844830 2886 kubelet.go:1712] "Failed creating a mirror pod for" err="pods \"kube-controller-manager-ip-172-31-16-118\" already exists" pod="kube-system/kube-controller-manager-ip-172-31-16-118" Oct 2 18:48:44.932651 kubelet[2886]: E1002 18:48:44.932616 2886 kubelet.go:1712] "Failed creating a mirror pod for" err="pods \"kube-scheduler-ip-172-31-16-118\" already exists" pod="kube-system/kube-scheduler-ip-172-31-16-118" Oct 2 18:48:48.695219 kubelet[2886]: E1002 18:48:48.695164 2886 kubelet.go:2373] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 18:48:49.995000 audit[1911]: USER_END pid=1911 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 18:48:49.997299 sudo[1911]: pam_unix(sudo:session): session closed for user root Oct 2 18:48:49.999470 kernel: kauditd_printk_skb: 265 callbacks suppressed Oct 2 18:48:49.999526 kernel: audit: type=1106 audit(1696272529.995:990): pid=1911 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 18:48:49.996000 audit[1911]: CRED_DISP pid=1911 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 18:48:50.018476 kernel: audit: type=1104 audit(1696272529.996:991): pid=1911 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 2 18:48:50.031941 sshd[1908]: pam_unix(sshd:session): session closed for user core Oct 2 18:48:50.034000 audit[1908]: USER_END pid=1908 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:48:50.039701 systemd[1]: session-7.scope: Deactivated successfully. Oct 2 18:48:50.040040 systemd[1]: session-7.scope: Consumed 9.789s CPU time. Oct 2 18:48:50.041413 systemd[1]: sshd@6-172.31.16.118:22-139.178.89.65:45750.service: Deactivated successfully. Oct 2 18:48:50.035000 audit[1908]: CRED_DISP pid=1908 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:48:50.049522 systemd-logind[1641]: Session 7 logged out. Waiting for processes to exit. Oct 2 18:48:50.058814 kernel: audit: type=1106 audit(1696272530.034:992): pid=1908 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:48:50.058973 kernel: audit: type=1104 audit(1696272530.035:993): pid=1908 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:48:50.040000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.16.118:22-139.178.89.65:45750 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:48:50.060084 systemd-logind[1641]: Removed session 7. Oct 2 18:48:50.068982 kernel: audit: type=1131 audit(1696272530.040:994): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.16.118:22-139.178.89.65:45750 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:48:53.696416 kubelet[2886]: E1002 18:48:53.696358 2886 kubelet.go:2373] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 18:48:55.564462 kubelet[2886]: I1002 18:48:55.564412 2886 kuberuntime_manager.go:1050] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Oct 2 18:48:55.565802 env[1656]: time="2023-10-02T18:48:55.565732440Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Oct 2 18:48:55.566760 kubelet[2886]: I1002 18:48:55.566721 2886 kubelet_network.go:60] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Oct 2 18:48:55.567638 kubelet[2886]: E1002 18:48:55.567603 2886 kubelet.go:2373] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 18:48:55.660482 kubelet[2886]: I1002 18:48:55.660435 2886 topology_manager.go:205] "Topology Admit Handler" Oct 2 18:48:55.673422 systemd[1]: Created slice kubepods-besteffort-podc684feca_8dd3_4cf7_8a25_77796a363cf7.slice. Oct 2 18:48:55.690128 kubelet[2886]: I1002 18:48:55.690085 2886 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/c684feca-8dd3-4cf7-8a25-77796a363cf7-xtables-lock\") pod \"kube-proxy-d68sc\" (UID: \"c684feca-8dd3-4cf7-8a25-77796a363cf7\") " pod="kube-system/kube-proxy-d68sc" Oct 2 18:48:55.690460 kubelet[2886]: I1002 18:48:55.690390 2886 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/c684feca-8dd3-4cf7-8a25-77796a363cf7-lib-modules\") pod \"kube-proxy-d68sc\" (UID: \"c684feca-8dd3-4cf7-8a25-77796a363cf7\") " pod="kube-system/kube-proxy-d68sc" Oct 2 18:48:55.690621 kubelet[2886]: I1002 18:48:55.690492 2886 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-s2gtf\" (UniqueName: \"kubernetes.io/projected/c684feca-8dd3-4cf7-8a25-77796a363cf7-kube-api-access-s2gtf\") pod \"kube-proxy-d68sc\" (UID: \"c684feca-8dd3-4cf7-8a25-77796a363cf7\") " pod="kube-system/kube-proxy-d68sc" Oct 2 18:48:55.690621 kubelet[2886]: I1002 18:48:55.690599 2886 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/c684feca-8dd3-4cf7-8a25-77796a363cf7-kube-proxy\") pod \"kube-proxy-d68sc\" (UID: \"c684feca-8dd3-4cf7-8a25-77796a363cf7\") " pod="kube-system/kube-proxy-d68sc" Oct 2 18:48:55.773700 kubelet[2886]: I1002 18:48:55.773650 2886 topology_manager.go:205] "Topology Admit Handler" Oct 2 18:48:55.787236 systemd[1]: Created slice kubepods-besteffort-pod4cdaa0f5_892f_4214_91d7_6f100079b650.slice. Oct 2 18:48:55.789039 kubelet[2886]: W1002 18:48:55.788981 2886 reflector.go:424] object-"tigera-operator"/"kube-root-ca.crt": failed to list *v1.ConfigMap: configmaps "kube-root-ca.crt" is forbidden: User "system:node:ip-172-31-16-118" cannot list resource "configmaps" in API group "" in the namespace "tigera-operator": no relationship found between node 'ip-172-31-16-118' and this object Oct 2 18:48:55.789438 kubelet[2886]: E1002 18:48:55.789389 2886 reflector.go:140] object-"tigera-operator"/"kube-root-ca.crt": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps "kube-root-ca.crt" is forbidden: User "system:node:ip-172-31-16-118" cannot list resource "configmaps" in API group "" in the namespace "tigera-operator": no relationship found between node 'ip-172-31-16-118' and this object Oct 2 18:48:55.789438 kubelet[2886]: W1002 18:48:55.789326 2886 reflector.go:424] object-"tigera-operator"/"kubernetes-services-endpoint": failed to list *v1.ConfigMap: configmaps "kubernetes-services-endpoint" is forbidden: User "system:node:ip-172-31-16-118" cannot list resource "configmaps" in API group "" in the namespace "tigera-operator": no relationship found between node 'ip-172-31-16-118' and this object Oct 2 18:48:55.789672 kubelet[2886]: E1002 18:48:55.789472 2886 reflector.go:140] object-"tigera-operator"/"kubernetes-services-endpoint": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps "kubernetes-services-endpoint" is forbidden: User "system:node:ip-172-31-16-118" cannot list resource "configmaps" in API group "" in the namespace "tigera-operator": no relationship found between node 'ip-172-31-16-118' and this object Oct 2 18:48:55.792404 kubelet[2886]: I1002 18:48:55.792190 2886 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-tzlr8\" (UniqueName: \"kubernetes.io/projected/4cdaa0f5-892f-4214-91d7-6f100079b650-kube-api-access-tzlr8\") pod \"tigera-operator-64db64cb98-jthmf\" (UID: \"4cdaa0f5-892f-4214-91d7-6f100079b650\") " pod="tigera-operator/tigera-operator-64db64cb98-jthmf" Oct 2 18:48:55.792404 kubelet[2886]: I1002 18:48:55.792298 2886 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/4cdaa0f5-892f-4214-91d7-6f100079b650-var-lib-calico\") pod \"tigera-operator-64db64cb98-jthmf\" (UID: \"4cdaa0f5-892f-4214-91d7-6f100079b650\") " pod="tigera-operator/tigera-operator-64db64cb98-jthmf" Oct 2 18:48:55.983488 env[1656]: time="2023-10-02T18:48:55.983342488Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-d68sc,Uid:c684feca-8dd3-4cf7-8a25-77796a363cf7,Namespace:kube-system,Attempt:0,}" Oct 2 18:48:56.030760 env[1656]: time="2023-10-02T18:48:56.030622291Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 18:48:56.030760 env[1656]: time="2023-10-02T18:48:56.030702247Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 18:48:56.031099 env[1656]: time="2023-10-02T18:48:56.031023570Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 18:48:56.031707 env[1656]: time="2023-10-02T18:48:56.031618827Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/03bfa6c6352dc477a7540259c39b57496245b47804d26c90ef70b2709d1d345a pid=2995 runtime=io.containerd.runc.v2 Oct 2 18:48:56.076617 systemd[1]: Started cri-containerd-03bfa6c6352dc477a7540259c39b57496245b47804d26c90ef70b2709d1d345a.scope. Oct 2 18:48:56.109000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:56.109000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:56.125987 kernel: audit: type=1400 audit(1696272536.109:995): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:56.126158 kernel: audit: type=1400 audit(1696272536.109:996): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:56.126214 kernel: audit: type=1400 audit(1696272536.109:997): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:56.109000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:56.109000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:56.141688 kernel: audit: type=1400 audit(1696272536.109:998): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:56.141833 kernel: audit: type=1400 audit(1696272536.109:999): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:56.109000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:56.149205 kernel: audit: type=1400 audit(1696272536.109:1000): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:56.109000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:56.109000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:56.165374 kernel: audit: type=1400 audit(1696272536.109:1001): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:56.165530 kernel: audit: type=1400 audit(1696272536.109:1002): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:56.109000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:56.173096 kernel: audit: type=1400 audit(1696272536.109:1003): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:56.109000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:56.117000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:56.187717 kernel: audit: type=1400 audit(1696272536.117:1004): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:56.117000 audit: BPF prog-id=118 op=LOAD Oct 2 18:48:56.125000 audit[3004]: AVC avc: denied { bpf } for pid=3004 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:56.125000 audit[3004]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=2995 pid=3004 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:48:56.125000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033626661366336333532646334373761373534303235396333396235 Oct 2 18:48:56.125000 audit[3004]: AVC avc: denied { perfmon } for pid=3004 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:56.125000 audit[3004]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=2995 pid=3004 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:48:56.125000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033626661366336333532646334373761373534303235396333396235 Oct 2 18:48:56.125000 audit[3004]: AVC avc: denied { bpf } for pid=3004 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:56.125000 audit[3004]: AVC avc: denied { bpf } for pid=3004 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:56.125000 audit[3004]: AVC avc: denied { bpf } for pid=3004 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:56.125000 audit[3004]: AVC avc: denied { perfmon } for pid=3004 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:56.125000 audit[3004]: AVC avc: denied { perfmon } for pid=3004 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:56.125000 audit[3004]: AVC avc: denied { perfmon } for pid=3004 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:56.125000 audit[3004]: AVC avc: denied { perfmon } for pid=3004 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:56.125000 audit[3004]: AVC avc: denied { perfmon } for pid=3004 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:56.125000 audit[3004]: AVC avc: denied { bpf } for pid=3004 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:56.125000 audit[3004]: AVC avc: denied { bpf } for pid=3004 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:56.125000 audit: BPF prog-id=119 op=LOAD Oct 2 18:48:56.125000 audit[3004]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=2995 pid=3004 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:48:56.125000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033626661366336333532646334373761373534303235396333396235 Oct 2 18:48:56.132000 audit[3004]: AVC avc: denied { bpf } for pid=3004 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:56.132000 audit[3004]: AVC avc: denied { bpf } for pid=3004 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:56.132000 audit[3004]: AVC avc: denied { perfmon } for pid=3004 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:56.132000 audit[3004]: AVC avc: denied { perfmon } for pid=3004 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:56.132000 audit[3004]: AVC avc: denied { perfmon } for pid=3004 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:56.132000 audit[3004]: AVC avc: denied { perfmon } for pid=3004 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:56.132000 audit[3004]: AVC avc: denied { perfmon } for pid=3004 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:56.132000 audit[3004]: AVC avc: denied { bpf } for pid=3004 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:56.132000 audit[3004]: AVC avc: denied { bpf } for pid=3004 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:56.132000 audit: BPF prog-id=120 op=LOAD Oct 2 18:48:56.132000 audit[3004]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=2995 pid=3004 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:48:56.132000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033626661366336333532646334373761373534303235396333396235 Oct 2 18:48:56.140000 audit: BPF prog-id=120 op=UNLOAD Oct 2 18:48:56.140000 audit: BPF prog-id=119 op=UNLOAD Oct 2 18:48:56.140000 audit[3004]: AVC avc: denied { bpf } for pid=3004 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:56.140000 audit[3004]: AVC avc: denied { bpf } for pid=3004 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:56.140000 audit[3004]: AVC avc: denied { bpf } for pid=3004 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:56.140000 audit[3004]: AVC avc: denied { perfmon } for pid=3004 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:56.140000 audit[3004]: AVC avc: denied { perfmon } for pid=3004 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:56.140000 audit[3004]: AVC avc: denied { perfmon } for pid=3004 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:56.140000 audit[3004]: AVC avc: denied { perfmon } for pid=3004 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:56.140000 audit[3004]: AVC avc: denied { perfmon } for pid=3004 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:56.140000 audit[3004]: AVC avc: denied { bpf } for pid=3004 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:56.140000 audit[3004]: AVC avc: denied { bpf } for pid=3004 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:56.140000 audit: BPF prog-id=121 op=LOAD Oct 2 18:48:56.140000 audit[3004]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=2995 pid=3004 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:48:56.140000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033626661366336333532646334373761373534303235396333396235 Oct 2 18:48:56.217451 env[1656]: time="2023-10-02T18:48:56.217381301Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-d68sc,Uid:c684feca-8dd3-4cf7-8a25-77796a363cf7,Namespace:kube-system,Attempt:0,} returns sandbox id \"03bfa6c6352dc477a7540259c39b57496245b47804d26c90ef70b2709d1d345a\"" Oct 2 18:48:56.227336 env[1656]: time="2023-10-02T18:48:56.227275981Z" level=info msg="CreateContainer within sandbox \"03bfa6c6352dc477a7540259c39b57496245b47804d26c90ef70b2709d1d345a\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Oct 2 18:48:56.252686 env[1656]: time="2023-10-02T18:48:56.252517987Z" level=info msg="CreateContainer within sandbox \"03bfa6c6352dc477a7540259c39b57496245b47804d26c90ef70b2709d1d345a\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"93b1fe737d45057ebf8686fd3b924ff09bf1f56d0116bd470d974a498b93cf70\"" Oct 2 18:48:56.257997 env[1656]: time="2023-10-02T18:48:56.257934201Z" level=info msg="StartContainer for \"93b1fe737d45057ebf8686fd3b924ff09bf1f56d0116bd470d974a498b93cf70\"" Oct 2 18:48:56.309889 systemd[1]: Started cri-containerd-93b1fe737d45057ebf8686fd3b924ff09bf1f56d0116bd470d974a498b93cf70.scope. Oct 2 18:48:56.362000 audit[3037]: AVC avc: denied { perfmon } for pid=3037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:56.362000 audit[3037]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=2995 pid=3037 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:48:56.362000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933623166653733376434353035376562663836383666643362393234 Oct 2 18:48:56.362000 audit[3037]: AVC avc: denied { bpf } for pid=3037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:56.362000 audit[3037]: AVC avc: denied { bpf } for pid=3037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:56.362000 audit[3037]: AVC avc: denied { bpf } for pid=3037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:56.362000 audit[3037]: AVC avc: denied { perfmon } for pid=3037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:56.362000 audit[3037]: AVC avc: denied { perfmon } for pid=3037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:56.362000 audit[3037]: AVC avc: denied { perfmon } for pid=3037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:56.362000 audit[3037]: AVC avc: denied { perfmon } for pid=3037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:56.362000 audit[3037]: AVC avc: denied { perfmon } for pid=3037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:56.362000 audit[3037]: AVC avc: denied { bpf } for pid=3037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:56.362000 audit[3037]: AVC avc: denied { bpf } for pid=3037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:56.362000 audit: BPF prog-id=122 op=LOAD Oct 2 18:48:56.362000 audit[3037]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=2995 pid=3037 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:48:56.362000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933623166653733376434353035376562663836383666643362393234 Oct 2 18:48:56.362000 audit[3037]: AVC avc: denied { bpf } for pid=3037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:56.362000 audit[3037]: AVC avc: denied { bpf } for pid=3037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:56.362000 audit[3037]: AVC avc: denied { perfmon } for pid=3037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:56.362000 audit[3037]: AVC avc: denied { perfmon } for pid=3037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:56.362000 audit[3037]: AVC avc: denied { perfmon } for pid=3037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:56.362000 audit[3037]: AVC avc: denied { perfmon } for pid=3037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:56.362000 audit[3037]: AVC avc: denied { perfmon } for pid=3037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:56.362000 audit[3037]: AVC avc: denied { bpf } for pid=3037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:56.362000 audit[3037]: AVC avc: denied { bpf } for pid=3037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:56.362000 audit: BPF prog-id=123 op=LOAD Oct 2 18:48:56.362000 audit[3037]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=2995 pid=3037 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:48:56.362000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933623166653733376434353035376562663836383666643362393234 Oct 2 18:48:56.362000 audit: BPF prog-id=123 op=UNLOAD Oct 2 18:48:56.362000 audit: BPF prog-id=122 op=UNLOAD Oct 2 18:48:56.362000 audit[3037]: AVC avc: denied { bpf } for pid=3037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:56.362000 audit[3037]: AVC avc: denied { bpf } for pid=3037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:56.362000 audit[3037]: AVC avc: denied { bpf } for pid=3037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:56.362000 audit[3037]: AVC avc: denied { perfmon } for pid=3037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:56.362000 audit[3037]: AVC avc: denied { perfmon } for pid=3037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:56.362000 audit[3037]: AVC avc: denied { perfmon } for pid=3037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:56.362000 audit[3037]: AVC avc: denied { perfmon } for pid=3037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:56.362000 audit[3037]: AVC avc: denied { perfmon } for pid=3037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:56.362000 audit[3037]: AVC avc: denied { bpf } for pid=3037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:56.362000 audit[3037]: AVC avc: denied { bpf } for pid=3037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:56.362000 audit: BPF prog-id=124 op=LOAD Oct 2 18:48:56.362000 audit[3037]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=2995 pid=3037 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:48:56.362000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933623166653733376434353035376562663836383666643362393234 Oct 2 18:48:56.408648 env[1656]: time="2023-10-02T18:48:56.408507226Z" level=info msg="StartContainer for \"93b1fe737d45057ebf8686fd3b924ff09bf1f56d0116bd470d974a498b93cf70\" returns successfully" Oct 2 18:48:56.508671 kernel: IPVS: Registered protocols (TCP, UDP, SCTP, AH, ESP) Oct 2 18:48:56.508850 kernel: IPVS: Connection hash table configured (size=4096, memory=32Kbytes) Oct 2 18:48:56.508908 kernel: IPVS: ipvs loaded. Oct 2 18:48:56.528611 kernel: IPVS: [rr] scheduler registered. Oct 2 18:48:56.542612 kernel: IPVS: [wrr] scheduler registered. Oct 2 18:48:56.556612 kernel: IPVS: [sh] scheduler registered. Oct 2 18:48:56.664000 audit[3094]: NETFILTER_CFG table=mangle:59 family=2 entries=1 op=nft_register_chain pid=3094 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:48:56.664000 audit[3094]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffffbabf210 a2=0 a3=ffffba54d6c0 items=0 ppid=3046 pid=3094 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:48:56.664000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Oct 2 18:48:56.665000 audit[3095]: NETFILTER_CFG table=mangle:60 family=10 entries=1 op=nft_register_chain pid=3095 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 18:48:56.665000 audit[3095]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff29460e0 a2=0 a3=ffffa10cf6c0 items=0 ppid=3046 pid=3095 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:48:56.665000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Oct 2 18:48:56.670000 audit[3096]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=3096 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:48:56.670000 audit[3096]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff3bab7e0 a2=0 a3=ffff818326c0 items=0 ppid=3046 pid=3096 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:48:56.670000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Oct 2 18:48:56.675000 audit[3097]: NETFILTER_CFG table=filter:62 family=2 entries=1 op=nft_register_chain pid=3097 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:48:56.675000 audit[3097]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc1b558f0 a2=0 a3=ffffa82776c0 items=0 ppid=3046 pid=3097 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:48:56.675000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Oct 2 18:48:56.684000 audit[3098]: NETFILTER_CFG table=nat:63 family=10 entries=1 op=nft_register_chain pid=3098 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 18:48:56.684000 audit[3098]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffff10e8c0 a2=0 a3=ffff926236c0 items=0 ppid=3046 pid=3098 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:48:56.684000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Oct 2 18:48:56.689000 audit[3100]: NETFILTER_CFG table=filter:64 family=10 entries=1 op=nft_register_chain pid=3100 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 18:48:56.689000 audit[3100]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffffea181b0 a2=0 a3=ffffa7b796c0 items=0 ppid=3046 pid=3100 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:48:56.689000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Oct 2 18:48:56.773000 audit[3102]: NETFILTER_CFG table=filter:65 family=2 entries=1 op=nft_register_chain pid=3102 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:48:56.773000 audit[3102]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=fffffbbddd30 a2=0 a3=ffffa3af76c0 items=0 ppid=3046 pid=3102 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:48:56.773000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Oct 2 18:48:56.783000 audit[3104]: NETFILTER_CFG table=filter:66 family=2 entries=1 op=nft_register_rule pid=3104 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:48:56.783000 audit[3104]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=fffffe5fbd80 a2=0 a3=ffffada7a6c0 items=0 ppid=3046 pid=3104 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:48:56.783000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Oct 2 18:48:56.800000 audit[3107]: NETFILTER_CFG table=filter:67 family=2 entries=1 op=nft_register_rule pid=3107 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:48:56.800000 audit[3107]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=ffffe40d8400 a2=0 a3=ffffb2f406c0 items=0 ppid=3046 pid=3107 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:48:56.800000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Oct 2 18:48:56.805000 audit[3108]: NETFILTER_CFG table=filter:68 family=2 entries=1 op=nft_register_chain pid=3108 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:48:56.805000 audit[3108]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffeaca1440 a2=0 a3=ffffab0c86c0 items=0 ppid=3046 pid=3108 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:48:56.805000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Oct 2 18:48:56.815000 audit[3110]: NETFILTER_CFG table=filter:69 family=2 entries=1 op=nft_register_rule pid=3110 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:48:56.815000 audit[3110]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffc2567270 a2=0 a3=ffffaea336c0 items=0 ppid=3046 pid=3110 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:48:56.815000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Oct 2 18:48:56.819000 audit[3111]: NETFILTER_CFG table=filter:70 family=2 entries=1 op=nft_register_chain pid=3111 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:48:56.819000 audit[3111]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd4054450 a2=0 a3=ffffb7f236c0 items=0 ppid=3046 pid=3111 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:48:56.819000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Oct 2 18:48:56.830000 audit[3113]: NETFILTER_CFG table=filter:71 family=2 entries=1 op=nft_register_rule pid=3113 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:48:56.830000 audit[3113]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffc5a99730 a2=0 a3=ffffad75c6c0 items=0 ppid=3046 pid=3113 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:48:56.830000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Oct 2 18:48:56.857000 audit[3116]: NETFILTER_CFG table=filter:72 family=2 entries=1 op=nft_register_rule pid=3116 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:48:56.857000 audit[3116]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=fffff563deb0 a2=0 a3=ffffa95fa6c0 items=0 ppid=3046 pid=3116 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:48:56.857000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Oct 2 18:48:56.865000 audit[3117]: NETFILTER_CFG table=filter:73 family=2 entries=1 op=nft_register_chain pid=3117 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:48:56.865000 audit[3117]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffffabf8be0 a2=0 a3=ffff8870a6c0 items=0 ppid=3046 pid=3117 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:48:56.865000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Oct 2 18:48:56.882000 audit[3119]: NETFILTER_CFG table=filter:74 family=2 entries=1 op=nft_register_rule pid=3119 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:48:56.882000 audit[3119]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=fffff291f890 a2=0 a3=ffff80a126c0 items=0 ppid=3046 pid=3119 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:48:56.882000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Oct 2 18:48:56.886000 audit[3120]: NETFILTER_CFG table=filter:75 family=2 entries=1 op=nft_register_chain pid=3120 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:48:56.886000 audit[3120]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffdbb64030 a2=0 a3=ffff97de66c0 items=0 ppid=3046 pid=3120 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:48:56.886000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Oct 2 18:48:56.896000 audit[3122]: NETFILTER_CFG table=filter:76 family=2 entries=1 op=nft_register_rule pid=3122 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:48:56.896000 audit[3122]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffc4d26a50 a2=0 a3=ffff9bc346c0 items=0 ppid=3046 pid=3122 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:48:56.896000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Oct 2 18:48:56.910000 audit[3125]: NETFILTER_CFG table=filter:77 family=2 entries=1 op=nft_register_rule pid=3125 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:48:56.910000 audit[3125]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffe961d1c0 a2=0 a3=ffffadc4c6c0 items=0 ppid=3046 pid=3125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:48:56.910000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Oct 2 18:48:56.924000 audit[3128]: NETFILTER_CFG table=filter:78 family=2 entries=1 op=nft_register_rule pid=3128 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:48:56.924000 audit[3128]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffff9fd01a0 a2=0 a3=ffffae3366c0 items=0 ppid=3046 pid=3128 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:48:56.924000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Oct 2 18:48:56.928000 audit[3129]: NETFILTER_CFG table=nat:79 family=2 entries=1 op=nft_register_chain pid=3129 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:48:56.928000 audit[3129]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffc4081da0 a2=0 a3=ffffb742e6c0 items=0 ppid=3046 pid=3129 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:48:56.928000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Oct 2 18:48:56.941000 audit[3131]: NETFILTER_CFG table=nat:80 family=2 entries=1 op=nft_register_rule pid=3131 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:48:56.941000 audit[3131]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=524 a0=3 a1=ffffd97f3db0 a2=0 a3=ffff7fd686c0 items=0 ppid=3046 pid=3131 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:48:56.941000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 2 18:48:56.957000 audit[3134]: NETFILTER_CFG table=nat:81 family=2 entries=1 op=nft_register_rule pid=3134 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 2 18:48:56.957000 audit[3134]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=fffffb3cad30 a2=0 a3=ffffa21996c0 items=0 ppid=3046 pid=3134 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:48:56.957000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 2 18:48:56.986000 audit[3138]: NETFILTER_CFG table=filter:82 family=2 entries=6 op=nft_register_rule pid=3138 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 18:48:56.986000 audit[3138]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4028 a0=3 a1=ffffca04ec50 a2=0 a3=ffffa701a6c0 items=0 ppid=3046 pid=3138 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:48:56.986000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 18:48:56.996025 env[1656]: time="2023-10-02T18:48:56.995951450Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-64db64cb98-jthmf,Uid:4cdaa0f5-892f-4214-91d7-6f100079b650,Namespace:tigera-operator,Attempt:0,}" Oct 2 18:48:57.000000 audit[3138]: NETFILTER_CFG table=nat:83 family=2 entries=17 op=nft_register_chain pid=3138 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 18:48:57.000000 audit[3138]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5340 a0=3 a1=ffffca04ec50 a2=0 a3=ffffa701a6c0 items=0 ppid=3046 pid=3138 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:48:57.000000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 18:48:57.006000 audit[3141]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=3141 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 18:48:57.006000 audit[3141]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffcb87dcf0 a2=0 a3=ffffa23516c0 items=0 ppid=3046 pid=3141 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:48:57.006000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Oct 2 18:48:57.025000 audit[3143]: NETFILTER_CFG table=filter:85 family=10 entries=2 op=nft_register_chain pid=3143 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 18:48:57.025000 audit[3143]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=fffffc30d880 a2=0 a3=ffffa44b46c0 items=0 ppid=3046 pid=3143 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:48:57.025000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Oct 2 18:48:57.047000 audit[3158]: NETFILTER_CFG table=filter:86 family=10 entries=2 op=nft_register_chain pid=3158 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 18:48:57.047000 audit[3158]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffcbb672d0 a2=0 a3=ffff92bda6c0 items=0 ppid=3046 pid=3158 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:48:57.047000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Oct 2 18:48:57.054662 env[1656]: time="2023-10-02T18:48:57.054477350Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 18:48:57.054662 env[1656]: time="2023-10-02T18:48:57.054592561Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 18:48:57.054971 env[1656]: time="2023-10-02T18:48:57.054628969Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 18:48:57.054000 audit[3159]: NETFILTER_CFG table=filter:87 family=10 entries=1 op=nft_register_chain pid=3159 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 18:48:57.054000 audit[3159]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff76c23d0 a2=0 a3=ffffbe2d16c0 items=0 ppid=3046 pid=3159 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:48:57.054000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Oct 2 18:48:57.056447 env[1656]: time="2023-10-02T18:48:57.055270319Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/519c2751fbc46ea7f612ca735ce50e8a192a68579e6a24d1d42a3533bba7ff2b pid=3152 runtime=io.containerd.runc.v2 Oct 2 18:48:57.066000 audit[3167]: NETFILTER_CFG table=filter:88 family=10 entries=1 op=nft_register_rule pid=3167 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 18:48:57.066000 audit[3167]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffe2401a30 a2=0 a3=ffff8f0886c0 items=0 ppid=3046 pid=3167 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:48:57.066000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Oct 2 18:48:57.074000 audit[3168]: NETFILTER_CFG table=filter:89 family=10 entries=1 op=nft_register_chain pid=3168 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 18:48:57.074000 audit[3168]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe021e230 a2=0 a3=ffff87bbd6c0 items=0 ppid=3046 pid=3168 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:48:57.074000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Oct 2 18:48:57.088000 audit[3175]: NETFILTER_CFG table=filter:90 family=10 entries=1 op=nft_register_rule pid=3175 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 18:48:57.088000 audit[3175]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffe4227f70 a2=0 a3=ffffad68e6c0 items=0 ppid=3046 pid=3175 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:48:57.088000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Oct 2 18:48:57.104040 systemd[1]: Started cri-containerd-519c2751fbc46ea7f612ca735ce50e8a192a68579e6a24d1d42a3533bba7ff2b.scope. Oct 2 18:48:57.121706 systemd[1]: run-containerd-runc-k8s.io-519c2751fbc46ea7f612ca735ce50e8a192a68579e6a24d1d42a3533bba7ff2b-runc.qb9wEi.mount: Deactivated successfully. Oct 2 18:48:57.122000 audit[3181]: NETFILTER_CFG table=filter:91 family=10 entries=2 op=nft_register_chain pid=3181 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 18:48:57.122000 audit[3181]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=828 a0=3 a1=fffff0756b00 a2=0 a3=ffffa73a16c0 items=0 ppid=3046 pid=3181 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:48:57.122000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Oct 2 18:48:57.127000 audit[3182]: NETFILTER_CFG table=filter:92 family=10 entries=1 op=nft_register_chain pid=3182 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 18:48:57.127000 audit[3182]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffffc036190 a2=0 a3=ffff898ed6c0 items=0 ppid=3046 pid=3182 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:48:57.127000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Oct 2 18:48:57.140000 audit[3184]: NETFILTER_CFG table=filter:93 family=10 entries=1 op=nft_register_rule pid=3184 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 18:48:57.140000 audit[3184]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffddba1aa0 a2=0 a3=ffff98c9f6c0 items=0 ppid=3046 pid=3184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:48:57.140000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Oct 2 18:48:57.146000 audit[3185]: NETFILTER_CFG table=filter:94 family=10 entries=1 op=nft_register_chain pid=3185 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 18:48:57.146000 audit[3185]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe52cedb0 a2=0 a3=ffffa3d126c0 items=0 ppid=3046 pid=3185 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:48:57.146000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Oct 2 18:48:57.157000 audit[3189]: NETFILTER_CFG table=filter:95 family=10 entries=1 op=nft_register_rule pid=3189 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 18:48:57.157000 audit[3189]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffe8865570 a2=0 a3=ffff9ae776c0 items=0 ppid=3046 pid=3189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:48:57.157000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Oct 2 18:48:57.174000 audit[3197]: NETFILTER_CFG table=filter:96 family=10 entries=1 op=nft_register_rule pid=3197 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 18:48:57.174000 audit[3197]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffde8254c0 a2=0 a3=ffff88ff76c0 items=0 ppid=3046 pid=3197 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:48:57.174000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Oct 2 18:48:57.191000 audit[3200]: NETFILTER_CFG table=filter:97 family=10 entries=1 op=nft_register_rule pid=3200 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 18:48:57.191000 audit[3200]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffc6c5b9f0 a2=0 a3=ffff912676c0 items=0 ppid=3046 pid=3200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:48:57.191000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Oct 2 18:48:57.192000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:57.192000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:57.192000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:57.192000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:57.192000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:57.192000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:57.192000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:57.192000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:57.192000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:57.192000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:57.192000 audit: BPF prog-id=125 op=LOAD Oct 2 18:48:57.193000 audit[3166]: AVC avc: denied { bpf } for pid=3166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:57.193000 audit[3166]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3152 pid=3166 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:48:57.193000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531396332373531666263343665613766363132636137333563653530 Oct 2 18:48:57.193000 audit[3166]: AVC avc: denied { perfmon } for pid=3166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:57.193000 audit[3166]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3152 pid=3166 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:48:57.193000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531396332373531666263343665613766363132636137333563653530 Oct 2 18:48:57.194000 audit[3166]: AVC avc: denied { bpf } for pid=3166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:57.194000 audit[3166]: AVC avc: denied { bpf } for pid=3166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:57.194000 audit[3166]: AVC avc: denied { bpf } for pid=3166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:57.194000 audit[3166]: AVC avc: denied { perfmon } for pid=3166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:57.194000 audit[3166]: AVC avc: denied { perfmon } for pid=3166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:57.194000 audit[3166]: AVC avc: denied { perfmon } for pid=3166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:57.194000 audit[3166]: AVC avc: denied { perfmon } for pid=3166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:57.194000 audit[3166]: AVC avc: denied { perfmon } for pid=3166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:57.194000 audit[3166]: AVC avc: denied { bpf } for pid=3166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:57.194000 audit[3166]: AVC avc: denied { bpf } for pid=3166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:57.194000 audit: BPF prog-id=126 op=LOAD Oct 2 18:48:57.194000 audit[3166]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3152 pid=3166 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:48:57.194000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531396332373531666263343665613766363132636137333563653530 Oct 2 18:48:57.196000 audit[3166]: AVC avc: denied { bpf } for pid=3166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:57.196000 audit[3166]: AVC avc: denied { bpf } for pid=3166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:57.196000 audit[3166]: AVC avc: denied { perfmon } for pid=3166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:57.196000 audit[3166]: AVC avc: denied { perfmon } for pid=3166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:57.196000 audit[3166]: AVC avc: denied { perfmon } for pid=3166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:57.196000 audit[3166]: AVC avc: denied { perfmon } for pid=3166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:57.196000 audit[3166]: AVC avc: denied { perfmon } for pid=3166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:57.196000 audit[3166]: AVC avc: denied { bpf } for pid=3166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:57.196000 audit[3166]: AVC avc: denied { bpf } for pid=3166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:57.196000 audit: BPF prog-id=127 op=LOAD Oct 2 18:48:57.196000 audit[3166]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3152 pid=3166 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:48:57.196000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531396332373531666263343665613766363132636137333563653530 Oct 2 18:48:57.198000 audit: BPF prog-id=127 op=UNLOAD Oct 2 18:48:57.198000 audit: BPF prog-id=126 op=UNLOAD Oct 2 18:48:57.198000 audit[3166]: AVC avc: denied { bpf } for pid=3166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:57.198000 audit[3166]: AVC avc: denied { bpf } for pid=3166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:57.198000 audit[3166]: AVC avc: denied { bpf } for pid=3166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:57.198000 audit[3166]: AVC avc: denied { perfmon } for pid=3166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:57.198000 audit[3166]: AVC avc: denied { perfmon } for pid=3166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:57.198000 audit[3166]: AVC avc: denied { perfmon } for pid=3166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:57.198000 audit[3166]: AVC avc: denied { perfmon } for pid=3166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:57.198000 audit[3166]: AVC avc: denied { perfmon } for pid=3166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:57.198000 audit[3166]: AVC avc: denied { bpf } for pid=3166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:57.198000 audit[3166]: AVC avc: denied { bpf } for pid=3166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:57.198000 audit: BPF prog-id=128 op=LOAD Oct 2 18:48:57.198000 audit[3166]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3152 pid=3166 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:48:57.198000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531396332373531666263343665613766363132636137333563653530 Oct 2 18:48:57.203000 audit[3201]: NETFILTER_CFG table=nat:98 family=10 entries=1 op=nft_register_chain pid=3201 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 18:48:57.203000 audit[3201]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffe0025330 a2=0 a3=ffff92e7a6c0 items=0 ppid=3046 pid=3201 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:48:57.203000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Oct 2 18:48:57.219000 audit[3203]: NETFILTER_CFG table=nat:99 family=10 entries=2 op=nft_register_chain pid=3203 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 18:48:57.219000 audit[3203]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=fffff9dae470 a2=0 a3=ffffa77b26c0 items=0 ppid=3046 pid=3203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:48:57.219000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 2 18:48:57.244000 audit[3207]: NETFILTER_CFG table=nat:100 family=10 entries=2 op=nft_register_chain pid=3207 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 2 18:48:57.244000 audit[3207]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=fffff5b81c60 a2=0 a3=ffff91e4f6c0 items=0 ppid=3046 pid=3207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:48:57.244000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 2 18:48:57.261745 env[1656]: time="2023-10-02T18:48:57.261671957Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-64db64cb98-jthmf,Uid:4cdaa0f5-892f-4214-91d7-6f100079b650,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"519c2751fbc46ea7f612ca735ce50e8a192a68579e6a24d1d42a3533bba7ff2b\"" Oct 2 18:48:57.267071 env[1656]: time="2023-10-02T18:48:57.266938641Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.29.0\"" Oct 2 18:48:57.285000 audit[3216]: NETFILTER_CFG table=filter:101 family=10 entries=3 op=nft_register_rule pid=3216 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Oct 2 18:48:57.285000 audit[3216]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=1916 a0=3 a1=ffffc2c74130 a2=0 a3=ffffa590f6c0 items=0 ppid=3046 pid=3216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:48:57.285000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 18:48:57.286000 audit[3216]: NETFILTER_CFG table=nat:102 family=10 entries=10 op=nft_register_chain pid=3216 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Oct 2 18:48:57.286000 audit[3216]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=1860 a0=3 a1=ffffc2c74130 a2=0 a3=ffffa590f6c0 items=0 ppid=3046 pid=3216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:48:57.286000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 18:48:58.512464 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3598337085.mount: Deactivated successfully. Oct 2 18:48:58.697868 kubelet[2886]: E1002 18:48:58.697812 2886 kubelet.go:2373] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 18:48:59.618158 env[1656]: time="2023-10-02T18:48:59.618092691Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.29.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:48:59.621506 env[1656]: time="2023-10-02T18:48:59.621447952Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2bfa083ce51f1c757f20693cfea8ad121e2748f96a90fef52f087057eac59214,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:48:59.624711 env[1656]: time="2023-10-02T18:48:59.624654161Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.29.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:48:59.627971 env[1656]: time="2023-10-02T18:48:59.627890382Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:89eef35e1bbe8c88792ce69c3f3f38fb9838e58602c570524350b5f3ab127582,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:48:59.630050 env[1656]: time="2023-10-02T18:48:59.629971247Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.29.0\" returns image reference \"sha256:2bfa083ce51f1c757f20693cfea8ad121e2748f96a90fef52f087057eac59214\"" Oct 2 18:48:59.635998 env[1656]: time="2023-10-02T18:48:59.635917491Z" level=info msg="CreateContainer within sandbox \"519c2751fbc46ea7f612ca735ce50e8a192a68579e6a24d1d42a3533bba7ff2b\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Oct 2 18:48:59.661215 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4273172194.mount: Deactivated successfully. Oct 2 18:48:59.675983 env[1656]: time="2023-10-02T18:48:59.675914150Z" level=info msg="CreateContainer within sandbox \"519c2751fbc46ea7f612ca735ce50e8a192a68579e6a24d1d42a3533bba7ff2b\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"ffe7cd3f3eab87fb02277be36415fe334e35893a3542f108c36cebfda03cf57b\"" Oct 2 18:48:59.681287 env[1656]: time="2023-10-02T18:48:59.681210464Z" level=info msg="StartContainer for \"ffe7cd3f3eab87fb02277be36415fe334e35893a3542f108c36cebfda03cf57b\"" Oct 2 18:48:59.736181 systemd[1]: Started cri-containerd-ffe7cd3f3eab87fb02277be36415fe334e35893a3542f108c36cebfda03cf57b.scope. Oct 2 18:48:59.784000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:59.784000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:59.784000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:59.784000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:59.784000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:59.784000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:59.784000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:59.784000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:59.784000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:59.785000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:59.785000 audit: BPF prog-id=129 op=LOAD Oct 2 18:48:59.786000 audit[3225]: AVC avc: denied { bpf } for pid=3225 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:59.786000 audit[3225]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3152 pid=3225 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:48:59.786000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666653763643366336561623837666230323237376265333634313566 Oct 2 18:48:59.786000 audit[3225]: AVC avc: denied { perfmon } for pid=3225 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:59.786000 audit[3225]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3152 pid=3225 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:48:59.786000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666653763643366336561623837666230323237376265333634313566 Oct 2 18:48:59.786000 audit[3225]: AVC avc: denied { bpf } for pid=3225 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:59.786000 audit[3225]: AVC avc: denied { bpf } for pid=3225 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:59.786000 audit[3225]: AVC avc: denied { bpf } for pid=3225 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:59.786000 audit[3225]: AVC avc: denied { perfmon } for pid=3225 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:59.786000 audit[3225]: AVC avc: denied { perfmon } for pid=3225 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:59.786000 audit[3225]: AVC avc: denied { perfmon } for pid=3225 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:59.786000 audit[3225]: AVC avc: denied { perfmon } for pid=3225 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:59.786000 audit[3225]: AVC avc: denied { perfmon } for pid=3225 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:59.786000 audit[3225]: AVC avc: denied { bpf } for pid=3225 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:59.786000 audit[3225]: AVC avc: denied { bpf } for pid=3225 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:59.786000 audit: BPF prog-id=130 op=LOAD Oct 2 18:48:59.786000 audit[3225]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3152 pid=3225 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:48:59.786000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666653763643366336561623837666230323237376265333634313566 Oct 2 18:48:59.786000 audit[3225]: AVC avc: denied { bpf } for pid=3225 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:59.786000 audit[3225]: AVC avc: denied { bpf } for pid=3225 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:59.786000 audit[3225]: AVC avc: denied { perfmon } for pid=3225 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:59.786000 audit[3225]: AVC avc: denied { perfmon } for pid=3225 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:59.786000 audit[3225]: AVC avc: denied { perfmon } for pid=3225 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:59.786000 audit[3225]: AVC avc: denied { perfmon } for pid=3225 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:59.786000 audit[3225]: AVC avc: denied { perfmon } for pid=3225 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:59.786000 audit[3225]: AVC avc: denied { bpf } for pid=3225 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:59.786000 audit[3225]: AVC avc: denied { bpf } for pid=3225 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:59.786000 audit: BPF prog-id=131 op=LOAD Oct 2 18:48:59.786000 audit[3225]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3152 pid=3225 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:48:59.786000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666653763643366336561623837666230323237376265333634313566 Oct 2 18:48:59.786000 audit: BPF prog-id=131 op=UNLOAD Oct 2 18:48:59.786000 audit: BPF prog-id=130 op=UNLOAD Oct 2 18:48:59.786000 audit[3225]: AVC avc: denied { bpf } for pid=3225 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:59.786000 audit[3225]: AVC avc: denied { bpf } for pid=3225 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:59.786000 audit[3225]: AVC avc: denied { bpf } for pid=3225 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:59.786000 audit[3225]: AVC avc: denied { perfmon } for pid=3225 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:59.786000 audit[3225]: AVC avc: denied { perfmon } for pid=3225 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:59.786000 audit[3225]: AVC avc: denied { perfmon } for pid=3225 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:59.786000 audit[3225]: AVC avc: denied { perfmon } for pid=3225 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:59.786000 audit[3225]: AVC avc: denied { perfmon } for pid=3225 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:59.786000 audit[3225]: AVC avc: denied { bpf } for pid=3225 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:59.786000 audit[3225]: AVC avc: denied { bpf } for pid=3225 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:48:59.786000 audit: BPF prog-id=132 op=LOAD Oct 2 18:48:59.786000 audit[3225]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3152 pid=3225 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:48:59.786000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666653763643366336561623837666230323237376265333634313566 Oct 2 18:48:59.826927 env[1656]: time="2023-10-02T18:48:59.826851157Z" level=info msg="StartContainer for \"ffe7cd3f3eab87fb02277be36415fe334e35893a3542f108c36cebfda03cf57b\" returns successfully" Oct 2 18:49:03.560614 kernel: kauditd_printk_skb: 336 callbacks suppressed Oct 2 18:49:03.560810 kernel: audit: type=1325 audit(1696272543.556:1099): table=filter:103 family=2 entries=13 op=nft_register_rule pid=3281 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 18:49:03.556000 audit[3281]: NETFILTER_CFG table=filter:103 family=2 entries=13 op=nft_register_rule pid=3281 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 18:49:03.556000 audit[3281]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4732 a0=3 a1=ffffd1d4c090 a2=0 a3=ffff839f66c0 items=0 ppid=3046 pid=3281 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:03.577916 kernel: audit: type=1300 audit(1696272543.556:1099): arch=c00000b7 syscall=211 success=yes exit=4732 a0=3 a1=ffffd1d4c090 a2=0 a3=ffff839f66c0 items=0 ppid=3046 pid=3281 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:03.556000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 18:49:03.589464 kernel: audit: type=1327 audit(1696272543.556:1099): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 18:49:03.589661 kernel: audit: type=1325 audit(1696272543.556:1100): table=nat:104 family=2 entries=20 op=nft_register_rule pid=3281 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 18:49:03.556000 audit[3281]: NETFILTER_CFG table=nat:104 family=2 entries=20 op=nft_register_rule pid=3281 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 18:49:03.556000 audit[3281]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5340 a0=3 a1=ffffd1d4c090 a2=0 a3=ffff839f66c0 items=0 ppid=3046 pid=3281 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:03.610783 kernel: audit: type=1300 audit(1696272543.556:1100): arch=c00000b7 syscall=211 success=yes exit=5340 a0=3 a1=ffffd1d4c090 a2=0 a3=ffff839f66c0 items=0 ppid=3046 pid=3281 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:03.556000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 18:49:03.619795 kernel: audit: type=1327 audit(1696272543.556:1100): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 18:49:03.699869 kubelet[2886]: E1002 18:49:03.699821 2886 kubelet.go:2373] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 18:49:03.732609 kubelet[2886]: I1002 18:49:03.732514 2886 topology_manager.go:205] "Topology Admit Handler" Oct 2 18:49:03.743425 systemd[1]: Created slice kubepods-besteffort-podd5f2795c_04c0_4467_a2a1_46997504d9b1.slice. Oct 2 18:49:03.751570 kubelet[2886]: I1002 18:49:03.751495 2886 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-6wmn8\" (UniqueName: \"kubernetes.io/projected/d5f2795c-04c0-4467-a2a1-46997504d9b1-kube-api-access-6wmn8\") pod \"calico-typha-7d6cdfdff4-58c7h\" (UID: \"d5f2795c-04c0-4467-a2a1-46997504d9b1\") " pod="calico-system/calico-typha-7d6cdfdff4-58c7h" Oct 2 18:49:03.751922 kubelet[2886]: I1002 18:49:03.751896 2886 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/d5f2795c-04c0-4467-a2a1-46997504d9b1-typha-certs\") pod \"calico-typha-7d6cdfdff4-58c7h\" (UID: \"d5f2795c-04c0-4467-a2a1-46997504d9b1\") " pod="calico-system/calico-typha-7d6cdfdff4-58c7h" Oct 2 18:49:03.752149 kubelet[2886]: I1002 18:49:03.752124 2886 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/d5f2795c-04c0-4467-a2a1-46997504d9b1-tigera-ca-bundle\") pod \"calico-typha-7d6cdfdff4-58c7h\" (UID: \"d5f2795c-04c0-4467-a2a1-46997504d9b1\") " pod="calico-system/calico-typha-7d6cdfdff4-58c7h" Oct 2 18:49:03.762507 kubelet[2886]: W1002 18:49:03.762442 2886 reflector.go:424] object-"calico-system"/"kube-root-ca.crt": failed to list *v1.ConfigMap: configmaps "kube-root-ca.crt" is forbidden: User "system:node:ip-172-31-16-118" cannot list resource "configmaps" in API group "" in the namespace "calico-system": no relationship found between node 'ip-172-31-16-118' and this object Oct 2 18:49:03.762805 kubelet[2886]: E1002 18:49:03.762780 2886 reflector.go:140] object-"calico-system"/"kube-root-ca.crt": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps "kube-root-ca.crt" is forbidden: User "system:node:ip-172-31-16-118" cannot list resource "configmaps" in API group "" in the namespace "calico-system": no relationship found between node 'ip-172-31-16-118' and this object Oct 2 18:49:03.763192 kubelet[2886]: W1002 18:49:03.763143 2886 reflector.go:424] object-"calico-system"/"typha-certs": failed to list *v1.Secret: secrets "typha-certs" is forbidden: User "system:node:ip-172-31-16-118" cannot list resource "secrets" in API group "" in the namespace "calico-system": no relationship found between node 'ip-172-31-16-118' and this object Oct 2 18:49:03.763384 kubelet[2886]: E1002 18:49:03.763361 2886 reflector.go:140] object-"calico-system"/"typha-certs": Failed to watch *v1.Secret: failed to list *v1.Secret: secrets "typha-certs" is forbidden: User "system:node:ip-172-31-16-118" cannot list resource "secrets" in API group "" in the namespace "calico-system": no relationship found between node 'ip-172-31-16-118' and this object Oct 2 18:49:04.003889 kubelet[2886]: I1002 18:49:04.003737 2886 topology_manager.go:205] "Topology Admit Handler" Oct 2 18:49:04.015217 systemd[1]: Created slice kubepods-besteffort-pod56de52ec_f73a_4b72_b0c3_a7229865e4ff.slice. Oct 2 18:49:04.054944 kubelet[2886]: I1002 18:49:04.054893 2886 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/56de52ec-f73a-4b72-b0c3-a7229865e4ff-cni-net-dir\") pod \"calico-node-4jzn2\" (UID: \"56de52ec-f73a-4b72-b0c3-a7229865e4ff\") " pod="calico-system/calico-node-4jzn2" Oct 2 18:49:04.055356 kubelet[2886]: I1002 18:49:04.055321 2886 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/56de52ec-f73a-4b72-b0c3-a7229865e4ff-tigera-ca-bundle\") pod \"calico-node-4jzn2\" (UID: \"56de52ec-f73a-4b72-b0c3-a7229865e4ff\") " pod="calico-system/calico-node-4jzn2" Oct 2 18:49:04.055724 kubelet[2886]: I1002 18:49:04.055680 2886 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/56de52ec-f73a-4b72-b0c3-a7229865e4ff-flexvol-driver-host\") pod \"calico-node-4jzn2\" (UID: \"56de52ec-f73a-4b72-b0c3-a7229865e4ff\") " pod="calico-system/calico-node-4jzn2" Oct 2 18:49:04.056058 kubelet[2886]: I1002 18:49:04.056008 2886 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/56de52ec-f73a-4b72-b0c3-a7229865e4ff-policysync\") pod \"calico-node-4jzn2\" (UID: \"56de52ec-f73a-4b72-b0c3-a7229865e4ff\") " pod="calico-system/calico-node-4jzn2" Oct 2 18:49:04.056359 kubelet[2886]: I1002 18:49:04.056326 2886 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/56de52ec-f73a-4b72-b0c3-a7229865e4ff-node-certs\") pod \"calico-node-4jzn2\" (UID: \"56de52ec-f73a-4b72-b0c3-a7229865e4ff\") " pod="calico-system/calico-node-4jzn2" Oct 2 18:49:04.056646 kubelet[2886]: I1002 18:49:04.056611 2886 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/56de52ec-f73a-4b72-b0c3-a7229865e4ff-var-lib-calico\") pod \"calico-node-4jzn2\" (UID: \"56de52ec-f73a-4b72-b0c3-a7229865e4ff\") " pod="calico-system/calico-node-4jzn2" Oct 2 18:49:04.056910 kubelet[2886]: I1002 18:49:04.056883 2886 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/56de52ec-f73a-4b72-b0c3-a7229865e4ff-lib-modules\") pod \"calico-node-4jzn2\" (UID: \"56de52ec-f73a-4b72-b0c3-a7229865e4ff\") " pod="calico-system/calico-node-4jzn2" Oct 2 18:49:04.057149 kubelet[2886]: I1002 18:49:04.057123 2886 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/56de52ec-f73a-4b72-b0c3-a7229865e4ff-cni-bin-dir\") pod \"calico-node-4jzn2\" (UID: \"56de52ec-f73a-4b72-b0c3-a7229865e4ff\") " pod="calico-system/calico-node-4jzn2" Oct 2 18:49:04.057429 kubelet[2886]: I1002 18:49:04.057399 2886 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/56de52ec-f73a-4b72-b0c3-a7229865e4ff-xtables-lock\") pod \"calico-node-4jzn2\" (UID: \"56de52ec-f73a-4b72-b0c3-a7229865e4ff\") " pod="calico-system/calico-node-4jzn2" Oct 2 18:49:04.057796 kubelet[2886]: I1002 18:49:04.057760 2886 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/56de52ec-f73a-4b72-b0c3-a7229865e4ff-var-run-calico\") pod \"calico-node-4jzn2\" (UID: \"56de52ec-f73a-4b72-b0c3-a7229865e4ff\") " pod="calico-system/calico-node-4jzn2" Oct 2 18:49:04.058178 kubelet[2886]: I1002 18:49:04.058144 2886 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/56de52ec-f73a-4b72-b0c3-a7229865e4ff-cni-log-dir\") pod \"calico-node-4jzn2\" (UID: \"56de52ec-f73a-4b72-b0c3-a7229865e4ff\") " pod="calico-system/calico-node-4jzn2" Oct 2 18:49:04.058540 kubelet[2886]: I1002 18:49:04.058485 2886 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-mqr7t\" (UniqueName: \"kubernetes.io/projected/56de52ec-f73a-4b72-b0c3-a7229865e4ff-kube-api-access-mqr7t\") pod \"calico-node-4jzn2\" (UID: \"56de52ec-f73a-4b72-b0c3-a7229865e4ff\") " pod="calico-system/calico-node-4jzn2" Oct 2 18:49:04.163766 kubelet[2886]: E1002 18:49:04.163726 2886 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:49:04.164106 kubelet[2886]: W1002 18:49:04.164039 2886 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:49:04.164346 kubelet[2886]: E1002 18:49:04.164298 2886 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:49:04.239000 audit[3308]: NETFILTER_CFG table=filter:105 family=2 entries=14 op=nft_register_rule pid=3308 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 18:49:04.246598 kernel: audit: type=1325 audit(1696272544.239:1101): table=filter:105 family=2 entries=14 op=nft_register_rule pid=3308 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 18:49:04.239000 audit[3308]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4732 a0=3 a1=ffffdf674120 a2=0 a3=ffffb36906c0 items=0 ppid=3046 pid=3308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:04.263276 kubelet[2886]: E1002 18:49:04.263214 2886 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:49:04.263276 kubelet[2886]: W1002 18:49:04.263256 2886 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:49:04.263606 kubelet[2886]: E1002 18:49:04.263298 2886 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:49:04.263901 kubelet[2886]: E1002 18:49:04.263846 2886 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:49:04.263901 kubelet[2886]: W1002 18:49:04.263885 2886 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:49:04.264131 kubelet[2886]: E1002 18:49:04.263921 2886 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:49:04.264982 kubelet[2886]: E1002 18:49:04.264917 2886 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:49:04.264982 kubelet[2886]: W1002 18:49:04.264961 2886 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:49:04.265198 kubelet[2886]: E1002 18:49:04.265001 2886 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:49:04.265540 kubelet[2886]: E1002 18:49:04.265487 2886 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:49:04.265540 kubelet[2886]: W1002 18:49:04.265525 2886 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:49:04.239000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 18:49:04.265847 kubelet[2886]: E1002 18:49:04.265592 2886 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:49:04.271906 kernel: audit: type=1300 audit(1696272544.239:1101): arch=c00000b7 syscall=211 success=yes exit=4732 a0=3 a1=ffffdf674120 a2=0 a3=ffffb36906c0 items=0 ppid=3046 pid=3308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:04.272084 kernel: audit: type=1327 audit(1696272544.239:1101): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 18:49:04.247000 audit[3308]: NETFILTER_CFG table=nat:106 family=2 entries=20 op=nft_register_rule pid=3308 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 18:49:04.280736 kernel: audit: type=1325 audit(1696272544.247:1102): table=nat:106 family=2 entries=20 op=nft_register_rule pid=3308 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 18:49:04.247000 audit[3308]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5340 a0=3 a1=ffffdf674120 a2=0 a3=ffffb36906c0 items=0 ppid=3046 pid=3308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:04.247000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 18:49:04.363725 kubelet[2886]: E1002 18:49:04.363672 2886 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:49:04.363725 kubelet[2886]: W1002 18:49:04.363713 2886 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:49:04.363956 kubelet[2886]: E1002 18:49:04.363754 2886 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:49:04.367371 kubelet[2886]: E1002 18:49:04.367332 2886 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:49:04.367655 kubelet[2886]: W1002 18:49:04.367619 2886 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:49:04.367902 kubelet[2886]: E1002 18:49:04.367856 2886 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:49:04.368915 kubelet[2886]: E1002 18:49:04.368878 2886 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:49:04.369175 kubelet[2886]: W1002 18:49:04.369140 2886 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:49:04.369335 kubelet[2886]: E1002 18:49:04.369307 2886 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:49:04.369987 kubelet[2886]: E1002 18:49:04.369951 2886 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:49:04.370240 kubelet[2886]: W1002 18:49:04.370205 2886 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:49:04.370411 kubelet[2886]: E1002 18:49:04.370387 2886 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:49:04.471670 kubelet[2886]: E1002 18:49:04.471630 2886 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:49:04.471889 kubelet[2886]: W1002 18:49:04.471858 2886 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:49:04.472095 kubelet[2886]: E1002 18:49:04.472069 2886 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:49:04.472883 kubelet[2886]: E1002 18:49:04.472850 2886 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:49:04.473087 kubelet[2886]: W1002 18:49:04.473053 2886 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:49:04.473225 kubelet[2886]: E1002 18:49:04.473200 2886 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:49:04.473953 kubelet[2886]: E1002 18:49:04.473915 2886 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:49:04.474210 kubelet[2886]: W1002 18:49:04.474173 2886 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:49:04.474362 kubelet[2886]: E1002 18:49:04.474339 2886 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:49:04.575625 kubelet[2886]: E1002 18:49:04.575472 2886 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:49:04.575625 kubelet[2886]: W1002 18:49:04.575514 2886 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:49:04.575625 kubelet[2886]: E1002 18:49:04.575571 2886 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:49:04.577865 kubelet[2886]: E1002 18:49:04.577822 2886 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:49:04.577865 kubelet[2886]: W1002 18:49:04.577863 2886 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:49:04.578109 kubelet[2886]: E1002 18:49:04.577899 2886 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:49:04.578527 kubelet[2886]: E1002 18:49:04.578479 2886 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:49:04.578527 kubelet[2886]: W1002 18:49:04.578517 2886 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:49:04.578820 kubelet[2886]: E1002 18:49:04.578579 2886 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:49:04.679665 kubelet[2886]: E1002 18:49:04.679622 2886 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:49:04.679919 kubelet[2886]: W1002 18:49:04.679885 2886 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:49:04.680109 kubelet[2886]: E1002 18:49:04.680083 2886 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:49:04.680754 kubelet[2886]: E1002 18:49:04.680717 2886 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:49:04.680966 kubelet[2886]: W1002 18:49:04.680932 2886 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:49:04.681120 kubelet[2886]: E1002 18:49:04.681094 2886 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:49:04.681819 kubelet[2886]: E1002 18:49:04.681787 2886 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:49:04.682035 kubelet[2886]: W1002 18:49:04.682003 2886 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:49:04.682218 kubelet[2886]: E1002 18:49:04.682194 2886 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:49:04.783272 kubelet[2886]: E1002 18:49:04.783222 2886 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:49:04.783272 kubelet[2886]: W1002 18:49:04.783259 2886 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:49:04.784046 kubelet[2886]: E1002 18:49:04.783299 2886 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:49:04.784471 kubelet[2886]: E1002 18:49:04.784426 2886 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:49:04.784471 kubelet[2886]: W1002 18:49:04.784462 2886 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:49:04.784753 kubelet[2886]: E1002 18:49:04.784497 2886 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:49:04.785182 kubelet[2886]: E1002 18:49:04.785126 2886 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:49:04.785182 kubelet[2886]: W1002 18:49:04.785161 2886 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:49:04.785372 kubelet[2886]: E1002 18:49:04.785195 2886 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:49:04.855644 kubelet[2886]: E1002 18:49:04.855488 2886 secret.go:192] Couldn't get secret calico-system/typha-certs: failed to sync secret cache: timed out waiting for the condition Oct 2 18:49:04.855987 kubelet[2886]: E1002 18:49:04.855955 2886 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/d5f2795c-04c0-4467-a2a1-46997504d9b1-typha-certs podName:d5f2795c-04c0-4467-a2a1-46997504d9b1 nodeName:}" failed. No retries permitted until 2023-10-02 18:49:05.355916476 +0000 UTC m=+22.281713424 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "typha-certs" (UniqueName: "kubernetes.io/secret/d5f2795c-04c0-4467-a2a1-46997504d9b1-typha-certs") pod "calico-typha-7d6cdfdff4-58c7h" (UID: "d5f2795c-04c0-4467-a2a1-46997504d9b1") : failed to sync secret cache: timed out waiting for the condition Oct 2 18:49:04.886892 kubelet[2886]: E1002 18:49:04.886851 2886 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:49:04.886892 kubelet[2886]: W1002 18:49:04.886887 2886 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:49:04.887131 kubelet[2886]: E1002 18:49:04.886928 2886 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:49:04.888155 kubelet[2886]: E1002 18:49:04.888087 2886 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:49:04.888155 kubelet[2886]: W1002 18:49:04.888135 2886 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:49:04.888393 kubelet[2886]: E1002 18:49:04.888174 2886 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:49:04.888814 kubelet[2886]: E1002 18:49:04.888755 2886 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:49:04.888814 kubelet[2886]: W1002 18:49:04.888799 2886 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:49:04.889025 kubelet[2886]: E1002 18:49:04.888843 2886 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:49:04.892841 kubelet[2886]: E1002 18:49:04.892781 2886 projected.go:290] Couldn't get configMap calico-system/kube-root-ca.crt: failed to sync configmap cache: timed out waiting for the condition Oct 2 18:49:04.892841 kubelet[2886]: E1002 18:49:04.892839 2886 projected.go:196] Error preparing data for projected volume kube-api-access-6wmn8 for pod calico-system/calico-typha-7d6cdfdff4-58c7h: failed to sync configmap cache: timed out waiting for the condition Oct 2 18:49:04.893092 kubelet[2886]: E1002 18:49:04.892938 2886 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/projected/d5f2795c-04c0-4467-a2a1-46997504d9b1-kube-api-access-6wmn8 podName:d5f2795c-04c0-4467-a2a1-46997504d9b1 nodeName:}" failed. No retries permitted until 2023-10-02 18:49:05.39290983 +0000 UTC m=+22.318706766 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "kube-api-access-6wmn8" (UniqueName: "kubernetes.io/projected/d5f2795c-04c0-4467-a2a1-46997504d9b1-kube-api-access-6wmn8") pod "calico-typha-7d6cdfdff4-58c7h" (UID: "d5f2795c-04c0-4467-a2a1-46997504d9b1") : failed to sync configmap cache: timed out waiting for the condition Oct 2 18:49:04.990203 kubelet[2886]: E1002 18:49:04.990159 2886 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:49:04.990203 kubelet[2886]: W1002 18:49:04.990198 2886 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:49:04.990470 kubelet[2886]: E1002 18:49:04.990238 2886 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:49:04.990698 kubelet[2886]: E1002 18:49:04.990668 2886 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:49:04.990786 kubelet[2886]: W1002 18:49:04.990698 2886 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:49:04.990786 kubelet[2886]: E1002 18:49:04.990729 2886 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:49:04.991324 kubelet[2886]: E1002 18:49:04.991287 2886 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:49:04.991324 kubelet[2886]: W1002 18:49:04.991322 2886 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:49:04.991495 kubelet[2886]: E1002 18:49:04.991356 2886 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:49:05.092166 kubelet[2886]: E1002 18:49:05.092118 2886 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:49:05.092166 kubelet[2886]: W1002 18:49:05.092156 2886 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:49:05.092456 kubelet[2886]: E1002 18:49:05.092194 2886 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:49:05.092640 kubelet[2886]: E1002 18:49:05.092607 2886 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:49:05.092640 kubelet[2886]: W1002 18:49:05.092638 2886 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:49:05.092841 kubelet[2886]: E1002 18:49:05.092672 2886 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:49:05.093235 kubelet[2886]: E1002 18:49:05.093199 2886 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:49:05.093235 kubelet[2886]: W1002 18:49:05.093234 2886 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:49:05.093462 kubelet[2886]: E1002 18:49:05.093271 2886 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:49:05.194633 kubelet[2886]: E1002 18:49:05.194465 2886 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:49:05.194633 kubelet[2886]: W1002 18:49:05.194504 2886 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:49:05.194633 kubelet[2886]: E1002 18:49:05.194541 2886 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:49:05.196726 kubelet[2886]: E1002 18:49:05.196676 2886 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:49:05.196726 kubelet[2886]: W1002 18:49:05.196718 2886 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:49:05.196967 kubelet[2886]: E1002 18:49:05.196756 2886 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:49:05.197324 kubelet[2886]: E1002 18:49:05.197282 2886 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:49:05.197324 kubelet[2886]: W1002 18:49:05.197316 2886 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:49:05.197472 kubelet[2886]: E1002 18:49:05.197351 2886 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:49:05.298252 kubelet[2886]: E1002 18:49:05.298207 2886 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:49:05.298252 kubelet[2886]: W1002 18:49:05.298246 2886 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:49:05.298525 kubelet[2886]: E1002 18:49:05.298284 2886 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:49:05.299494 kubelet[2886]: E1002 18:49:05.299435 2886 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:49:05.299494 kubelet[2886]: W1002 18:49:05.299479 2886 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:49:05.299800 kubelet[2886]: E1002 18:49:05.299517 2886 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:49:05.300276 kubelet[2886]: E1002 18:49:05.300217 2886 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:49:05.300276 kubelet[2886]: W1002 18:49:05.300261 2886 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:49:05.300524 kubelet[2886]: E1002 18:49:05.300301 2886 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:49:05.396000 audit[3370]: NETFILTER_CFG table=filter:107 family=2 entries=14 op=nft_register_rule pid=3370 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 18:49:05.396000 audit[3370]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4732 a0=3 a1=ffffe763c7b0 a2=0 a3=ffff89e796c0 items=0 ppid=3046 pid=3370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:05.396000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 18:49:05.401506 kubelet[2886]: E1002 18:49:05.401470 2886 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:49:05.401784 kubelet[2886]: W1002 18:49:05.401751 2886 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:49:05.401928 kubelet[2886]: E1002 18:49:05.401905 2886 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:49:05.402490 kubelet[2886]: E1002 18:49:05.402464 2886 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:49:05.402684 kubelet[2886]: W1002 18:49:05.402656 2886 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:49:05.398000 audit[3370]: NETFILTER_CFG table=nat:108 family=2 entries=20 op=nft_register_rule pid=3370 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 18:49:05.398000 audit[3370]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5340 a0=3 a1=ffffe763c7b0 a2=0 a3=ffff89e796c0 items=0 ppid=3046 pid=3370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:05.398000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 18:49:05.403144 kubelet[2886]: E1002 18:49:05.402832 2886 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:49:05.403815 kubelet[2886]: E1002 18:49:05.403784 2886 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:49:05.403984 kubelet[2886]: W1002 18:49:05.403957 2886 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:49:05.404142 kubelet[2886]: E1002 18:49:05.404117 2886 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:49:05.404498 kubelet[2886]: E1002 18:49:05.404459 2886 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:49:05.404498 kubelet[2886]: W1002 18:49:05.404490 2886 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:49:05.404792 kubelet[2886]: E1002 18:49:05.404534 2886 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:49:05.405045 kubelet[2886]: E1002 18:49:05.405010 2886 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:49:05.405152 kubelet[2886]: W1002 18:49:05.405044 2886 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:49:05.405152 kubelet[2886]: E1002 18:49:05.405092 2886 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:49:05.405515 kubelet[2886]: E1002 18:49:05.405483 2886 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:49:05.405694 kubelet[2886]: W1002 18:49:05.405514 2886 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:49:05.405828 kubelet[2886]: E1002 18:49:05.405797 2886 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:49:05.405987 kubelet[2886]: E1002 18:49:05.405915 2886 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:49:05.406131 kubelet[2886]: W1002 18:49:05.406103 2886 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:49:05.406276 kubelet[2886]: E1002 18:49:05.406254 2886 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:49:05.406809 kubelet[2886]: E1002 18:49:05.406776 2886 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:49:05.406809 kubelet[2886]: W1002 18:49:05.406806 2886 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:49:05.407007 kubelet[2886]: E1002 18:49:05.406851 2886 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:49:05.407261 kubelet[2886]: E1002 18:49:05.407231 2886 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:49:05.407342 kubelet[2886]: W1002 18:49:05.407259 2886 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:49:05.407342 kubelet[2886]: E1002 18:49:05.407289 2886 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:49:05.407674 kubelet[2886]: E1002 18:49:05.407615 2886 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:49:05.407674 kubelet[2886]: W1002 18:49:05.407643 2886 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:49:05.407674 kubelet[2886]: E1002 18:49:05.407670 2886 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:49:05.408081 kubelet[2886]: E1002 18:49:05.408046 2886 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:49:05.408081 kubelet[2886]: W1002 18:49:05.408079 2886 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:49:05.408244 kubelet[2886]: E1002 18:49:05.408115 2886 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:49:05.424808 kubelet[2886]: E1002 18:49:05.424767 2886 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:49:05.424808 kubelet[2886]: W1002 18:49:05.424802 2886 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:49:05.425045 kubelet[2886]: E1002 18:49:05.424839 2886 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:49:05.505419 kubelet[2886]: E1002 18:49:05.505268 2886 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:49:05.506010 kubelet[2886]: W1002 18:49:05.505630 2886 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:49:05.506468 kubelet[2886]: E1002 18:49:05.506359 2886 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:49:05.507957 kubelet[2886]: E1002 18:49:05.507864 2886 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:49:05.508361 kubelet[2886]: W1002 18:49:05.508326 2886 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:49:05.508496 kubelet[2886]: E1002 18:49:05.508474 2886 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:49:05.555592 kubelet[2886]: E1002 18:49:05.555529 2886 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:49:05.555877 kubelet[2886]: W1002 18:49:05.555594 2886 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:49:05.555877 kubelet[2886]: E1002 18:49:05.555633 2886 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:49:05.572004 kubelet[2886]: E1002 18:49:05.571966 2886 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 2 18:49:05.572275 kubelet[2886]: W1002 18:49:05.572242 2886 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 2 18:49:05.572418 kubelet[2886]: E1002 18:49:05.572394 2886 plugins.go:751] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 2 18:49:05.822347 env[1656]: time="2023-10-02T18:49:05.822270698Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-4jzn2,Uid:56de52ec-f73a-4b72-b0c3-a7229865e4ff,Namespace:calico-system,Attempt:0,}" Oct 2 18:49:05.850349 env[1656]: time="2023-10-02T18:49:05.850284610Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-7d6cdfdff4-58c7h,Uid:d5f2795c-04c0-4467-a2a1-46997504d9b1,Namespace:calico-system,Attempt:0,}" Oct 2 18:49:05.881366 env[1656]: time="2023-10-02T18:49:05.881221128Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 18:49:05.881366 env[1656]: time="2023-10-02T18:49:05.881305236Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 18:49:05.881829 env[1656]: time="2023-10-02T18:49:05.881332968Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 18:49:05.882534 env[1656]: time="2023-10-02T18:49:05.882336502Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/8d5eb3dbdf09edb3de8052ab5a8ab409b92bbf8e96df1d0dd465695000f7fdbe pid=3396 runtime=io.containerd.runc.v2 Oct 2 18:49:05.903486 env[1656]: time="2023-10-02T18:49:05.903348322Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 18:49:05.903667 env[1656]: time="2023-10-02T18:49:05.903515614Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 18:49:05.903739 env[1656]: time="2023-10-02T18:49:05.903656265Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 18:49:05.904405 env[1656]: time="2023-10-02T18:49:05.904284608Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/5197935e76c7880a3f04b7cb01ccd11225793b8862727d661a268b550e22ad4a pid=3412 runtime=io.containerd.runc.v2 Oct 2 18:49:05.923035 systemd[1]: Started cri-containerd-8d5eb3dbdf09edb3de8052ab5a8ab409b92bbf8e96df1d0dd465695000f7fdbe.scope. Oct 2 18:49:05.969839 systemd[1]: Started cri-containerd-5197935e76c7880a3f04b7cb01ccd11225793b8862727d661a268b550e22ad4a.scope. Oct 2 18:49:05.996000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:05.996000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:05.996000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:05.996000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:05.996000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:05.996000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:05.996000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:05.996000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:05.996000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:05.996000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:05.996000 audit: BPF prog-id=133 op=LOAD Oct 2 18:49:05.998000 audit[3414]: AVC avc: denied { bpf } for pid=3414 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:05.998000 audit[3414]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=3396 pid=3414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:05.998000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864356562336462646630396564623364653830353261623561386162 Oct 2 18:49:06.000000 audit[3414]: AVC avc: denied { perfmon } for pid=3414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:06.000000 audit[3414]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=3396 pid=3414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:06.000000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864356562336462646630396564623364653830353261623561386162 Oct 2 18:49:06.000000 audit[3414]: AVC avc: denied { bpf } for pid=3414 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:06.000000 audit[3414]: AVC avc: denied { bpf } for pid=3414 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:06.000000 audit[3414]: AVC avc: denied { bpf } for pid=3414 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:06.000000 audit[3414]: AVC avc: denied { perfmon } for pid=3414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:06.000000 audit[3414]: AVC avc: denied { perfmon } for pid=3414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:06.000000 audit[3414]: AVC avc: denied { perfmon } for pid=3414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:06.000000 audit[3414]: AVC avc: denied { perfmon } for pid=3414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:06.000000 audit[3414]: AVC avc: denied { perfmon } for pid=3414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:06.000000 audit[3414]: AVC avc: denied { bpf } for pid=3414 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:06.000000 audit[3414]: AVC avc: denied { bpf } for pid=3414 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:06.000000 audit: BPF prog-id=134 op=LOAD Oct 2 18:49:06.000000 audit[3414]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=3396 pid=3414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:06.000000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864356562336462646630396564623364653830353261623561386162 Oct 2 18:49:06.002000 audit[3414]: AVC avc: denied { bpf } for pid=3414 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:06.002000 audit[3414]: AVC avc: denied { bpf } for pid=3414 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:06.002000 audit[3414]: AVC avc: denied { perfmon } for pid=3414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:06.002000 audit[3414]: AVC avc: denied { perfmon } for pid=3414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:06.002000 audit[3414]: AVC avc: denied { perfmon } for pid=3414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:06.002000 audit[3414]: AVC avc: denied { perfmon } for pid=3414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:06.002000 audit[3414]: AVC avc: denied { perfmon } for pid=3414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:06.002000 audit[3414]: AVC avc: denied { bpf } for pid=3414 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:06.002000 audit[3414]: AVC avc: denied { bpf } for pid=3414 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:06.002000 audit: BPF prog-id=135 op=LOAD Oct 2 18:49:06.002000 audit[3414]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=3396 pid=3414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:06.002000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864356562336462646630396564623364653830353261623561386162 Oct 2 18:49:06.004000 audit: BPF prog-id=135 op=UNLOAD Oct 2 18:49:06.005000 audit: BPF prog-id=134 op=UNLOAD Oct 2 18:49:06.006000 audit[3414]: AVC avc: denied { bpf } for pid=3414 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:06.006000 audit[3414]: AVC avc: denied { bpf } for pid=3414 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:06.006000 audit[3414]: AVC avc: denied { bpf } for pid=3414 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:06.006000 audit[3414]: AVC avc: denied { perfmon } for pid=3414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:06.006000 audit[3414]: AVC avc: denied { perfmon } for pid=3414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:06.006000 audit[3414]: AVC avc: denied { perfmon } for pid=3414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:06.006000 audit[3414]: AVC avc: denied { perfmon } for pid=3414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:06.006000 audit[3414]: AVC avc: denied { perfmon } for pid=3414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:06.006000 audit[3414]: AVC avc: denied { bpf } for pid=3414 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:06.006000 audit[3414]: AVC avc: denied { bpf } for pid=3414 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:06.006000 audit: BPF prog-id=136 op=LOAD Oct 2 18:49:06.006000 audit[3414]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=3396 pid=3414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:06.006000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864356562336462646630396564623364653830353261623561386162 Oct 2 18:49:06.030000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:06.030000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:06.030000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:06.030000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:06.030000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:06.030000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:06.030000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:06.030000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:06.030000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:06.031000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:06.031000 audit: BPF prog-id=137 op=LOAD Oct 2 18:49:06.032000 audit[3432]: AVC avc: denied { bpf } for pid=3432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:06.032000 audit[3432]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3412 pid=3432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:06.032000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531393739333565373663373838306133663034623763623031636364 Oct 2 18:49:06.033000 audit[3432]: AVC avc: denied { perfmon } for pid=3432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:06.033000 audit[3432]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3412 pid=3432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:06.033000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531393739333565373663373838306133663034623763623031636364 Oct 2 18:49:06.033000 audit[3432]: AVC avc: denied { bpf } for pid=3432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:06.033000 audit[3432]: AVC avc: denied { bpf } for pid=3432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:06.033000 audit[3432]: AVC avc: denied { bpf } for pid=3432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:06.033000 audit[3432]: AVC avc: denied { perfmon } for pid=3432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:06.033000 audit[3432]: AVC avc: denied { perfmon } for pid=3432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:06.033000 audit[3432]: AVC avc: denied { perfmon } for pid=3432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:06.033000 audit[3432]: AVC avc: denied { perfmon } for pid=3432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:06.033000 audit[3432]: AVC avc: denied { perfmon } for pid=3432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:06.033000 audit[3432]: AVC avc: denied { bpf } for pid=3432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:06.033000 audit[3432]: AVC avc: denied { bpf } for pid=3432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:06.033000 audit: BPF prog-id=138 op=LOAD Oct 2 18:49:06.033000 audit[3432]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3412 pid=3432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:06.033000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531393739333565373663373838306133663034623763623031636364 Oct 2 18:49:06.035000 audit[3432]: AVC avc: denied { bpf } for pid=3432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:06.035000 audit[3432]: AVC avc: denied { bpf } for pid=3432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:06.035000 audit[3432]: AVC avc: denied { perfmon } for pid=3432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:06.035000 audit[3432]: AVC avc: denied { perfmon } for pid=3432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:06.035000 audit[3432]: AVC avc: denied { perfmon } for pid=3432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:06.035000 audit[3432]: AVC avc: denied { perfmon } for pid=3432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:06.035000 audit[3432]: AVC avc: denied { perfmon } for pid=3432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:06.035000 audit[3432]: AVC avc: denied { bpf } for pid=3432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:06.035000 audit[3432]: AVC avc: denied { bpf } for pid=3432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:06.035000 audit: BPF prog-id=139 op=LOAD Oct 2 18:49:06.035000 audit[3432]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3412 pid=3432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:06.035000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531393739333565373663373838306133663034623763623031636364 Oct 2 18:49:06.036000 audit: BPF prog-id=139 op=UNLOAD Oct 2 18:49:06.036000 audit: BPF prog-id=138 op=UNLOAD Oct 2 18:49:06.036000 audit[3432]: AVC avc: denied { bpf } for pid=3432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:06.036000 audit[3432]: AVC avc: denied { bpf } for pid=3432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:06.036000 audit[3432]: AVC avc: denied { bpf } for pid=3432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:06.036000 audit[3432]: AVC avc: denied { perfmon } for pid=3432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:06.036000 audit[3432]: AVC avc: denied { perfmon } for pid=3432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:06.036000 audit[3432]: AVC avc: denied { perfmon } for pid=3432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:06.036000 audit[3432]: AVC avc: denied { perfmon } for pid=3432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:06.036000 audit[3432]: AVC avc: denied { perfmon } for pid=3432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:06.036000 audit[3432]: AVC avc: denied { bpf } for pid=3432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:06.036000 audit[3432]: AVC avc: denied { bpf } for pid=3432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:06.036000 audit: BPF prog-id=140 op=LOAD Oct 2 18:49:06.036000 audit[3432]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3412 pid=3432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:06.036000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531393739333565373663373838306133663034623763623031636364 Oct 2 18:49:06.056695 env[1656]: time="2023-10-02T18:49:06.056625494Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-4jzn2,Uid:56de52ec-f73a-4b72-b0c3-a7229865e4ff,Namespace:calico-system,Attempt:0,} returns sandbox id \"8d5eb3dbdf09edb3de8052ab5a8ab409b92bbf8e96df1d0dd465695000f7fdbe\"" Oct 2 18:49:06.059947 env[1656]: time="2023-10-02T18:49:06.059868367Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.25.0\"" Oct 2 18:49:06.108002 env[1656]: time="2023-10-02T18:49:06.107821562Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-7d6cdfdff4-58c7h,Uid:d5f2795c-04c0-4467-a2a1-46997504d9b1,Namespace:calico-system,Attempt:0,} returns sandbox id \"5197935e76c7880a3f04b7cb01ccd11225793b8862727d661a268b550e22ad4a\"" Oct 2 18:49:07.485153 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount382537127.mount: Deactivated successfully. Oct 2 18:49:07.634114 env[1656]: time="2023-10-02T18:49:07.634025801Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:49:07.637848 env[1656]: time="2023-10-02T18:49:07.637775062Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:125b9deae5a04d82056336c1aff8ab9c7ed64cdc224c7139c7433a3a29c21fc8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:49:07.642892 env[1656]: time="2023-10-02T18:49:07.642161329Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:49:07.647388 env[1656]: time="2023-10-02T18:49:07.647332623Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:182a323c25a3503be8c504892a12a55d99a42c3a582cb8e93a1ecc7c193a44c5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:49:07.649901 env[1656]: time="2023-10-02T18:49:07.648865619Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.25.0\" returns image reference \"sha256:125b9deae5a04d82056336c1aff8ab9c7ed64cdc224c7139c7433a3a29c21fc8\"" Oct 2 18:49:07.654534 env[1656]: time="2023-10-02T18:49:07.652602616Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.25.0\"" Oct 2 18:49:07.655879 env[1656]: time="2023-10-02T18:49:07.655593010Z" level=info msg="CreateContainer within sandbox \"8d5eb3dbdf09edb3de8052ab5a8ab409b92bbf8e96df1d0dd465695000f7fdbe\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Oct 2 18:49:07.679202 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount174645712.mount: Deactivated successfully. Oct 2 18:49:07.691783 env[1656]: time="2023-10-02T18:49:07.691717330Z" level=info msg="CreateContainer within sandbox \"8d5eb3dbdf09edb3de8052ab5a8ab409b92bbf8e96df1d0dd465695000f7fdbe\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"fff67ed660efb8adacbb7b5acb878cf2509e71d12efb6eb6387a1ed556b86099\"" Oct 2 18:49:07.693393 env[1656]: time="2023-10-02T18:49:07.693316963Z" level=info msg="StartContainer for \"fff67ed660efb8adacbb7b5acb878cf2509e71d12efb6eb6387a1ed556b86099\"" Oct 2 18:49:07.748430 systemd[1]: Started cri-containerd-fff67ed660efb8adacbb7b5acb878cf2509e71d12efb6eb6387a1ed556b86099.scope. Oct 2 18:49:07.807000 audit[3477]: AVC avc: denied { perfmon } for pid=3477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:07.807000 audit[3477]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3396 pid=3477 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:07.807000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666663637656436363065666238616461636262376235616362383738 Oct 2 18:49:07.808000 audit[3477]: AVC avc: denied { bpf } for pid=3477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:07.808000 audit[3477]: AVC avc: denied { bpf } for pid=3477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:07.808000 audit[3477]: AVC avc: denied { bpf } for pid=3477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:07.808000 audit[3477]: AVC avc: denied { perfmon } for pid=3477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:07.808000 audit[3477]: AVC avc: denied { perfmon } for pid=3477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:07.808000 audit[3477]: AVC avc: denied { perfmon } for pid=3477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:07.808000 audit[3477]: AVC avc: denied { perfmon } for pid=3477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:07.808000 audit[3477]: AVC avc: denied { perfmon } for pid=3477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:07.808000 audit[3477]: AVC avc: denied { bpf } for pid=3477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:07.808000 audit[3477]: AVC avc: denied { bpf } for pid=3477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:07.808000 audit: BPF prog-id=141 op=LOAD Oct 2 18:49:07.808000 audit[3477]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3396 pid=3477 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:07.808000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666663637656436363065666238616461636262376235616362383738 Oct 2 18:49:07.809000 audit[3477]: AVC avc: denied { bpf } for pid=3477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:07.809000 audit[3477]: AVC avc: denied { bpf } for pid=3477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:07.809000 audit[3477]: AVC avc: denied { perfmon } for pid=3477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:07.809000 audit[3477]: AVC avc: denied { perfmon } for pid=3477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:07.809000 audit[3477]: AVC avc: denied { perfmon } for pid=3477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:07.809000 audit[3477]: AVC avc: denied { perfmon } for pid=3477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:07.809000 audit[3477]: AVC avc: denied { perfmon } for pid=3477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:07.809000 audit[3477]: AVC avc: denied { bpf } for pid=3477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:07.809000 audit[3477]: AVC avc: denied { bpf } for pid=3477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:07.809000 audit: BPF prog-id=142 op=LOAD Oct 2 18:49:07.809000 audit[3477]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3396 pid=3477 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:07.809000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666663637656436363065666238616461636262376235616362383738 Oct 2 18:49:07.811000 audit: BPF prog-id=142 op=UNLOAD Oct 2 18:49:07.811000 audit: BPF prog-id=141 op=UNLOAD Oct 2 18:49:07.812000 audit[3477]: AVC avc: denied { bpf } for pid=3477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:07.812000 audit[3477]: AVC avc: denied { bpf } for pid=3477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:07.812000 audit[3477]: AVC avc: denied { bpf } for pid=3477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:07.812000 audit[3477]: AVC avc: denied { perfmon } for pid=3477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:07.812000 audit[3477]: AVC avc: denied { perfmon } for pid=3477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:07.812000 audit[3477]: AVC avc: denied { perfmon } for pid=3477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:07.812000 audit[3477]: AVC avc: denied { perfmon } for pid=3477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:07.812000 audit[3477]: AVC avc: denied { perfmon } for pid=3477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:07.812000 audit[3477]: AVC avc: denied { bpf } for pid=3477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:07.812000 audit[3477]: AVC avc: denied { bpf } for pid=3477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:07.812000 audit: BPF prog-id=143 op=LOAD Oct 2 18:49:07.812000 audit[3477]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3396 pid=3477 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:07.812000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666663637656436363065666238616461636262376235616362383738 Oct 2 18:49:07.852314 env[1656]: time="2023-10-02T18:49:07.852233678Z" level=info msg="StartContainer for \"fff67ed660efb8adacbb7b5acb878cf2509e71d12efb6eb6387a1ed556b86099\" returns successfully" Oct 2 18:49:07.875860 systemd[1]: cri-containerd-fff67ed660efb8adacbb7b5acb878cf2509e71d12efb6eb6387a1ed556b86099.scope: Deactivated successfully. Oct 2 18:49:07.879000 audit: BPF prog-id=143 op=UNLOAD Oct 2 18:49:08.266988 env[1656]: time="2023-10-02T18:49:08.266908593Z" level=info msg="shim disconnected" id=fff67ed660efb8adacbb7b5acb878cf2509e71d12efb6eb6387a1ed556b86099 Oct 2 18:49:08.267326 env[1656]: time="2023-10-02T18:49:08.267290960Z" level=warning msg="cleaning up after shim disconnected" id=fff67ed660efb8adacbb7b5acb878cf2509e71d12efb6eb6387a1ed556b86099 namespace=k8s.io Oct 2 18:49:08.267469 env[1656]: time="2023-10-02T18:49:08.267440732Z" level=info msg="cleaning up dead shim" Oct 2 18:49:08.295042 env[1656]: time="2023-10-02T18:49:08.294985409Z" level=warning msg="cleanup warnings time=\"2023-10-02T18:49:08Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3521 runtime=io.containerd.runc.v2\n" Oct 2 18:49:08.485265 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-fff67ed660efb8adacbb7b5acb878cf2509e71d12efb6eb6387a1ed556b86099-rootfs.mount: Deactivated successfully. Oct 2 18:49:08.701870 kubelet[2886]: E1002 18:49:08.701732 2886 kubelet.go:2373] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 18:49:08.881208 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2807413751.mount: Deactivated successfully. Oct 2 18:49:10.012647 env[1656]: time="2023-10-02T18:49:10.012544048Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:49:10.015947 env[1656]: time="2023-10-02T18:49:10.015890158Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a549a5fe632d63eae6f8f617934a309e3e901a6e8cfb0b038a70b8b950fc4dd5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:49:10.019810 env[1656]: time="2023-10-02T18:49:10.019742836Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:49:10.027739 env[1656]: time="2023-10-02T18:49:10.027682839Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:7fb0e011ffae9f88333b7a7488dae37f1d534b46d2b11a0fe2b5d129df58789c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:49:10.028578 env[1656]: time="2023-10-02T18:49:10.028490138Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.25.0\" returns image reference \"sha256:a549a5fe632d63eae6f8f617934a309e3e901a6e8cfb0b038a70b8b950fc4dd5\"" Oct 2 18:49:10.032428 env[1656]: time="2023-10-02T18:49:10.032375647Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.25.0\"" Oct 2 18:49:10.036187 env[1656]: time="2023-10-02T18:49:10.036119473Z" level=info msg="CreateContainer within sandbox \"5197935e76c7880a3f04b7cb01ccd11225793b8862727d661a268b550e22ad4a\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Oct 2 18:49:10.058448 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1979214268.mount: Deactivated successfully. Oct 2 18:49:10.067815 env[1656]: time="2023-10-02T18:49:10.067725057Z" level=info msg="CreateContainer within sandbox \"5197935e76c7880a3f04b7cb01ccd11225793b8862727d661a268b550e22ad4a\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"d51a6f9efbcff5a774da826c9a1c33d41fbe2040d3910edf230326614ebcc42a\"" Oct 2 18:49:10.069315 env[1656]: time="2023-10-02T18:49:10.069247579Z" level=info msg="StartContainer for \"d51a6f9efbcff5a774da826c9a1c33d41fbe2040d3910edf230326614ebcc42a\"" Oct 2 18:49:10.123588 systemd[1]: Started cri-containerd-d51a6f9efbcff5a774da826c9a1c33d41fbe2040d3910edf230326614ebcc42a.scope. Oct 2 18:49:10.174000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:10.177796 kernel: kauditd_printk_skb: 166 callbacks suppressed Oct 2 18:49:10.177921 kernel: audit: type=1400 audit(1696272550.174:1148): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:10.176000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:10.195150 kernel: audit: type=1400 audit(1696272550.176:1149): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:10.176000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:10.203616 kernel: audit: type=1400 audit(1696272550.176:1150): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:10.176000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:10.212775 kernel: audit: type=1400 audit(1696272550.176:1151): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:10.176000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:10.222172 kernel: audit: type=1400 audit(1696272550.176:1152): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:10.176000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:10.232503 kernel: audit: type=1400 audit(1696272550.176:1153): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:10.176000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:10.241373 kernel: audit: type=1400 audit(1696272550.176:1154): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:10.176000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:10.254291 kernel: audit: type=1400 audit(1696272550.176:1155): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:10.176000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:10.263039 kernel: audit: type=1400 audit(1696272550.176:1156): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:10.176000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:10.273103 kernel: audit: type=1400 audit(1696272550.176:1157): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:10.176000 audit: BPF prog-id=144 op=LOAD Oct 2 18:49:10.185000 audit[3542]: AVC avc: denied { bpf } for pid=3542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:10.185000 audit[3542]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000147b38 a2=10 a3=0 items=0 ppid=3412 pid=3542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:10.185000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435316136663965666263666635613737346461383236633961316333 Oct 2 18:49:10.185000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:10.185000 audit[3542]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001475a0 a2=3c a3=0 items=0 ppid=3412 pid=3542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:10.185000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435316136663965666263666635613737346461383236633961316333 Oct 2 18:49:10.185000 audit[3542]: AVC avc: denied { bpf } for pid=3542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:10.185000 audit[3542]: AVC avc: denied { bpf } for pid=3542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:10.185000 audit[3542]: AVC avc: denied { bpf } for pid=3542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:10.185000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:10.185000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:10.185000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:10.185000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:10.185000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:10.185000 audit[3542]: AVC avc: denied { bpf } for pid=3542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:10.185000 audit[3542]: AVC avc: denied { bpf } for pid=3542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:10.185000 audit: BPF prog-id=145 op=LOAD Oct 2 18:49:10.185000 audit[3542]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001478e0 a2=78 a3=0 items=0 ppid=3412 pid=3542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:10.185000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435316136663965666263666635613737346461383236633961316333 Oct 2 18:49:10.185000 audit[3542]: AVC avc: denied { bpf } for pid=3542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:10.185000 audit[3542]: AVC avc: denied { bpf } for pid=3542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:10.185000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:10.185000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:10.185000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:10.185000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:10.185000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:10.185000 audit[3542]: AVC avc: denied { bpf } for pid=3542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:10.185000 audit[3542]: AVC avc: denied { bpf } for pid=3542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:10.185000 audit: BPF prog-id=146 op=LOAD Oct 2 18:49:10.185000 audit[3542]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000147670 a2=78 a3=0 items=0 ppid=3412 pid=3542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:10.185000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435316136663965666263666635613737346461383236633961316333 Oct 2 18:49:10.185000 audit: BPF prog-id=146 op=UNLOAD Oct 2 18:49:10.185000 audit: BPF prog-id=145 op=UNLOAD Oct 2 18:49:10.185000 audit[3542]: AVC avc: denied { bpf } for pid=3542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:10.185000 audit[3542]: AVC avc: denied { bpf } for pid=3542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:10.185000 audit[3542]: AVC avc: denied { bpf } for pid=3542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:10.185000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:10.185000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:10.185000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:10.185000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:10.185000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:10.185000 audit[3542]: AVC avc: denied { bpf } for pid=3542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:10.185000 audit[3542]: AVC avc: denied { bpf } for pid=3542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:10.185000 audit: BPF prog-id=147 op=LOAD Oct 2 18:49:10.185000 audit[3542]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000147b40 a2=78 a3=0 items=0 ppid=3412 pid=3542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:10.185000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435316136663965666263666635613737346461383236633961316333 Oct 2 18:49:10.282403 env[1656]: time="2023-10-02T18:49:10.282313397Z" level=info msg="StartContainer for \"d51a6f9efbcff5a774da826c9a1c33d41fbe2040d3910edf230326614ebcc42a\" returns successfully" Oct 2 18:49:11.108000 audit[3599]: NETFILTER_CFG table=filter:109 family=2 entries=13 op=nft_register_rule pid=3599 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 18:49:11.108000 audit[3599]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4028 a0=3 a1=ffffc9ae1fa0 a2=0 a3=ffffac9a96c0 items=0 ppid=3046 pid=3599 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:11.108000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 18:49:11.111000 audit[3599]: NETFILTER_CFG table=nat:110 family=2 entries=27 op=nft_register_chain pid=3599 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 18:49:11.111000 audit[3599]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=8836 a0=3 a1=ffffc9ae1fa0 a2=0 a3=ffffac9a96c0 items=0 ppid=3046 pid=3599 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:11.111000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 18:49:11.315097 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount511530744.mount: Deactivated successfully. Oct 2 18:49:13.702914 kubelet[2886]: E1002 18:49:13.702829 2886 kubelet.go:2373] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Oct 2 18:49:14.938653 env[1656]: time="2023-10-02T18:49:14.938528411Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:49:14.945614 env[1656]: time="2023-10-02T18:49:14.944958386Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:0bb8d6f033a0548573ff857c26574d89a8ad4b691aa88a32eddf0c7db06599ef,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:49:14.949617 env[1656]: time="2023-10-02T18:49:14.949520601Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:49:14.954496 env[1656]: time="2023-10-02T18:49:14.954336099Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:34bf454be8cd5b9a35ab29c2479ff68a26497c2c87eb606e4bfe57c7fbeeff35,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:49:14.957646 env[1656]: time="2023-10-02T18:49:14.956342040Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.25.0\" returns image reference \"sha256:0bb8d6f033a0548573ff857c26574d89a8ad4b691aa88a32eddf0c7db06599ef\"" Oct 2 18:49:14.963680 env[1656]: time="2023-10-02T18:49:14.963552087Z" level=info msg="CreateContainer within sandbox \"8d5eb3dbdf09edb3de8052ab5a8ab409b92bbf8e96df1d0dd465695000f7fdbe\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Oct 2 18:49:14.991749 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2379942986.mount: Deactivated successfully. Oct 2 18:49:14.997510 env[1656]: time="2023-10-02T18:49:14.997419524Z" level=info msg="CreateContainer within sandbox \"8d5eb3dbdf09edb3de8052ab5a8ab409b92bbf8e96df1d0dd465695000f7fdbe\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"4d9532a1186764e0a402055795496670615804d1e77b35ce221234bd9a1b270d\"" Oct 2 18:49:14.999617 env[1656]: time="2023-10-02T18:49:14.998223535Z" level=info msg="StartContainer for \"4d9532a1186764e0a402055795496670615804d1e77b35ce221234bd9a1b270d\"" Oct 2 18:49:15.066942 systemd[1]: run-containerd-runc-k8s.io-4d9532a1186764e0a402055795496670615804d1e77b35ce221234bd9a1b270d-runc.Lh1TjU.mount: Deactivated successfully. Oct 2 18:49:15.074756 systemd[1]: Started cri-containerd-4d9532a1186764e0a402055795496670615804d1e77b35ce221234bd9a1b270d.scope. Oct 2 18:49:15.116000 audit[3609]: AVC avc: denied { perfmon } for pid=3609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:15.116000 audit[3609]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3396 pid=3609 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:15.116000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464393533326131313836373634653061343032303535373935343936 Oct 2 18:49:15.116000 audit[3609]: AVC avc: denied { bpf } for pid=3609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:15.116000 audit[3609]: AVC avc: denied { bpf } for pid=3609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:15.116000 audit[3609]: AVC avc: denied { bpf } for pid=3609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:15.116000 audit[3609]: AVC avc: denied { perfmon } for pid=3609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:15.116000 audit[3609]: AVC avc: denied { perfmon } for pid=3609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:15.116000 audit[3609]: AVC avc: denied { perfmon } for pid=3609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:15.116000 audit[3609]: AVC avc: denied { perfmon } for pid=3609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:15.116000 audit[3609]: AVC avc: denied { perfmon } for pid=3609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:15.116000 audit[3609]: AVC avc: denied { bpf } for pid=3609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:15.116000 audit[3609]: AVC avc: denied { bpf } for pid=3609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:15.116000 audit: BPF prog-id=148 op=LOAD Oct 2 18:49:15.116000 audit[3609]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3396 pid=3609 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:15.116000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464393533326131313836373634653061343032303535373935343936 Oct 2 18:49:15.116000 audit[3609]: AVC avc: denied { bpf } for pid=3609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:15.116000 audit[3609]: AVC avc: denied { bpf } for pid=3609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:15.116000 audit[3609]: AVC avc: denied { perfmon } for pid=3609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:15.116000 audit[3609]: AVC avc: denied { perfmon } for pid=3609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:15.116000 audit[3609]: AVC avc: denied { perfmon } for pid=3609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:15.116000 audit[3609]: AVC avc: denied { perfmon } for pid=3609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:15.116000 audit[3609]: AVC avc: denied { perfmon } for pid=3609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:15.116000 audit[3609]: AVC avc: denied { bpf } for pid=3609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:15.116000 audit[3609]: AVC avc: denied { bpf } for pid=3609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:15.116000 audit: BPF prog-id=149 op=LOAD Oct 2 18:49:15.116000 audit[3609]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3396 pid=3609 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:15.116000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464393533326131313836373634653061343032303535373935343936 Oct 2 18:49:15.117000 audit: BPF prog-id=149 op=UNLOAD Oct 2 18:49:15.117000 audit: BPF prog-id=148 op=UNLOAD Oct 2 18:49:15.117000 audit[3609]: AVC avc: denied { bpf } for pid=3609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:15.117000 audit[3609]: AVC avc: denied { bpf } for pid=3609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:15.117000 audit[3609]: AVC avc: denied { bpf } for pid=3609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:15.117000 audit[3609]: AVC avc: denied { perfmon } for pid=3609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:15.117000 audit[3609]: AVC avc: denied { perfmon } for pid=3609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:15.117000 audit[3609]: AVC avc: denied { perfmon } for pid=3609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:15.117000 audit[3609]: AVC avc: denied { perfmon } for pid=3609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:15.117000 audit[3609]: AVC avc: denied { perfmon } for pid=3609 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:15.117000 audit[3609]: AVC avc: denied { bpf } for pid=3609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:15.117000 audit[3609]: AVC avc: denied { bpf } for pid=3609 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:15.117000 audit: BPF prog-id=150 op=LOAD Oct 2 18:49:15.117000 audit[3609]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3396 pid=3609 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:15.117000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464393533326131313836373634653061343032303535373935343936 Oct 2 18:49:15.162441 env[1656]: time="2023-10-02T18:49:15.162367872Z" level=info msg="StartContainer for \"4d9532a1186764e0a402055795496670615804d1e77b35ce221234bd9a1b270d\" returns successfully" Oct 2 18:49:16.064415 env[1656]: time="2023-10-02T18:49:16.064337266Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Oct 2 18:49:16.071466 systemd[1]: cri-containerd-4d9532a1186764e0a402055795496670615804d1e77b35ce221234bd9a1b270d.scope: Deactivated successfully. Oct 2 18:49:16.074000 audit: BPF prog-id=150 op=UNLOAD Oct 2 18:49:16.077064 kernel: kauditd_printk_skb: 96 callbacks suppressed Oct 2 18:49:16.077209 kernel: audit: type=1334 audit(1696272556.074:1174): prog-id=150 op=UNLOAD Oct 2 18:49:16.127984 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-4d9532a1186764e0a402055795496670615804d1e77b35ce221234bd9a1b270d-rootfs.mount: Deactivated successfully. Oct 2 18:49:17.587163 env[1656]: time="2023-10-02T18:49:17.587084744Z" level=info msg="shim disconnected" id=4d9532a1186764e0a402055795496670615804d1e77b35ce221234bd9a1b270d Oct 2 18:49:17.587866 env[1656]: time="2023-10-02T18:49:17.587158832Z" level=warning msg="cleaning up after shim disconnected" id=4d9532a1186764e0a402055795496670615804d1e77b35ce221234bd9a1b270d namespace=k8s.io Oct 2 18:49:17.587866 env[1656]: time="2023-10-02T18:49:17.587185460Z" level=info msg="cleaning up dead shim" Oct 2 18:49:17.613871 env[1656]: time="2023-10-02T18:49:17.613788509Z" level=warning msg="cleanup warnings time=\"2023-10-02T18:49:17Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3654 runtime=io.containerd.runc.v2\n" Oct 2 18:49:17.930454 env[1656]: time="2023-10-02T18:49:17.929796743Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.25.0\"" Oct 2 18:49:23.953812 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount82583944.mount: Deactivated successfully. Oct 2 18:49:24.068459 env[1656]: time="2023-10-02T18:49:24.068385980Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:49:24.071718 env[1656]: time="2023-10-02T18:49:24.071654190Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8a2dff14388de51338e7468b834f0b37232379ce3cd97ac3c4a07b110a41ad00,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:49:24.074300 env[1656]: time="2023-10-02T18:49:24.074249320Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:49:24.077259 env[1656]: time="2023-10-02T18:49:24.077207930Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:e898f4b7b55c908c88dad008ae939024e71ed93c5effbb10cca891b658b2f001,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:49:24.078256 env[1656]: time="2023-10-02T18:49:24.078212185Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.25.0\" returns image reference \"sha256:8a2dff14388de51338e7468b834f0b37232379ce3cd97ac3c4a07b110a41ad00\"" Oct 2 18:49:24.086471 env[1656]: time="2023-10-02T18:49:24.086405660Z" level=info msg="CreateContainer within sandbox \"8d5eb3dbdf09edb3de8052ab5a8ab409b92bbf8e96df1d0dd465695000f7fdbe\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Oct 2 18:49:24.115163 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1750662311.mount: Deactivated successfully. Oct 2 18:49:24.126475 env[1656]: time="2023-10-02T18:49:24.126350430Z" level=info msg="CreateContainer within sandbox \"8d5eb3dbdf09edb3de8052ab5a8ab409b92bbf8e96df1d0dd465695000f7fdbe\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"1ca171773b1a69ccf09a1d5c6a02199e1a10fd681fe7126e7e06d1bc42bb2ddc\"" Oct 2 18:49:24.129675 env[1656]: time="2023-10-02T18:49:24.127855469Z" level=info msg="StartContainer for \"1ca171773b1a69ccf09a1d5c6a02199e1a10fd681fe7126e7e06d1bc42bb2ddc\"" Oct 2 18:49:24.193624 systemd[1]: Started cri-containerd-1ca171773b1a69ccf09a1d5c6a02199e1a10fd681fe7126e7e06d1bc42bb2ddc.scope. Oct 2 18:49:24.250000 audit[3677]: AVC avc: denied { perfmon } for pid=3677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:24.250000 audit[3677]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3396 pid=3677 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:24.272711 kernel: audit: type=1400 audit(1696272564.250:1175): avc: denied { perfmon } for pid=3677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:24.272862 kernel: audit: type=1300 audit(1696272564.250:1175): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3396 pid=3677 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:24.250000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163613137313737336231613639636366303961316435633661303231 Oct 2 18:49:24.283956 kernel: audit: type=1327 audit(1696272564.250:1175): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163613137313737336231613639636366303961316435633661303231 Oct 2 18:49:24.250000 audit[3677]: AVC avc: denied { bpf } for pid=3677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:24.250000 audit[3677]: AVC avc: denied { bpf } for pid=3677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:24.303306 kernel: audit: type=1400 audit(1696272564.250:1176): avc: denied { bpf } for pid=3677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:24.303509 kernel: audit: type=1400 audit(1696272564.250:1176): avc: denied { bpf } for pid=3677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:24.250000 audit[3677]: AVC avc: denied { bpf } for pid=3677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:24.315598 kernel: audit: type=1400 audit(1696272564.250:1176): avc: denied { bpf } for pid=3677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:24.250000 audit[3677]: AVC avc: denied { perfmon } for pid=3677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:24.250000 audit[3677]: AVC avc: denied { perfmon } for pid=3677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:24.331706 kernel: audit: type=1400 audit(1696272564.250:1176): avc: denied { perfmon } for pid=3677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:24.331846 kernel: audit: type=1400 audit(1696272564.250:1176): avc: denied { perfmon } for pid=3677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:24.250000 audit[3677]: AVC avc: denied { perfmon } for pid=3677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:24.339957 kernel: audit: type=1400 audit(1696272564.250:1176): avc: denied { perfmon } for pid=3677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:24.250000 audit[3677]: AVC avc: denied { perfmon } for pid=3677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:24.250000 audit[3677]: AVC avc: denied { perfmon } for pid=3677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:24.350657 kernel: audit: type=1400 audit(1696272564.250:1176): avc: denied { perfmon } for pid=3677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:24.250000 audit[3677]: AVC avc: denied { bpf } for pid=3677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:24.250000 audit[3677]: AVC avc: denied { bpf } for pid=3677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:24.250000 audit: BPF prog-id=151 op=LOAD Oct 2 18:49:24.250000 audit[3677]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3396 pid=3677 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:24.250000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163613137313737336231613639636366303961316435633661303231 Oct 2 18:49:24.258000 audit[3677]: AVC avc: denied { bpf } for pid=3677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:24.258000 audit[3677]: AVC avc: denied { bpf } for pid=3677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:24.258000 audit[3677]: AVC avc: denied { perfmon } for pid=3677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:24.258000 audit[3677]: AVC avc: denied { perfmon } for pid=3677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:24.258000 audit[3677]: AVC avc: denied { perfmon } for pid=3677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:24.258000 audit[3677]: AVC avc: denied { perfmon } for pid=3677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:24.258000 audit[3677]: AVC avc: denied { perfmon } for pid=3677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:24.258000 audit[3677]: AVC avc: denied { bpf } for pid=3677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:24.258000 audit[3677]: AVC avc: denied { bpf } for pid=3677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:24.258000 audit: BPF prog-id=152 op=LOAD Oct 2 18:49:24.258000 audit[3677]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3396 pid=3677 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:24.258000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163613137313737336231613639636366303961316435633661303231 Oct 2 18:49:24.259000 audit: BPF prog-id=152 op=UNLOAD Oct 2 18:49:24.259000 audit: BPF prog-id=151 op=UNLOAD Oct 2 18:49:24.259000 audit[3677]: AVC avc: denied { bpf } for pid=3677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:24.259000 audit[3677]: AVC avc: denied { bpf } for pid=3677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:24.259000 audit[3677]: AVC avc: denied { bpf } for pid=3677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:24.259000 audit[3677]: AVC avc: denied { perfmon } for pid=3677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:24.259000 audit[3677]: AVC avc: denied { perfmon } for pid=3677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:24.259000 audit[3677]: AVC avc: denied { perfmon } for pid=3677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:24.259000 audit[3677]: AVC avc: denied { perfmon } for pid=3677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:24.259000 audit[3677]: AVC avc: denied { perfmon } for pid=3677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:24.259000 audit[3677]: AVC avc: denied { bpf } for pid=3677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:24.259000 audit[3677]: AVC avc: denied { bpf } for pid=3677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:24.259000 audit: BPF prog-id=153 op=LOAD Oct 2 18:49:24.259000 audit[3677]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3396 pid=3677 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:24.259000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163613137313737336231613639636366303961316435633661303231 Oct 2 18:49:24.357410 env[1656]: time="2023-10-02T18:49:24.355790014Z" level=info msg="StartContainer for \"1ca171773b1a69ccf09a1d5c6a02199e1a10fd681fe7126e7e06d1bc42bb2ddc\" returns successfully" Oct 2 18:49:24.503686 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Oct 2 18:49:24.503913 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Oct 2 18:49:24.571333 kubelet[2886]: I1002 18:49:24.571175 2886 topology_manager.go:205] "Topology Admit Handler" Oct 2 18:49:24.580786 kubelet[2886]: W1002 18:49:24.580725 2886 reflector.go:424] object-"kube-system"/"coredns": failed to list *v1.ConfigMap: configmaps "coredns" is forbidden: User "system:node:ip-172-31-16-118" cannot list resource "configmaps" in API group "" in the namespace "kube-system": no relationship found between node 'ip-172-31-16-118' and this object Oct 2 18:49:24.581073 kubelet[2886]: E1002 18:49:24.581046 2886 reflector.go:140] object-"kube-system"/"coredns": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps "coredns" is forbidden: User "system:node:ip-172-31-16-118" cannot list resource "configmaps" in API group "" in the namespace "kube-system": no relationship found between node 'ip-172-31-16-118' and this object Oct 2 18:49:24.585501 systemd[1]: Created slice kubepods-burstable-pod33f9fc2a_153b_4694_b118_c7eaee2e867d.slice. Oct 2 18:49:24.590248 kubelet[2886]: I1002 18:49:24.590177 2886 topology_manager.go:205] "Topology Admit Handler" Oct 2 18:49:24.594098 kubelet[2886]: I1002 18:49:24.594060 2886 topology_manager.go:205] "Topology Admit Handler" Oct 2 18:49:24.604709 systemd[1]: Created slice kubepods-besteffort-pod8aedc893_9d11_4da8_9106_5f317e40166d.slice. Oct 2 18:49:24.620963 systemd[1]: Created slice kubepods-burstable-podd1a342a2_5851_4010_a0e5_12e4e52014f4.slice. Oct 2 18:49:24.629577 kubelet[2886]: I1002 18:49:24.629507 2886 topology_manager.go:205] "Topology Admit Handler" Oct 2 18:49:24.637267 kubelet[2886]: I1002 18:49:24.637209 2886 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/33f9fc2a-153b-4694-b118-c7eaee2e867d-config-volume\") pod \"coredns-565d847f94-4ghb7\" (UID: \"33f9fc2a-153b-4694-b118-c7eaee2e867d\") " pod="kube-system/coredns-565d847f94-4ghb7" Oct 2 18:49:24.637677 kubelet[2886]: I1002 18:49:24.637630 2886 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/d1a342a2-5851-4010-a0e5-12e4e52014f4-config-volume\") pod \"coredns-565d847f94-nn229\" (UID: \"d1a342a2-5851-4010-a0e5-12e4e52014f4\") " pod="kube-system/coredns-565d847f94-nn229" Oct 2 18:49:24.637771 kubelet[2886]: I1002 18:49:24.637710 2886 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-hxrn4\" (UniqueName: \"kubernetes.io/projected/8aedc893-9d11-4da8-9106-5f317e40166d-kube-api-access-hxrn4\") pod \"calico-kube-controllers-69d9c784fb-6m86b\" (UID: \"8aedc893-9d11-4da8-9106-5f317e40166d\") " pod="calico-system/calico-kube-controllers-69d9c784fb-6m86b" Oct 2 18:49:24.637771 kubelet[2886]: I1002 18:49:24.637760 2886 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-8nglx\" (UniqueName: \"kubernetes.io/projected/33f9fc2a-153b-4694-b118-c7eaee2e867d-kube-api-access-8nglx\") pod \"coredns-565d847f94-4ghb7\" (UID: \"33f9fc2a-153b-4694-b118-c7eaee2e867d\") " pod="kube-system/coredns-565d847f94-4ghb7" Oct 2 18:49:24.637887 kubelet[2886]: I1002 18:49:24.637809 2886 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-x4ghv\" (UniqueName: \"kubernetes.io/projected/d1a342a2-5851-4010-a0e5-12e4e52014f4-kube-api-access-x4ghv\") pod \"coredns-565d847f94-nn229\" (UID: \"d1a342a2-5851-4010-a0e5-12e4e52014f4\") " pod="kube-system/coredns-565d847f94-nn229" Oct 2 18:49:24.644631 systemd[1]: Created slice kubepods-besteffort-pode6ba647d_27de_403d_bc1a_97cd30c5337c.slice. Oct 2 18:49:24.738857 kubelet[2886]: I1002 18:49:24.738810 2886 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/e6ba647d-27de-403d-bc1a-97cd30c5337c-varrun\") pod \"csi-node-driver-2xm2w\" (UID: \"e6ba647d-27de-403d-bc1a-97cd30c5337c\") " pod="calico-system/csi-node-driver-2xm2w" Oct 2 18:49:24.739292 kubelet[2886]: I1002 18:49:24.739256 2886 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/e6ba647d-27de-403d-bc1a-97cd30c5337c-kubelet-dir\") pod \"csi-node-driver-2xm2w\" (UID: \"e6ba647d-27de-403d-bc1a-97cd30c5337c\") " pod="calico-system/csi-node-driver-2xm2w" Oct 2 18:49:24.739662 kubelet[2886]: I1002 18:49:24.739606 2886 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/e6ba647d-27de-403d-bc1a-97cd30c5337c-registration-dir\") pod \"csi-node-driver-2xm2w\" (UID: \"e6ba647d-27de-403d-bc1a-97cd30c5337c\") " pod="calico-system/csi-node-driver-2xm2w" Oct 2 18:49:24.740020 kubelet[2886]: I1002 18:49:24.739986 2886 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/e6ba647d-27de-403d-bc1a-97cd30c5337c-socket-dir\") pod \"csi-node-driver-2xm2w\" (UID: \"e6ba647d-27de-403d-bc1a-97cd30c5337c\") " pod="calico-system/csi-node-driver-2xm2w" Oct 2 18:49:24.740494 kubelet[2886]: I1002 18:49:24.740444 2886 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"etccalico\" (UniqueName: \"kubernetes.io/host-path/e6ba647d-27de-403d-bc1a-97cd30c5337c-etccalico\") pod \"csi-node-driver-2xm2w\" (UID: \"e6ba647d-27de-403d-bc1a-97cd30c5337c\") " pod="calico-system/csi-node-driver-2xm2w" Oct 2 18:49:24.740893 kubelet[2886]: I1002 18:49:24.740863 2886 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-jtrz6\" (UniqueName: \"kubernetes.io/projected/e6ba647d-27de-403d-bc1a-97cd30c5337c-kube-api-access-jtrz6\") pod \"csi-node-driver-2xm2w\" (UID: \"e6ba647d-27de-403d-bc1a-97cd30c5337c\") " pod="calico-system/csi-node-driver-2xm2w" Oct 2 18:49:24.914037 env[1656]: time="2023-10-02T18:49:24.913233841Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-69d9c784fb-6m86b,Uid:8aedc893-9d11-4da8-9106-5f317e40166d,Namespace:calico-system,Attempt:0,}" Oct 2 18:49:25.095356 systemd[1]: run-containerd-runc-k8s.io-1ca171773b1a69ccf09a1d5c6a02199e1a10fd681fe7126e7e06d1bc42bb2ddc-runc.ay55bv.mount: Deactivated successfully. Oct 2 18:49:25.253925 env[1656]: time="2023-10-02T18:49:25.253451410Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-2xm2w,Uid:e6ba647d-27de-403d-bc1a-97cd30c5337c,Namespace:calico-system,Attempt:0,}" Oct 2 18:49:25.722644 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Oct 2 18:49:25.722827 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali31c36855ec9: link becomes ready Oct 2 18:49:25.731122 (udev-worker)[3711]: Network interface NamePolicy= disabled on kernel command line. Oct 2 18:49:25.742061 systemd-networkd[1457]: cali31c36855ec9: Link UP Oct 2 18:49:25.743007 kubelet[2886]: E1002 18:49:25.742112 2886 configmap.go:197] Couldn't get configMap kube-system/coredns: failed to sync configmap cache: timed out waiting for the condition Oct 2 18:49:25.743007 kubelet[2886]: E1002 18:49:25.742217 2886 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/configmap/d1a342a2-5851-4010-a0e5-12e4e52014f4-config-volume podName:d1a342a2-5851-4010-a0e5-12e4e52014f4 nodeName:}" failed. No retries permitted until 2023-10-02 18:49:26.242190446 +0000 UTC m=+43.167987394 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "config-volume" (UniqueName: "kubernetes.io/configmap/d1a342a2-5851-4010-a0e5-12e4e52014f4-config-volume") pod "coredns-565d847f94-nn229" (UID: "d1a342a2-5851-4010-a0e5-12e4e52014f4") : failed to sync configmap cache: timed out waiting for the condition Oct 2 18:49:25.742078 systemd-networkd[1457]: cali31c36855ec9: Gained carrier Oct 2 18:49:25.744871 kubelet[2886]: E1002 18:49:25.743924 2886 configmap.go:197] Couldn't get configMap kube-system/coredns: failed to sync configmap cache: timed out waiting for the condition Oct 2 18:49:25.744871 kubelet[2886]: E1002 18:49:25.744068 2886 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/configmap/33f9fc2a-153b-4694-b118-c7eaee2e867d-config-volume podName:33f9fc2a-153b-4694-b118-c7eaee2e867d nodeName:}" failed. No retries permitted until 2023-10-02 18:49:26.244040804 +0000 UTC m=+43.169837752 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "config-volume" (UniqueName: "kubernetes.io/configmap/33f9fc2a-153b-4694-b118-c7eaee2e867d-config-volume") pod "coredns-565d847f94-4ghb7" (UID: "33f9fc2a-153b-4694-b118-c7eaee2e867d") : failed to sync configmap cache: timed out waiting for the condition Oct 2 18:49:25.776526 env[1656]: 2023-10-02 18:49:25.112 [INFO][3727] utils.go 108: File /var/lib/calico/mtu does not exist Oct 2 18:49:25.776526 env[1656]: 2023-10-02 18:49:25.151 [INFO][3727] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--16--118-k8s-calico--kube--controllers--69d9c784fb--6m86b-eth0 calico-kube-controllers-69d9c784fb- calico-system 8aedc893-9d11-4da8-9106-5f317e40166d 644 0 2023-10-02 18:49:04 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:69d9c784fb projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s ip-172-31-16-118 calico-kube-controllers-69d9c784fb-6m86b eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali31c36855ec9 [] []}} ContainerID="fe4430a55e218aeb0fee0fd13e4dd5c58231a339ee3cb6b4ffd2562b4d4888e7" Namespace="calico-system" Pod="calico-kube-controllers-69d9c784fb-6m86b" WorkloadEndpoint="ip--172--31--16--118-k8s-calico--kube--controllers--69d9c784fb--6m86b-" Oct 2 18:49:25.776526 env[1656]: 2023-10-02 18:49:25.151 [INFO][3727] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="fe4430a55e218aeb0fee0fd13e4dd5c58231a339ee3cb6b4ffd2562b4d4888e7" Namespace="calico-system" Pod="calico-kube-controllers-69d9c784fb-6m86b" WorkloadEndpoint="ip--172--31--16--118-k8s-calico--kube--controllers--69d9c784fb--6m86b-eth0" Oct 2 18:49:25.776526 env[1656]: 2023-10-02 18:49:25.263 [INFO][3756] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="fe4430a55e218aeb0fee0fd13e4dd5c58231a339ee3cb6b4ffd2562b4d4888e7" HandleID="k8s-pod-network.fe4430a55e218aeb0fee0fd13e4dd5c58231a339ee3cb6b4ffd2562b4d4888e7" Workload="ip--172--31--16--118-k8s-calico--kube--controllers--69d9c784fb--6m86b-eth0" Oct 2 18:49:25.776526 env[1656]: 2023-10-02 18:49:25.357 [INFO][3756] ipam_plugin.go 269: Auto assigning IP ContainerID="fe4430a55e218aeb0fee0fd13e4dd5c58231a339ee3cb6b4ffd2562b4d4888e7" HandleID="k8s-pod-network.fe4430a55e218aeb0fee0fd13e4dd5c58231a339ee3cb6b4ffd2562b4d4888e7" Workload="ip--172--31--16--118-k8s-calico--kube--controllers--69d9c784fb--6m86b-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x400004d7e0), Attrs:map[string]string{"namespace":"calico-system", "node":"ip-172-31-16-118", "pod":"calico-kube-controllers-69d9c784fb-6m86b", "timestamp":"2023-10-02 18:49:25.262992436 +0000 UTC"}, Hostname:"ip-172-31-16-118", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 2 18:49:25.776526 env[1656]: time="2023-10-02T18:49:25Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 18:49:25.776526 env[1656]: time="2023-10-02T18:49:25Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 18:49:25.776526 env[1656]: 2023-10-02 18:49:25.358 [INFO][3756] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-16-118' Oct 2 18:49:25.776526 env[1656]: 2023-10-02 18:49:25.494 [INFO][3756] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.fe4430a55e218aeb0fee0fd13e4dd5c58231a339ee3cb6b4ffd2562b4d4888e7" host="ip-172-31-16-118" Oct 2 18:49:25.776526 env[1656]: 2023-10-02 18:49:25.504 [INFO][3756] ipam.go 372: Looking up existing affinities for host host="ip-172-31-16-118" Oct 2 18:49:25.776526 env[1656]: 2023-10-02 18:49:25.563 [INFO][3756] ipam.go 521: Ran out of existing affine blocks for host host="ip-172-31-16-118" Oct 2 18:49:25.776526 env[1656]: 2023-10-02 18:49:25.572 [INFO][3756] ipam.go 538: Tried all affine blocks. Looking for an affine block with space, or a new unclaimed block host="ip-172-31-16-118" Oct 2 18:49:25.776526 env[1656]: 2023-10-02 18:49:25.588 [INFO][3756] ipam_block_reader_writer.go 154: Found free block: 192.168.63.192/26 Oct 2 18:49:25.776526 env[1656]: 2023-10-02 18:49:25.589 [INFO][3756] ipam.go 550: Found unclaimed block host="ip-172-31-16-118" subnet=192.168.63.192/26 Oct 2 18:49:25.776526 env[1656]: 2023-10-02 18:49:25.589 [INFO][3756] ipam_block_reader_writer.go 171: Trying to create affinity in pending state host="ip-172-31-16-118" subnet=192.168.63.192/26 Oct 2 18:49:25.776526 env[1656]: 2023-10-02 18:49:25.612 [INFO][3756] ipam_block_reader_writer.go 201: Successfully created pending affinity for block host="ip-172-31-16-118" subnet=192.168.63.192/26 Oct 2 18:49:25.776526 env[1656]: 2023-10-02 18:49:25.612 [INFO][3756] ipam.go 155: Attempting to load block cidr=192.168.63.192/26 host="ip-172-31-16-118" Oct 2 18:49:25.776526 env[1656]: 2023-10-02 18:49:25.621 [INFO][3756] ipam.go 160: The referenced block doesn't exist, trying to create it cidr=192.168.63.192/26 host="ip-172-31-16-118" Oct 2 18:49:25.776526 env[1656]: 2023-10-02 18:49:25.631 [INFO][3756] ipam.go 167: Wrote affinity as pending cidr=192.168.63.192/26 host="ip-172-31-16-118" Oct 2 18:49:25.776526 env[1656]: 2023-10-02 18:49:25.634 [INFO][3756] ipam.go 176: Attempting to claim the block cidr=192.168.63.192/26 host="ip-172-31-16-118" Oct 2 18:49:25.776526 env[1656]: 2023-10-02 18:49:25.635 [INFO][3756] ipam_block_reader_writer.go 223: Attempting to create a new block host="ip-172-31-16-118" subnet=192.168.63.192/26 Oct 2 18:49:25.776526 env[1656]: 2023-10-02 18:49:25.643 [INFO][3756] ipam_block_reader_writer.go 264: Successfully created block Oct 2 18:49:25.776526 env[1656]: 2023-10-02 18:49:25.643 [INFO][3756] ipam_block_reader_writer.go 275: Confirming affinity host="ip-172-31-16-118" subnet=192.168.63.192/26 Oct 2 18:49:25.776526 env[1656]: 2023-10-02 18:49:25.650 [INFO][3756] ipam_block_reader_writer.go 290: Successfully confirmed affinity host="ip-172-31-16-118" subnet=192.168.63.192/26 Oct 2 18:49:25.776526 env[1656]: 2023-10-02 18:49:25.651 [INFO][3756] ipam.go 585: Block '192.168.63.192/26' has 64 free ips which is more than 1 ips required. host="ip-172-31-16-118" subnet=192.168.63.192/26 Oct 2 18:49:25.776526 env[1656]: 2023-10-02 18:49:25.651 [INFO][3756] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.63.192/26 handle="k8s-pod-network.fe4430a55e218aeb0fee0fd13e4dd5c58231a339ee3cb6b4ffd2562b4d4888e7" host="ip-172-31-16-118" Oct 2 18:49:25.776526 env[1656]: 2023-10-02 18:49:25.655 [INFO][3756] ipam.go 1682: Creating new handle: k8s-pod-network.fe4430a55e218aeb0fee0fd13e4dd5c58231a339ee3cb6b4ffd2562b4d4888e7 Oct 2 18:49:25.776526 env[1656]: 2023-10-02 18:49:25.674 [INFO][3756] ipam.go 1203: Writing block in order to claim IPs block=192.168.63.192/26 handle="k8s-pod-network.fe4430a55e218aeb0fee0fd13e4dd5c58231a339ee3cb6b4ffd2562b4d4888e7" host="ip-172-31-16-118" Oct 2 18:49:25.778423 env[1656]: 2023-10-02 18:49:25.689 [INFO][3756] ipam.go 1216: Successfully claimed IPs: [192.168.63.192/26] block=192.168.63.192/26 handle="k8s-pod-network.fe4430a55e218aeb0fee0fd13e4dd5c58231a339ee3cb6b4ffd2562b4d4888e7" host="ip-172-31-16-118" Oct 2 18:49:25.778423 env[1656]: 2023-10-02 18:49:25.690 [INFO][3756] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.63.192/26] handle="k8s-pod-network.fe4430a55e218aeb0fee0fd13e4dd5c58231a339ee3cb6b4ffd2562b4d4888e7" host="ip-172-31-16-118" Oct 2 18:49:25.778423 env[1656]: time="2023-10-02T18:49:25Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 18:49:25.778423 env[1656]: 2023-10-02 18:49:25.690 [INFO][3756] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.63.192/26] IPv6=[] ContainerID="fe4430a55e218aeb0fee0fd13e4dd5c58231a339ee3cb6b4ffd2562b4d4888e7" HandleID="k8s-pod-network.fe4430a55e218aeb0fee0fd13e4dd5c58231a339ee3cb6b4ffd2562b4d4888e7" Workload="ip--172--31--16--118-k8s-calico--kube--controllers--69d9c784fb--6m86b-eth0" Oct 2 18:49:25.778423 env[1656]: 2023-10-02 18:49:25.692 [INFO][3727] k8s.go 383: Populated endpoint ContainerID="fe4430a55e218aeb0fee0fd13e4dd5c58231a339ee3cb6b4ffd2562b4d4888e7" Namespace="calico-system" Pod="calico-kube-controllers-69d9c784fb-6m86b" WorkloadEndpoint="ip--172--31--16--118-k8s-calico--kube--controllers--69d9c784fb--6m86b-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--16--118-k8s-calico--kube--controllers--69d9c784fb--6m86b-eth0", GenerateName:"calico-kube-controllers-69d9c784fb-", Namespace:"calico-system", SelfLink:"", UID:"8aedc893-9d11-4da8-9106-5f317e40166d", ResourceVersion:"644", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 18, 49, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"69d9c784fb", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-16-118", ContainerID:"", Pod:"calico-kube-controllers-69d9c784fb-6m86b", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.63.192/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali31c36855ec9", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 18:49:25.778423 env[1656]: 2023-10-02 18:49:25.693 [INFO][3727] k8s.go 384: Calico CNI using IPs: [192.168.63.192/32] ContainerID="fe4430a55e218aeb0fee0fd13e4dd5c58231a339ee3cb6b4ffd2562b4d4888e7" Namespace="calico-system" Pod="calico-kube-controllers-69d9c784fb-6m86b" WorkloadEndpoint="ip--172--31--16--118-k8s-calico--kube--controllers--69d9c784fb--6m86b-eth0" Oct 2 18:49:25.778423 env[1656]: 2023-10-02 18:49:25.701 [INFO][3727] dataplane_linux.go 68: Setting the host side veth name to cali31c36855ec9 ContainerID="fe4430a55e218aeb0fee0fd13e4dd5c58231a339ee3cb6b4ffd2562b4d4888e7" Namespace="calico-system" Pod="calico-kube-controllers-69d9c784fb-6m86b" WorkloadEndpoint="ip--172--31--16--118-k8s-calico--kube--controllers--69d9c784fb--6m86b-eth0" Oct 2 18:49:25.778423 env[1656]: 2023-10-02 18:49:25.723 [INFO][3727] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="fe4430a55e218aeb0fee0fd13e4dd5c58231a339ee3cb6b4ffd2562b4d4888e7" Namespace="calico-system" Pod="calico-kube-controllers-69d9c784fb-6m86b" WorkloadEndpoint="ip--172--31--16--118-k8s-calico--kube--controllers--69d9c784fb--6m86b-eth0" Oct 2 18:49:25.778423 env[1656]: 2023-10-02 18:49:25.742 [INFO][3727] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="fe4430a55e218aeb0fee0fd13e4dd5c58231a339ee3cb6b4ffd2562b4d4888e7" Namespace="calico-system" Pod="calico-kube-controllers-69d9c784fb-6m86b" WorkloadEndpoint="ip--172--31--16--118-k8s-calico--kube--controllers--69d9c784fb--6m86b-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--16--118-k8s-calico--kube--controllers--69d9c784fb--6m86b-eth0", GenerateName:"calico-kube-controllers-69d9c784fb-", Namespace:"calico-system", SelfLink:"", UID:"8aedc893-9d11-4da8-9106-5f317e40166d", ResourceVersion:"644", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 18, 49, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"69d9c784fb", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-16-118", ContainerID:"fe4430a55e218aeb0fee0fd13e4dd5c58231a339ee3cb6b4ffd2562b4d4888e7", Pod:"calico-kube-controllers-69d9c784fb-6m86b", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.63.192/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali31c36855ec9", MAC:"02:04:d7:18:d3:65", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 18:49:25.778423 env[1656]: 2023-10-02 18:49:25.768 [INFO][3727] k8s.go 489: Wrote updated endpoint to datastore ContainerID="fe4430a55e218aeb0fee0fd13e4dd5c58231a339ee3cb6b4ffd2562b4d4888e7" Namespace="calico-system" Pod="calico-kube-controllers-69d9c784fb-6m86b" WorkloadEndpoint="ip--172--31--16--118-k8s-calico--kube--controllers--69d9c784fb--6m86b-eth0" Oct 2 18:49:25.827596 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calib52fc963c3a: link becomes ready Oct 2 18:49:25.838633 systemd-networkd[1457]: calib52fc963c3a: Link UP Oct 2 18:49:25.838647 systemd-networkd[1457]: calib52fc963c3a: Gained carrier Oct 2 18:49:25.872701 env[1656]: 2023-10-02 18:49:25.383 [INFO][3764] utils.go 108: File /var/lib/calico/mtu does not exist Oct 2 18:49:25.872701 env[1656]: 2023-10-02 18:49:25.439 [INFO][3764] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--16--118-k8s-csi--node--driver--2xm2w-eth0 csi-node-driver- calico-system e6ba647d-27de-403d-bc1a-97cd30c5337c 646 0 2023-10-02 18:49:24 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:fd56fb8dc k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s ip-172-31-16-118 csi-node-driver-2xm2w eth0 default [] [] [kns.calico-system ksa.calico-system.default] calib52fc963c3a [] []}} ContainerID="be99f911e7999f4558f6c2a778104cba788b70776a61a0a8e7623a125b040b55" Namespace="calico-system" Pod="csi-node-driver-2xm2w" WorkloadEndpoint="ip--172--31--16--118-k8s-csi--node--driver--2xm2w-" Oct 2 18:49:25.872701 env[1656]: 2023-10-02 18:49:25.439 [INFO][3764] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="be99f911e7999f4558f6c2a778104cba788b70776a61a0a8e7623a125b040b55" Namespace="calico-system" Pod="csi-node-driver-2xm2w" WorkloadEndpoint="ip--172--31--16--118-k8s-csi--node--driver--2xm2w-eth0" Oct 2 18:49:25.872701 env[1656]: 2023-10-02 18:49:25.560 [INFO][3778] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="be99f911e7999f4558f6c2a778104cba788b70776a61a0a8e7623a125b040b55" HandleID="k8s-pod-network.be99f911e7999f4558f6c2a778104cba788b70776a61a0a8e7623a125b040b55" Workload="ip--172--31--16--118-k8s-csi--node--driver--2xm2w-eth0" Oct 2 18:49:25.872701 env[1656]: 2023-10-02 18:49:25.605 [INFO][3778] ipam_plugin.go 269: Auto assigning IP ContainerID="be99f911e7999f4558f6c2a778104cba788b70776a61a0a8e7623a125b040b55" HandleID="k8s-pod-network.be99f911e7999f4558f6c2a778104cba788b70776a61a0a8e7623a125b040b55" Workload="ip--172--31--16--118-k8s-csi--node--driver--2xm2w-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x400050b470), Attrs:map[string]string{"namespace":"calico-system", "node":"ip-172-31-16-118", "pod":"csi-node-driver-2xm2w", "timestamp":"2023-10-02 18:49:25.560659168 +0000 UTC"}, Hostname:"ip-172-31-16-118", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 2 18:49:25.872701 env[1656]: time="2023-10-02T18:49:25Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 18:49:25.872701 env[1656]: time="2023-10-02T18:49:25Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 18:49:25.872701 env[1656]: 2023-10-02 18:49:25.690 [INFO][3778] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-16-118' Oct 2 18:49:25.872701 env[1656]: 2023-10-02 18:49:25.697 [INFO][3778] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.be99f911e7999f4558f6c2a778104cba788b70776a61a0a8e7623a125b040b55" host="ip-172-31-16-118" Oct 2 18:49:25.872701 env[1656]: 2023-10-02 18:49:25.723 [INFO][3778] ipam.go 372: Looking up existing affinities for host host="ip-172-31-16-118" Oct 2 18:49:25.872701 env[1656]: 2023-10-02 18:49:25.744 [INFO][3778] ipam.go 489: Trying affinity for 192.168.63.192/26 host="ip-172-31-16-118" Oct 2 18:49:25.872701 env[1656]: 2023-10-02 18:49:25.775 [INFO][3778] ipam.go 155: Attempting to load block cidr=192.168.63.192/26 host="ip-172-31-16-118" Oct 2 18:49:25.872701 env[1656]: 2023-10-02 18:49:25.784 [INFO][3778] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.63.192/26 host="ip-172-31-16-118" Oct 2 18:49:25.872701 env[1656]: 2023-10-02 18:49:25.784 [INFO][3778] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.63.192/26 handle="k8s-pod-network.be99f911e7999f4558f6c2a778104cba788b70776a61a0a8e7623a125b040b55" host="ip-172-31-16-118" Oct 2 18:49:25.872701 env[1656]: 2023-10-02 18:49:25.789 [INFO][3778] ipam.go 1682: Creating new handle: k8s-pod-network.be99f911e7999f4558f6c2a778104cba788b70776a61a0a8e7623a125b040b55 Oct 2 18:49:25.872701 env[1656]: 2023-10-02 18:49:25.799 [INFO][3778] ipam.go 1203: Writing block in order to claim IPs block=192.168.63.192/26 handle="k8s-pod-network.be99f911e7999f4558f6c2a778104cba788b70776a61a0a8e7623a125b040b55" host="ip-172-31-16-118" Oct 2 18:49:25.872701 env[1656]: 2023-10-02 18:49:25.809 [INFO][3778] ipam.go 1216: Successfully claimed IPs: [192.168.63.194/26] block=192.168.63.192/26 handle="k8s-pod-network.be99f911e7999f4558f6c2a778104cba788b70776a61a0a8e7623a125b040b55" host="ip-172-31-16-118" Oct 2 18:49:25.872701 env[1656]: 2023-10-02 18:49:25.810 [INFO][3778] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.63.194/26] handle="k8s-pod-network.be99f911e7999f4558f6c2a778104cba788b70776a61a0a8e7623a125b040b55" host="ip-172-31-16-118" Oct 2 18:49:25.872701 env[1656]: time="2023-10-02T18:49:25Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 18:49:25.872701 env[1656]: 2023-10-02 18:49:25.810 [INFO][3778] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.63.194/26] IPv6=[] ContainerID="be99f911e7999f4558f6c2a778104cba788b70776a61a0a8e7623a125b040b55" HandleID="k8s-pod-network.be99f911e7999f4558f6c2a778104cba788b70776a61a0a8e7623a125b040b55" Workload="ip--172--31--16--118-k8s-csi--node--driver--2xm2w-eth0" Oct 2 18:49:25.874232 env[1656]: 2023-10-02 18:49:25.818 [INFO][3764] k8s.go 383: Populated endpoint ContainerID="be99f911e7999f4558f6c2a778104cba788b70776a61a0a8e7623a125b040b55" Namespace="calico-system" Pod="csi-node-driver-2xm2w" WorkloadEndpoint="ip--172--31--16--118-k8s-csi--node--driver--2xm2w-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--16--118-k8s-csi--node--driver--2xm2w-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"e6ba647d-27de-403d-bc1a-97cd30c5337c", ResourceVersion:"646", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 18, 49, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"fd56fb8dc", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-16-118", ContainerID:"", Pod:"csi-node-driver-2xm2w", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.63.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calib52fc963c3a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 18:49:25.874232 env[1656]: 2023-10-02 18:49:25.818 [INFO][3764] k8s.go 384: Calico CNI using IPs: [192.168.63.194/32] ContainerID="be99f911e7999f4558f6c2a778104cba788b70776a61a0a8e7623a125b040b55" Namespace="calico-system" Pod="csi-node-driver-2xm2w" WorkloadEndpoint="ip--172--31--16--118-k8s-csi--node--driver--2xm2w-eth0" Oct 2 18:49:25.874232 env[1656]: 2023-10-02 18:49:25.818 [INFO][3764] dataplane_linux.go 68: Setting the host side veth name to calib52fc963c3a ContainerID="be99f911e7999f4558f6c2a778104cba788b70776a61a0a8e7623a125b040b55" Namespace="calico-system" Pod="csi-node-driver-2xm2w" WorkloadEndpoint="ip--172--31--16--118-k8s-csi--node--driver--2xm2w-eth0" Oct 2 18:49:25.874232 env[1656]: 2023-10-02 18:49:25.827 [INFO][3764] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="be99f911e7999f4558f6c2a778104cba788b70776a61a0a8e7623a125b040b55" Namespace="calico-system" Pod="csi-node-driver-2xm2w" WorkloadEndpoint="ip--172--31--16--118-k8s-csi--node--driver--2xm2w-eth0" Oct 2 18:49:25.874232 env[1656]: 2023-10-02 18:49:25.840 [INFO][3764] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="be99f911e7999f4558f6c2a778104cba788b70776a61a0a8e7623a125b040b55" Namespace="calico-system" Pod="csi-node-driver-2xm2w" WorkloadEndpoint="ip--172--31--16--118-k8s-csi--node--driver--2xm2w-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--16--118-k8s-csi--node--driver--2xm2w-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"e6ba647d-27de-403d-bc1a-97cd30c5337c", ResourceVersion:"646", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 18, 49, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"fd56fb8dc", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-16-118", ContainerID:"be99f911e7999f4558f6c2a778104cba788b70776a61a0a8e7623a125b040b55", Pod:"csi-node-driver-2xm2w", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.63.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calib52fc963c3a", MAC:"7e:2f:d3:6d:96:90", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 18:49:25.874232 env[1656]: 2023-10-02 18:49:25.867 [INFO][3764] k8s.go 489: Wrote updated endpoint to datastore ContainerID="be99f911e7999f4558f6c2a778104cba788b70776a61a0a8e7623a125b040b55" Namespace="calico-system" Pod="csi-node-driver-2xm2w" WorkloadEndpoint="ip--172--31--16--118-k8s-csi--node--driver--2xm2w-eth0" Oct 2 18:49:25.899642 env[1656]: time="2023-10-02T18:49:25.897813260Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 18:49:25.899642 env[1656]: time="2023-10-02T18:49:25.897957152Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 18:49:25.899642 env[1656]: time="2023-10-02T18:49:25.897985556Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 18:49:25.899642 env[1656]: time="2023-10-02T18:49:25.898723991Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/fe4430a55e218aeb0fee0fd13e4dd5c58231a339ee3cb6b4ffd2562b4d4888e7 pid=3805 runtime=io.containerd.runc.v2 Oct 2 18:49:25.985586 systemd[1]: Started cri-containerd-fe4430a55e218aeb0fee0fd13e4dd5c58231a339ee3cb6b4ffd2562b4d4888e7.scope. Oct 2 18:49:26.017796 systemd[1]: run-containerd-runc-k8s.io-fe4430a55e218aeb0fee0fd13e4dd5c58231a339ee3cb6b4ffd2562b4d4888e7-runc.lrO9M7.mount: Deactivated successfully. Oct 2 18:49:26.043792 env[1656]: time="2023-10-02T18:49:26.041971430Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 18:49:26.044131 env[1656]: time="2023-10-02T18:49:26.044026427Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 18:49:26.044487 env[1656]: time="2023-10-02T18:49:26.044366951Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 18:49:26.048078 env[1656]: time="2023-10-02T18:49:26.047954149Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/be99f911e7999f4558f6c2a778104cba788b70776a61a0a8e7623a125b040b55 pid=3846 runtime=io.containerd.runc.v2 Oct 2 18:49:26.143904 systemd[1]: Started cri-containerd-be99f911e7999f4558f6c2a778104cba788b70776a61a0a8e7623a125b040b55.scope. Oct 2 18:49:26.236000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:26.236000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:26.236000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:26.236000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:26.236000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:26.236000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:26.236000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:26.236000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:26.236000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:26.237000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:26.237000 audit: BPF prog-id=154 op=LOAD Oct 2 18:49:26.237000 audit[3825]: AVC avc: denied { bpf } for pid=3825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:26.237000 audit[3825]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=3805 pid=3825 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:26.237000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665343433306135356532313861656230666565306664313365346464 Oct 2 18:49:26.237000 audit[3825]: AVC avc: denied { perfmon } for pid=3825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:26.237000 audit[3825]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=3805 pid=3825 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:26.237000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665343433306135356532313861656230666565306664313365346464 Oct 2 18:49:26.237000 audit[3825]: AVC avc: denied { bpf } for pid=3825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:26.237000 audit[3825]: AVC avc: denied { bpf } for pid=3825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:26.237000 audit[3825]: AVC avc: denied { bpf } for pid=3825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:26.237000 audit[3825]: AVC avc: denied { perfmon } for pid=3825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:26.237000 audit[3825]: AVC avc: denied { perfmon } for pid=3825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:26.237000 audit[3825]: AVC avc: denied { perfmon } for pid=3825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:26.237000 audit[3825]: AVC avc: denied { perfmon } for pid=3825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:26.237000 audit[3825]: AVC avc: denied { perfmon } for pid=3825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:26.237000 audit[3825]: AVC avc: denied { bpf } for pid=3825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:26.237000 audit[3825]: AVC avc: denied { bpf } for pid=3825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:26.237000 audit: BPF prog-id=155 op=LOAD Oct 2 18:49:26.237000 audit[3825]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=3805 pid=3825 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:26.237000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665343433306135356532313861656230666565306664313365346464 Oct 2 18:49:26.238000 audit[3825]: AVC avc: denied { bpf } for pid=3825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:26.238000 audit[3825]: AVC avc: denied { bpf } for pid=3825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:26.238000 audit[3825]: AVC avc: denied { perfmon } for pid=3825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:26.238000 audit[3825]: AVC avc: denied { perfmon } for pid=3825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:26.238000 audit[3825]: AVC avc: denied { perfmon } for pid=3825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:26.238000 audit[3825]: AVC avc: denied { perfmon } for pid=3825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:26.238000 audit[3825]: AVC avc: denied { perfmon } for pid=3825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:26.238000 audit[3825]: AVC avc: denied { bpf } for pid=3825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:26.238000 audit[3825]: AVC avc: denied { bpf } for pid=3825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:26.238000 audit: BPF prog-id=156 op=LOAD Oct 2 18:49:26.238000 audit[3825]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=3805 pid=3825 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:26.238000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665343433306135356532313861656230666565306664313365346464 Oct 2 18:49:26.238000 audit: BPF prog-id=156 op=UNLOAD Oct 2 18:49:26.238000 audit: BPF prog-id=155 op=UNLOAD Oct 2 18:49:26.238000 audit[3825]: AVC avc: denied { bpf } for pid=3825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:26.238000 audit[3825]: AVC avc: denied { bpf } for pid=3825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:26.238000 audit[3825]: AVC avc: denied { bpf } for pid=3825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:26.238000 audit[3825]: AVC avc: denied { perfmon } for pid=3825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:26.238000 audit[3825]: AVC avc: denied { perfmon } for pid=3825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:26.238000 audit[3825]: AVC avc: denied { perfmon } for pid=3825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:26.238000 audit[3825]: AVC avc: denied { perfmon } for pid=3825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:26.238000 audit[3825]: AVC avc: denied { perfmon } for pid=3825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:26.238000 audit[3825]: AVC avc: denied { bpf } for pid=3825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:26.238000 audit[3825]: AVC avc: denied { bpf } for pid=3825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:26.238000 audit: BPF prog-id=157 op=LOAD Oct 2 18:49:26.238000 audit[3825]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=3805 pid=3825 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:26.238000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665343433306135356532313861656230666565306664313365346464 Oct 2 18:49:26.249000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:26.249000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:26.249000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:26.249000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:26.249000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:26.249000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:26.249000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:26.249000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:26.249000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:26.249000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:26.249000 audit: BPF prog-id=158 op=LOAD Oct 2 18:49:26.251000 audit[3861]: AVC avc: denied { bpf } for pid=3861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:26.251000 audit[3861]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3846 pid=3861 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:26.251000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265393966393131653739393966343535386636633261373738313034 Oct 2 18:49:26.251000 audit[3861]: AVC avc: denied { perfmon } for pid=3861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:26.251000 audit[3861]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3846 pid=3861 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:26.251000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265393966393131653739393966343535386636633261373738313034 Oct 2 18:49:26.252000 audit[3861]: AVC avc: denied { bpf } for pid=3861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:26.252000 audit[3861]: AVC avc: denied { bpf } for pid=3861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:26.252000 audit[3861]: AVC avc: denied { bpf } for pid=3861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:26.252000 audit[3861]: AVC avc: denied { perfmon } for pid=3861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:26.252000 audit[3861]: AVC avc: denied { perfmon } for pid=3861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:26.252000 audit[3861]: AVC avc: denied { perfmon } for pid=3861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:26.252000 audit[3861]: AVC avc: denied { perfmon } for pid=3861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:26.252000 audit[3861]: AVC avc: denied { perfmon } for pid=3861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:26.252000 audit[3861]: AVC avc: denied { bpf } for pid=3861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:26.252000 audit[3861]: AVC avc: denied { bpf } for pid=3861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:26.252000 audit: BPF prog-id=159 op=LOAD Oct 2 18:49:26.252000 audit[3861]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3846 pid=3861 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:26.252000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265393966393131653739393966343535386636633261373738313034 Oct 2 18:49:26.252000 audit[3861]: AVC avc: denied { bpf } for pid=3861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:26.252000 audit[3861]: AVC avc: denied { bpf } for pid=3861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:26.252000 audit[3861]: AVC avc: denied { perfmon } for pid=3861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:26.252000 audit[3861]: AVC avc: denied { perfmon } for pid=3861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:26.252000 audit[3861]: AVC avc: denied { perfmon } for pid=3861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:26.252000 audit[3861]: AVC avc: denied { perfmon } for pid=3861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:26.252000 audit[3861]: AVC avc: denied { perfmon } for pid=3861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:26.252000 audit[3861]: AVC avc: denied { bpf } for pid=3861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:26.252000 audit[3861]: AVC avc: denied { bpf } for pid=3861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:26.252000 audit: BPF prog-id=160 op=LOAD Oct 2 18:49:26.252000 audit[3861]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3846 pid=3861 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:26.252000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265393966393131653739393966343535386636633261373738313034 Oct 2 18:49:26.252000 audit: BPF prog-id=160 op=UNLOAD Oct 2 18:49:26.252000 audit: BPF prog-id=159 op=UNLOAD Oct 2 18:49:26.252000 audit[3861]: AVC avc: denied { bpf } for pid=3861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:26.252000 audit[3861]: AVC avc: denied { bpf } for pid=3861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:26.252000 audit[3861]: AVC avc: denied { bpf } for pid=3861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:26.252000 audit[3861]: AVC avc: denied { perfmon } for pid=3861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:26.252000 audit[3861]: AVC avc: denied { perfmon } for pid=3861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:26.252000 audit[3861]: AVC avc: denied { perfmon } for pid=3861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:26.252000 audit[3861]: AVC avc: denied { perfmon } for pid=3861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:26.252000 audit[3861]: AVC avc: denied { perfmon } for pid=3861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:26.252000 audit[3861]: AVC avc: denied { bpf } for pid=3861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:26.252000 audit[3861]: AVC avc: denied { bpf } for pid=3861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:26.252000 audit: BPF prog-id=161 op=LOAD Oct 2 18:49:26.252000 audit[3861]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3846 pid=3861 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:26.252000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265393966393131653739393966343535386636633261373738313034 Oct 2 18:49:26.294620 env[1656]: time="2023-10-02T18:49:26.294540916Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-2xm2w,Uid:e6ba647d-27de-403d-bc1a-97cd30c5337c,Namespace:calico-system,Attempt:0,} returns sandbox id \"be99f911e7999f4558f6c2a778104cba788b70776a61a0a8e7623a125b040b55\"" Oct 2 18:49:26.298424 env[1656]: time="2023-10-02T18:49:26.298374146Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\"" Oct 2 18:49:26.348358 env[1656]: time="2023-10-02T18:49:26.348296893Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-69d9c784fb-6m86b,Uid:8aedc893-9d11-4da8-9106-5f317e40166d,Namespace:calico-system,Attempt:0,} returns sandbox id \"fe4430a55e218aeb0fee0fd13e4dd5c58231a339ee3cb6b4ffd2562b4d4888e7\"" Oct 2 18:49:26.400109 env[1656]: time="2023-10-02T18:49:26.400051515Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-565d847f94-4ghb7,Uid:33f9fc2a-153b-4694-b118-c7eaee2e867d,Namespace:kube-system,Attempt:0,}" Oct 2 18:49:26.430869 env[1656]: time="2023-10-02T18:49:26.430801861Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-565d847f94-nn229,Uid:d1a342a2-5851-4010-a0e5-12e4e52014f4,Namespace:kube-system,Attempt:0,}" Oct 2 18:49:26.532076 env[1656]: time="2023-10-02T18:49:26.531892674Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 18:49:26.535148 env[1656]: time="2023-10-02T18:49:26.535021120Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 18:49:26.539520 kubelet[2886]: E1002 18:49:26.535881 2886 remote_image.go:242] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 18:49:26.539520 kubelet[2886]: E1002 18:49:26.535990 2886 kuberuntime_image.go:51] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 18:49:26.539900 kubelet[2886]: E1002 18:49:26.536432 2886 kuberuntime_manager.go:862] container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.25.0,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:etccalico,ReadOnly:false,MountPath:/etc/calico,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,},VolumeMount{Name:kube-api-access-jtrz6,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod csi-node-driver-2xm2w_calico-system(e6ba647d-27de-403d-bc1a-97cd30c5337c): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/csi:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/csi:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 18:49:26.546073 env[1656]: time="2023-10-02T18:49:26.546007696Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.25.0\"" Oct 2 18:49:26.896589 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Oct 2 18:49:26.896956 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calic95504100a5: link becomes ready Oct 2 18:49:26.913531 systemd-networkd[1457]: calic95504100a5: Link UP Oct 2 18:49:26.913547 systemd-networkd[1457]: calic95504100a5: Gained carrier Oct 2 18:49:26.933856 env[1656]: 2023-10-02 18:49:26.582 [INFO][3926] utils.go 108: File /var/lib/calico/mtu does not exist Oct 2 18:49:26.933856 env[1656]: 2023-10-02 18:49:26.613 [INFO][3926] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--16--118-k8s-coredns--565d847f94--4ghb7-eth0 coredns-565d847f94- kube-system 33f9fc2a-153b-4694-b118-c7eaee2e867d 639 0 2023-10-02 18:48:55 +0000 UTC map[k8s-app:kube-dns pod-template-hash:565d847f94 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ip-172-31-16-118 coredns-565d847f94-4ghb7 eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calic95504100a5 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="597aca1320cff4d47f0740d48c19aef77087cdcffa92311cb9babea63204e5c0" Namespace="kube-system" Pod="coredns-565d847f94-4ghb7" WorkloadEndpoint="ip--172--31--16--118-k8s-coredns--565d847f94--4ghb7-" Oct 2 18:49:26.933856 env[1656]: 2023-10-02 18:49:26.614 [INFO][3926] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="597aca1320cff4d47f0740d48c19aef77087cdcffa92311cb9babea63204e5c0" Namespace="kube-system" Pod="coredns-565d847f94-4ghb7" WorkloadEndpoint="ip--172--31--16--118-k8s-coredns--565d847f94--4ghb7-eth0" Oct 2 18:49:26.933856 env[1656]: 2023-10-02 18:49:26.784 [INFO][3967] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="597aca1320cff4d47f0740d48c19aef77087cdcffa92311cb9babea63204e5c0" HandleID="k8s-pod-network.597aca1320cff4d47f0740d48c19aef77087cdcffa92311cb9babea63204e5c0" Workload="ip--172--31--16--118-k8s-coredns--565d847f94--4ghb7-eth0" Oct 2 18:49:26.933856 env[1656]: 2023-10-02 18:49:26.810 [INFO][3967] ipam_plugin.go 269: Auto assigning IP ContainerID="597aca1320cff4d47f0740d48c19aef77087cdcffa92311cb9babea63204e5c0" HandleID="k8s-pod-network.597aca1320cff4d47f0740d48c19aef77087cdcffa92311cb9babea63204e5c0" Workload="ip--172--31--16--118-k8s-coredns--565d847f94--4ghb7-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000539150), Attrs:map[string]string{"namespace":"kube-system", "node":"ip-172-31-16-118", "pod":"coredns-565d847f94-4ghb7", "timestamp":"2023-10-02 18:49:26.784605325 +0000 UTC"}, Hostname:"ip-172-31-16-118", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 2 18:49:26.933856 env[1656]: time="2023-10-02T18:49:26Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 18:49:26.933856 env[1656]: time="2023-10-02T18:49:26Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 18:49:26.933856 env[1656]: 2023-10-02 18:49:26.811 [INFO][3967] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-16-118' Oct 2 18:49:26.933856 env[1656]: 2023-10-02 18:49:26.817 [INFO][3967] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.597aca1320cff4d47f0740d48c19aef77087cdcffa92311cb9babea63204e5c0" host="ip-172-31-16-118" Oct 2 18:49:26.933856 env[1656]: 2023-10-02 18:49:26.829 [INFO][3967] ipam.go 372: Looking up existing affinities for host host="ip-172-31-16-118" Oct 2 18:49:26.933856 env[1656]: 2023-10-02 18:49:26.850 [INFO][3967] ipam.go 489: Trying affinity for 192.168.63.192/26 host="ip-172-31-16-118" Oct 2 18:49:26.933856 env[1656]: 2023-10-02 18:49:26.855 [INFO][3967] ipam.go 155: Attempting to load block cidr=192.168.63.192/26 host="ip-172-31-16-118" Oct 2 18:49:26.933856 env[1656]: 2023-10-02 18:49:26.864 [INFO][3967] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.63.192/26 host="ip-172-31-16-118" Oct 2 18:49:26.933856 env[1656]: 2023-10-02 18:49:26.864 [INFO][3967] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.63.192/26 handle="k8s-pod-network.597aca1320cff4d47f0740d48c19aef77087cdcffa92311cb9babea63204e5c0" host="ip-172-31-16-118" Oct 2 18:49:26.933856 env[1656]: 2023-10-02 18:49:26.867 [INFO][3967] ipam.go 1682: Creating new handle: k8s-pod-network.597aca1320cff4d47f0740d48c19aef77087cdcffa92311cb9babea63204e5c0 Oct 2 18:49:26.933856 env[1656]: 2023-10-02 18:49:26.874 [INFO][3967] ipam.go 1203: Writing block in order to claim IPs block=192.168.63.192/26 handle="k8s-pod-network.597aca1320cff4d47f0740d48c19aef77087cdcffa92311cb9babea63204e5c0" host="ip-172-31-16-118" Oct 2 18:49:26.933856 env[1656]: 2023-10-02 18:49:26.884 [INFO][3967] ipam.go 1216: Successfully claimed IPs: [192.168.63.195/26] block=192.168.63.192/26 handle="k8s-pod-network.597aca1320cff4d47f0740d48c19aef77087cdcffa92311cb9babea63204e5c0" host="ip-172-31-16-118" Oct 2 18:49:26.933856 env[1656]: 2023-10-02 18:49:26.884 [INFO][3967] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.63.195/26] handle="k8s-pod-network.597aca1320cff4d47f0740d48c19aef77087cdcffa92311cb9babea63204e5c0" host="ip-172-31-16-118" Oct 2 18:49:26.933856 env[1656]: time="2023-10-02T18:49:26Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 18:49:26.933856 env[1656]: 2023-10-02 18:49:26.885 [INFO][3967] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.63.195/26] IPv6=[] ContainerID="597aca1320cff4d47f0740d48c19aef77087cdcffa92311cb9babea63204e5c0" HandleID="k8s-pod-network.597aca1320cff4d47f0740d48c19aef77087cdcffa92311cb9babea63204e5c0" Workload="ip--172--31--16--118-k8s-coredns--565d847f94--4ghb7-eth0" Oct 2 18:49:26.935298 env[1656]: 2023-10-02 18:49:26.889 [INFO][3926] k8s.go 383: Populated endpoint ContainerID="597aca1320cff4d47f0740d48c19aef77087cdcffa92311cb9babea63204e5c0" Namespace="kube-system" Pod="coredns-565d847f94-4ghb7" WorkloadEndpoint="ip--172--31--16--118-k8s-coredns--565d847f94--4ghb7-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--16--118-k8s-coredns--565d847f94--4ghb7-eth0", GenerateName:"coredns-565d847f94-", Namespace:"kube-system", SelfLink:"", UID:"33f9fc2a-153b-4694-b118-c7eaee2e867d", ResourceVersion:"639", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 18, 48, 55, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"565d847f94", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-16-118", ContainerID:"", Pod:"coredns-565d847f94-4ghb7", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.63.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calic95504100a5", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 18:49:26.935298 env[1656]: 2023-10-02 18:49:26.889 [INFO][3926] k8s.go 384: Calico CNI using IPs: [192.168.63.195/32] ContainerID="597aca1320cff4d47f0740d48c19aef77087cdcffa92311cb9babea63204e5c0" Namespace="kube-system" Pod="coredns-565d847f94-4ghb7" WorkloadEndpoint="ip--172--31--16--118-k8s-coredns--565d847f94--4ghb7-eth0" Oct 2 18:49:26.935298 env[1656]: 2023-10-02 18:49:26.889 [INFO][3926] dataplane_linux.go 68: Setting the host side veth name to calic95504100a5 ContainerID="597aca1320cff4d47f0740d48c19aef77087cdcffa92311cb9babea63204e5c0" Namespace="kube-system" Pod="coredns-565d847f94-4ghb7" WorkloadEndpoint="ip--172--31--16--118-k8s-coredns--565d847f94--4ghb7-eth0" Oct 2 18:49:26.935298 env[1656]: 2023-10-02 18:49:26.897 [INFO][3926] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="597aca1320cff4d47f0740d48c19aef77087cdcffa92311cb9babea63204e5c0" Namespace="kube-system" Pod="coredns-565d847f94-4ghb7" WorkloadEndpoint="ip--172--31--16--118-k8s-coredns--565d847f94--4ghb7-eth0" Oct 2 18:49:26.935298 env[1656]: 2023-10-02 18:49:26.913 [INFO][3926] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="597aca1320cff4d47f0740d48c19aef77087cdcffa92311cb9babea63204e5c0" Namespace="kube-system" Pod="coredns-565d847f94-4ghb7" WorkloadEndpoint="ip--172--31--16--118-k8s-coredns--565d847f94--4ghb7-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--16--118-k8s-coredns--565d847f94--4ghb7-eth0", GenerateName:"coredns-565d847f94-", Namespace:"kube-system", SelfLink:"", UID:"33f9fc2a-153b-4694-b118-c7eaee2e867d", ResourceVersion:"639", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 18, 48, 55, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"565d847f94", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-16-118", ContainerID:"597aca1320cff4d47f0740d48c19aef77087cdcffa92311cb9babea63204e5c0", Pod:"coredns-565d847f94-4ghb7", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.63.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calic95504100a5", MAC:"7e:21:6b:9a:e6:a6", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 18:49:26.935298 env[1656]: 2023-10-02 18:49:26.928 [INFO][3926] k8s.go 489: Wrote updated endpoint to datastore ContainerID="597aca1320cff4d47f0740d48c19aef77087cdcffa92311cb9babea63204e5c0" Namespace="kube-system" Pod="coredns-565d847f94-4ghb7" WorkloadEndpoint="ip--172--31--16--118-k8s-coredns--565d847f94--4ghb7-eth0" Oct 2 18:49:27.003664 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali831fdad774b: link becomes ready Oct 2 18:49:27.023886 systemd-networkd[1457]: cali831fdad774b: Link UP Oct 2 18:49:27.023903 systemd-networkd[1457]: cali831fdad774b: Gained carrier Oct 2 18:49:27.039042 env[1656]: time="2023-10-02T18:49:27.037581878Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 18:49:27.039042 env[1656]: time="2023-10-02T18:49:27.037675913Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 18:49:27.039042 env[1656]: time="2023-10-02T18:49:27.037703862Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 18:49:27.039042 env[1656]: time="2023-10-02T18:49:27.038371756Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/597aca1320cff4d47f0740d48c19aef77087cdcffa92311cb9babea63204e5c0 pid=4001 runtime=io.containerd.runc.v2 Oct 2 18:49:27.047749 env[1656]: 2023-10-02 18:49:26.609 [INFO][3943] utils.go 108: File /var/lib/calico/mtu does not exist Oct 2 18:49:27.047749 env[1656]: 2023-10-02 18:49:26.656 [INFO][3943] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--16--118-k8s-coredns--565d847f94--nn229-eth0 coredns-565d847f94- kube-system d1a342a2-5851-4010-a0e5-12e4e52014f4 645 0 2023-10-02 18:48:55 +0000 UTC map[k8s-app:kube-dns pod-template-hash:565d847f94 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ip-172-31-16-118 coredns-565d847f94-nn229 eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali831fdad774b [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="89dc52c81d96ec3b03119d147fc4b9ffd4cfb460c676485a7a7433cb36a7a02e" Namespace="kube-system" Pod="coredns-565d847f94-nn229" WorkloadEndpoint="ip--172--31--16--118-k8s-coredns--565d847f94--nn229-" Oct 2 18:49:27.047749 env[1656]: 2023-10-02 18:49:26.656 [INFO][3943] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="89dc52c81d96ec3b03119d147fc4b9ffd4cfb460c676485a7a7433cb36a7a02e" Namespace="kube-system" Pod="coredns-565d847f94-nn229" WorkloadEndpoint="ip--172--31--16--118-k8s-coredns--565d847f94--nn229-eth0" Oct 2 18:49:27.047749 env[1656]: 2023-10-02 18:49:26.830 [INFO][3971] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="89dc52c81d96ec3b03119d147fc4b9ffd4cfb460c676485a7a7433cb36a7a02e" HandleID="k8s-pod-network.89dc52c81d96ec3b03119d147fc4b9ffd4cfb460c676485a7a7433cb36a7a02e" Workload="ip--172--31--16--118-k8s-coredns--565d847f94--nn229-eth0" Oct 2 18:49:27.047749 env[1656]: 2023-10-02 18:49:26.903 [INFO][3971] ipam_plugin.go 269: Auto assigning IP ContainerID="89dc52c81d96ec3b03119d147fc4b9ffd4cfb460c676485a7a7433cb36a7a02e" HandleID="k8s-pod-network.89dc52c81d96ec3b03119d147fc4b9ffd4cfb460c676485a7a7433cb36a7a02e" Workload="ip--172--31--16--118-k8s-coredns--565d847f94--nn229-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000493610), Attrs:map[string]string{"namespace":"kube-system", "node":"ip-172-31-16-118", "pod":"coredns-565d847f94-nn229", "timestamp":"2023-10-02 18:49:26.830694675 +0000 UTC"}, Hostname:"ip-172-31-16-118", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 2 18:49:27.047749 env[1656]: time="2023-10-02T18:49:26Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 18:49:27.047749 env[1656]: time="2023-10-02T18:49:26Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 18:49:27.047749 env[1656]: 2023-10-02 18:49:26.904 [INFO][3971] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-16-118' Oct 2 18:49:27.047749 env[1656]: 2023-10-02 18:49:26.910 [INFO][3971] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.89dc52c81d96ec3b03119d147fc4b9ffd4cfb460c676485a7a7433cb36a7a02e" host="ip-172-31-16-118" Oct 2 18:49:27.047749 env[1656]: 2023-10-02 18:49:26.933 [INFO][3971] ipam.go 372: Looking up existing affinities for host host="ip-172-31-16-118" Oct 2 18:49:27.047749 env[1656]: 2023-10-02 18:49:26.945 [INFO][3971] ipam.go 489: Trying affinity for 192.168.63.192/26 host="ip-172-31-16-118" Oct 2 18:49:27.047749 env[1656]: 2023-10-02 18:49:26.965 [INFO][3971] ipam.go 155: Attempting to load block cidr=192.168.63.192/26 host="ip-172-31-16-118" Oct 2 18:49:27.047749 env[1656]: 2023-10-02 18:49:26.974 [INFO][3971] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.63.192/26 host="ip-172-31-16-118" Oct 2 18:49:27.047749 env[1656]: 2023-10-02 18:49:26.974 [INFO][3971] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.63.192/26 handle="k8s-pod-network.89dc52c81d96ec3b03119d147fc4b9ffd4cfb460c676485a7a7433cb36a7a02e" host="ip-172-31-16-118" Oct 2 18:49:27.047749 env[1656]: 2023-10-02 18:49:26.977 [INFO][3971] ipam.go 1682: Creating new handle: k8s-pod-network.89dc52c81d96ec3b03119d147fc4b9ffd4cfb460c676485a7a7433cb36a7a02e Oct 2 18:49:27.047749 env[1656]: 2023-10-02 18:49:26.985 [INFO][3971] ipam.go 1203: Writing block in order to claim IPs block=192.168.63.192/26 handle="k8s-pod-network.89dc52c81d96ec3b03119d147fc4b9ffd4cfb460c676485a7a7433cb36a7a02e" host="ip-172-31-16-118" Oct 2 18:49:27.047749 env[1656]: 2023-10-02 18:49:26.993 [INFO][3971] ipam.go 1216: Successfully claimed IPs: [192.168.63.196/26] block=192.168.63.192/26 handle="k8s-pod-network.89dc52c81d96ec3b03119d147fc4b9ffd4cfb460c676485a7a7433cb36a7a02e" host="ip-172-31-16-118" Oct 2 18:49:27.047749 env[1656]: 2023-10-02 18:49:26.993 [INFO][3971] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.63.196/26] handle="k8s-pod-network.89dc52c81d96ec3b03119d147fc4b9ffd4cfb460c676485a7a7433cb36a7a02e" host="ip-172-31-16-118" Oct 2 18:49:27.047749 env[1656]: time="2023-10-02T18:49:26Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 18:49:27.047749 env[1656]: 2023-10-02 18:49:26.994 [INFO][3971] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.63.196/26] IPv6=[] ContainerID="89dc52c81d96ec3b03119d147fc4b9ffd4cfb460c676485a7a7433cb36a7a02e" HandleID="k8s-pod-network.89dc52c81d96ec3b03119d147fc4b9ffd4cfb460c676485a7a7433cb36a7a02e" Workload="ip--172--31--16--118-k8s-coredns--565d847f94--nn229-eth0" Oct 2 18:49:27.055445 env[1656]: 2023-10-02 18:49:26.998 [INFO][3943] k8s.go 383: Populated endpoint ContainerID="89dc52c81d96ec3b03119d147fc4b9ffd4cfb460c676485a7a7433cb36a7a02e" Namespace="kube-system" Pod="coredns-565d847f94-nn229" WorkloadEndpoint="ip--172--31--16--118-k8s-coredns--565d847f94--nn229-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--16--118-k8s-coredns--565d847f94--nn229-eth0", GenerateName:"coredns-565d847f94-", Namespace:"kube-system", SelfLink:"", UID:"d1a342a2-5851-4010-a0e5-12e4e52014f4", ResourceVersion:"645", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 18, 48, 55, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"565d847f94", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-16-118", ContainerID:"", Pod:"coredns-565d847f94-nn229", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.63.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali831fdad774b", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 18:49:27.055445 env[1656]: 2023-10-02 18:49:26.998 [INFO][3943] k8s.go 384: Calico CNI using IPs: [192.168.63.196/32] ContainerID="89dc52c81d96ec3b03119d147fc4b9ffd4cfb460c676485a7a7433cb36a7a02e" Namespace="kube-system" Pod="coredns-565d847f94-nn229" WorkloadEndpoint="ip--172--31--16--118-k8s-coredns--565d847f94--nn229-eth0" Oct 2 18:49:27.055445 env[1656]: 2023-10-02 18:49:26.998 [INFO][3943] dataplane_linux.go 68: Setting the host side veth name to cali831fdad774b ContainerID="89dc52c81d96ec3b03119d147fc4b9ffd4cfb460c676485a7a7433cb36a7a02e" Namespace="kube-system" Pod="coredns-565d847f94-nn229" WorkloadEndpoint="ip--172--31--16--118-k8s-coredns--565d847f94--nn229-eth0" Oct 2 18:49:27.055445 env[1656]: 2023-10-02 18:49:27.004 [INFO][3943] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="89dc52c81d96ec3b03119d147fc4b9ffd4cfb460c676485a7a7433cb36a7a02e" Namespace="kube-system" Pod="coredns-565d847f94-nn229" WorkloadEndpoint="ip--172--31--16--118-k8s-coredns--565d847f94--nn229-eth0" Oct 2 18:49:27.055445 env[1656]: 2023-10-02 18:49:27.024 [INFO][3943] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="89dc52c81d96ec3b03119d147fc4b9ffd4cfb460c676485a7a7433cb36a7a02e" Namespace="kube-system" Pod="coredns-565d847f94-nn229" WorkloadEndpoint="ip--172--31--16--118-k8s-coredns--565d847f94--nn229-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--16--118-k8s-coredns--565d847f94--nn229-eth0", GenerateName:"coredns-565d847f94-", Namespace:"kube-system", SelfLink:"", UID:"d1a342a2-5851-4010-a0e5-12e4e52014f4", ResourceVersion:"645", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 18, 48, 55, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"565d847f94", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-16-118", ContainerID:"89dc52c81d96ec3b03119d147fc4b9ffd4cfb460c676485a7a7433cb36a7a02e", Pod:"coredns-565d847f94-nn229", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.63.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali831fdad774b", MAC:"ba:18:8e:78:19:cf", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 18:49:27.055445 env[1656]: 2023-10-02 18:49:27.043 [INFO][3943] k8s.go 489: Wrote updated endpoint to datastore ContainerID="89dc52c81d96ec3b03119d147fc4b9ffd4cfb460c676485a7a7433cb36a7a02e" Namespace="kube-system" Pod="coredns-565d847f94-nn229" WorkloadEndpoint="ip--172--31--16--118-k8s-coredns--565d847f94--nn229-eth0" Oct 2 18:49:27.099049 systemd[1]: Started cri-containerd-597aca1320cff4d47f0740d48c19aef77087cdcffa92311cb9babea63204e5c0.scope. Oct 2 18:49:27.153316 env[1656]: time="2023-10-02T18:49:27.153200455Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 18:49:27.153780 env[1656]: time="2023-10-02T18:49:27.153687311Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 18:49:27.154112 env[1656]: time="2023-10-02T18:49:27.154003797Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 18:49:27.155171 env[1656]: time="2023-10-02T18:49:27.155052872Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/89dc52c81d96ec3b03119d147fc4b9ffd4cfb460c676485a7a7433cb36a7a02e pid=4039 runtime=io.containerd.runc.v2 Oct 2 18:49:27.161000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:27.161000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:27.161000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:27.161000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:27.161000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:27.161000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:27.161000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:27.161000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:27.161000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:27.162000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:27.162000 audit: BPF prog-id=162 op=LOAD Oct 2 18:49:27.177000 audit[4011]: AVC avc: denied { bpf } for pid=4011 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:27.177000 audit[4011]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=4001 pid=4011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:27.177000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539376163613133323063666634643437663037343064343863313961 Oct 2 18:49:27.178000 audit[4011]: AVC avc: denied { perfmon } for pid=4011 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:27.178000 audit[4011]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4001 pid=4011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:27.178000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539376163613133323063666634643437663037343064343863313961 Oct 2 18:49:27.179000 audit[4011]: AVC avc: denied { bpf } for pid=4011 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:27.179000 audit[4011]: AVC avc: denied { bpf } for pid=4011 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:27.179000 audit[4011]: AVC avc: denied { bpf } for pid=4011 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:27.179000 audit[4011]: AVC avc: denied { perfmon } for pid=4011 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:27.179000 audit[4011]: AVC avc: denied { perfmon } for pid=4011 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:27.179000 audit[4011]: AVC avc: denied { perfmon } for pid=4011 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:27.179000 audit[4011]: AVC avc: denied { perfmon } for pid=4011 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:27.179000 audit[4011]: AVC avc: denied { perfmon } for pid=4011 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:27.179000 audit[4011]: AVC avc: denied { bpf } for pid=4011 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:27.179000 audit[4011]: AVC avc: denied { bpf } for pid=4011 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:27.179000 audit: BPF prog-id=163 op=LOAD Oct 2 18:49:27.179000 audit[4011]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4001 pid=4011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:27.179000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539376163613133323063666634643437663037343064343863313961 Oct 2 18:49:27.181000 audit[4011]: AVC avc: denied { bpf } for pid=4011 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:27.181000 audit[4011]: AVC avc: denied { bpf } for pid=4011 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:27.181000 audit[4011]: AVC avc: denied { perfmon } for pid=4011 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:27.181000 audit[4011]: AVC avc: denied { perfmon } for pid=4011 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:27.181000 audit[4011]: AVC avc: denied { perfmon } for pid=4011 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:27.181000 audit[4011]: AVC avc: denied { perfmon } for pid=4011 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:27.181000 audit[4011]: AVC avc: denied { perfmon } for pid=4011 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:27.181000 audit[4011]: AVC avc: denied { bpf } for pid=4011 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:27.181000 audit[4011]: AVC avc: denied { bpf } for pid=4011 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:27.181000 audit: BPF prog-id=164 op=LOAD Oct 2 18:49:27.181000 audit[4011]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4001 pid=4011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:27.181000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539376163613133323063666634643437663037343064343863313961 Oct 2 18:49:27.182000 audit: BPF prog-id=164 op=UNLOAD Oct 2 18:49:27.183000 audit: BPF prog-id=163 op=UNLOAD Oct 2 18:49:27.183000 audit[4011]: AVC avc: denied { bpf } for pid=4011 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:27.183000 audit[4011]: AVC avc: denied { bpf } for pid=4011 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:27.183000 audit[4011]: AVC avc: denied { bpf } for pid=4011 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:27.183000 audit[4011]: AVC avc: denied { perfmon } for pid=4011 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:27.183000 audit[4011]: AVC avc: denied { perfmon } for pid=4011 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:27.183000 audit[4011]: AVC avc: denied { perfmon } for pid=4011 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:27.183000 audit[4011]: AVC avc: denied { perfmon } for pid=4011 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:27.183000 audit[4011]: AVC avc: denied { perfmon } for pid=4011 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:27.183000 audit[4011]: AVC avc: denied { bpf } for pid=4011 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:27.183000 audit[4011]: AVC avc: denied { bpf } for pid=4011 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:27.183000 audit: BPF prog-id=165 op=LOAD Oct 2 18:49:27.183000 audit[4011]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4001 pid=4011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:27.183000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539376163613133323063666634643437663037343064343863313961 Oct 2 18:49:27.234704 systemd[1]: Started cri-containerd-89dc52c81d96ec3b03119d147fc4b9ffd4cfb460c676485a7a7433cb36a7a02e.scope. Oct 2 18:49:27.280882 env[1656]: time="2023-10-02T18:49:27.280789126Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-565d847f94-4ghb7,Uid:33f9fc2a-153b-4694-b118-c7eaee2e867d,Namespace:kube-system,Attempt:0,} returns sandbox id \"597aca1320cff4d47f0740d48c19aef77087cdcffa92311cb9babea63204e5c0\"" Oct 2 18:49:27.289399 env[1656]: time="2023-10-02T18:49:27.289341867Z" level=info msg="CreateContainer within sandbox \"597aca1320cff4d47f0740d48c19aef77087cdcffa92311cb9babea63204e5c0\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Oct 2 18:49:27.302000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:27.302000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:27.302000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:27.302000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:27.302000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:27.302000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:27.302000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:27.302000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:27.302000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:27.302000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:27.302000 audit: BPF prog-id=166 op=LOAD Oct 2 18:49:27.304000 audit[4055]: AVC avc: denied { bpf } for pid=4055 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:27.304000 audit[4055]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=4039 pid=4055 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:27.304000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839646335326338316439366563336230333131396431343766633462 Oct 2 18:49:27.304000 audit[4055]: AVC avc: denied { perfmon } for pid=4055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:27.304000 audit[4055]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4039 pid=4055 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:27.304000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839646335326338316439366563336230333131396431343766633462 Oct 2 18:49:27.304000 audit[4055]: AVC avc: denied { bpf } for pid=4055 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:27.304000 audit[4055]: AVC avc: denied { bpf } for pid=4055 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:27.304000 audit[4055]: AVC avc: denied { bpf } for pid=4055 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:27.304000 audit[4055]: AVC avc: denied { perfmon } for pid=4055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:27.304000 audit[4055]: AVC avc: denied { perfmon } for pid=4055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:27.304000 audit[4055]: AVC avc: denied { perfmon } for pid=4055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:27.304000 audit[4055]: AVC avc: denied { perfmon } for pid=4055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:27.304000 audit[4055]: AVC avc: denied { perfmon } for pid=4055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:27.304000 audit[4055]: AVC avc: denied { bpf } for pid=4055 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:27.304000 audit[4055]: AVC avc: denied { bpf } for pid=4055 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:27.304000 audit: BPF prog-id=167 op=LOAD Oct 2 18:49:27.304000 audit[4055]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4039 pid=4055 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:27.304000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839646335326338316439366563336230333131396431343766633462 Oct 2 18:49:27.304000 audit[4055]: AVC avc: denied { bpf } for pid=4055 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:27.304000 audit[4055]: AVC avc: denied { bpf } for pid=4055 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:27.304000 audit[4055]: AVC avc: denied { perfmon } for pid=4055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:27.304000 audit[4055]: AVC avc: denied { perfmon } for pid=4055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:27.304000 audit[4055]: AVC avc: denied { perfmon } for pid=4055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:27.304000 audit[4055]: AVC avc: denied { perfmon } for pid=4055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:27.304000 audit[4055]: AVC avc: denied { perfmon } for pid=4055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:27.304000 audit[4055]: AVC avc: denied { bpf } for pid=4055 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:27.304000 audit[4055]: AVC avc: denied { bpf } for pid=4055 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:27.304000 audit: BPF prog-id=168 op=LOAD Oct 2 18:49:27.304000 audit[4055]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4039 pid=4055 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:27.304000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839646335326338316439366563336230333131396431343766633462 Oct 2 18:49:27.305000 audit: BPF prog-id=168 op=UNLOAD Oct 2 18:49:27.305000 audit: BPF prog-id=167 op=UNLOAD Oct 2 18:49:27.305000 audit[4055]: AVC avc: denied { bpf } for pid=4055 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:27.305000 audit[4055]: AVC avc: denied { bpf } for pid=4055 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:27.305000 audit[4055]: AVC avc: denied { bpf } for pid=4055 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:27.305000 audit[4055]: AVC avc: denied { perfmon } for pid=4055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:27.305000 audit[4055]: AVC avc: denied { perfmon } for pid=4055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:27.305000 audit[4055]: AVC avc: denied { perfmon } for pid=4055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:27.305000 audit[4055]: AVC avc: denied { perfmon } for pid=4055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:27.305000 audit[4055]: AVC avc: denied { perfmon } for pid=4055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:27.305000 audit[4055]: AVC avc: denied { bpf } for pid=4055 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:27.305000 audit[4055]: AVC avc: denied { bpf } for pid=4055 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:27.305000 audit: BPF prog-id=169 op=LOAD Oct 2 18:49:27.305000 audit[4055]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4039 pid=4055 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:27.305000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839646335326338316439366563336230333131396431343766633462 Oct 2 18:49:27.319860 env[1656]: time="2023-10-02T18:49:27.319772974Z" level=info msg="CreateContainer within sandbox \"597aca1320cff4d47f0740d48c19aef77087cdcffa92311cb9babea63204e5c0\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"9a0ca84ea1f779a79977176ddcf124169c205b67444398873228804dc644ef5d\"" Oct 2 18:49:27.324312 env[1656]: time="2023-10-02T18:49:27.321533708Z" level=info msg="StartContainer for \"9a0ca84ea1f779a79977176ddcf124169c205b67444398873228804dc644ef5d\"" Oct 2 18:49:27.420945 systemd-networkd[1457]: calib52fc963c3a: Gained IPv6LL Oct 2 18:49:27.437404 env[1656]: time="2023-10-02T18:49:27.437230659Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-565d847f94-nn229,Uid:d1a342a2-5851-4010-a0e5-12e4e52014f4,Namespace:kube-system,Attempt:0,} returns sandbox id \"89dc52c81d96ec3b03119d147fc4b9ffd4cfb460c676485a7a7433cb36a7a02e\"" Oct 2 18:49:27.458672 env[1656]: time="2023-10-02T18:49:27.458537817Z" level=info msg="CreateContainer within sandbox \"89dc52c81d96ec3b03119d147fc4b9ffd4cfb460c676485a7a7433cb36a7a02e\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Oct 2 18:49:27.466587 systemd[1]: Started cri-containerd-9a0ca84ea1f779a79977176ddcf124169c205b67444398873228804dc644ef5d.scope. Oct 2 18:49:27.554000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:27.554000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:27.554000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:27.554000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:27.554000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:27.554000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:27.554000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:27.554000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:27.554000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:27.554000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:27.554000 audit: BPF prog-id=170 op=LOAD Oct 2 18:49:27.555000 audit[4099]: AVC avc: denied { bpf } for pid=4099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:27.555000 audit[4099]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=4001 pid=4099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:27.555000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961306361383465613166373739613739393737313736646463663132 Oct 2 18:49:27.555000 audit[4099]: AVC avc: denied { perfmon } for pid=4099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:27.555000 audit[4099]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=4001 pid=4099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:27.555000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961306361383465613166373739613739393737313736646463663132 Oct 2 18:49:27.555000 audit[4099]: AVC avc: denied { bpf } for pid=4099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:27.555000 audit[4099]: AVC avc: denied { bpf } for pid=4099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:27.555000 audit[4099]: AVC avc: denied { bpf } for pid=4099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:27.555000 audit[4099]: AVC avc: denied { perfmon } for pid=4099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:27.555000 audit[4099]: AVC avc: denied { perfmon } for pid=4099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:27.555000 audit[4099]: AVC avc: denied { perfmon } for pid=4099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:27.555000 audit[4099]: AVC avc: denied { perfmon } for pid=4099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:27.555000 audit[4099]: AVC avc: denied { perfmon } for pid=4099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:27.555000 audit[4099]: AVC avc: denied { bpf } for pid=4099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:27.555000 audit[4099]: AVC avc: denied { bpf } for pid=4099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:27.555000 audit: BPF prog-id=171 op=LOAD Oct 2 18:49:27.555000 audit[4099]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=4001 pid=4099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:27.555000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961306361383465613166373739613739393737313736646463663132 Oct 2 18:49:27.555000 audit[4099]: AVC avc: denied { bpf } for pid=4099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:27.555000 audit[4099]: AVC avc: denied { bpf } for pid=4099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:27.555000 audit[4099]: AVC avc: denied { perfmon } for pid=4099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:27.555000 audit[4099]: AVC avc: denied { perfmon } for pid=4099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:27.555000 audit[4099]: AVC avc: denied { perfmon } for pid=4099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:27.555000 audit[4099]: AVC avc: denied { perfmon } for pid=4099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:27.555000 audit[4099]: AVC avc: denied { perfmon } for pid=4099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:27.555000 audit[4099]: AVC avc: denied { bpf } for pid=4099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:27.555000 audit[4099]: AVC avc: denied { bpf } for pid=4099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:27.555000 audit: BPF prog-id=172 op=LOAD Oct 2 18:49:27.555000 audit[4099]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=4001 pid=4099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:27.555000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961306361383465613166373739613739393737313736646463663132 Oct 2 18:49:27.555000 audit: BPF prog-id=172 op=UNLOAD Oct 2 18:49:27.555000 audit: BPF prog-id=171 op=UNLOAD Oct 2 18:49:27.555000 audit[4099]: AVC avc: denied { bpf } for pid=4099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:27.555000 audit[4099]: AVC avc: denied { bpf } for pid=4099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:27.555000 audit[4099]: AVC avc: denied { bpf } for pid=4099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:27.555000 audit[4099]: AVC avc: denied { perfmon } for pid=4099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:27.555000 audit[4099]: AVC avc: denied { perfmon } for pid=4099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:27.555000 audit[4099]: AVC avc: denied { perfmon } for pid=4099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:27.555000 audit[4099]: AVC avc: denied { perfmon } for pid=4099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:27.555000 audit[4099]: AVC avc: denied { perfmon } for pid=4099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:27.555000 audit[4099]: AVC avc: denied { bpf } for pid=4099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:27.555000 audit[4099]: AVC avc: denied { bpf } for pid=4099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:27.555000 audit: BPF prog-id=173 op=LOAD Oct 2 18:49:27.555000 audit[4099]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=4001 pid=4099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:27.555000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961306361383465613166373739613739393737313736646463663132 Oct 2 18:49:27.612927 systemd-networkd[1457]: cali31c36855ec9: Gained IPv6LL Oct 2 18:49:27.617260 env[1656]: time="2023-10-02T18:49:27.617189260Z" level=info msg="CreateContainer within sandbox \"89dc52c81d96ec3b03119d147fc4b9ffd4cfb460c676485a7a7433cb36a7a02e\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"6dd968ce05456e82b671899bbe3e9bfcf13056430fa8f3724fb6f0ed2b75c115\"" Oct 2 18:49:27.618796 env[1656]: time="2023-10-02T18:49:27.618732282Z" level=info msg="StartContainer for \"6dd968ce05456e82b671899bbe3e9bfcf13056430fa8f3724fb6f0ed2b75c115\"" Oct 2 18:49:27.658000 audit[4157]: AVC avc: denied { write } for pid=4157 comm="tee" name="fd" dev="proc" ino=19976 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 18:49:27.658000 audit[4157]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffe6c7198f a2=241 a3=1b6 items=1 ppid=4098 pid=4157 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:27.658000 audit: CWD cwd="/etc/service/enabled/cni/log" Oct 2 18:49:27.658000 audit: PATH item=0 name="/dev/fd/63" inode=19959 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 18:49:27.658000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 18:49:27.676313 systemd[1]: Started cri-containerd-6dd968ce05456e82b671899bbe3e9bfcf13056430fa8f3724fb6f0ed2b75c115.scope. Oct 2 18:49:27.721340 env[1656]: time="2023-10-02T18:49:27.721181253Z" level=info msg="StartContainer for \"9a0ca84ea1f779a79977176ddcf124169c205b67444398873228804dc644ef5d\" returns successfully" Oct 2 18:49:27.757000 audit[4178]: AVC avc: denied { write } for pid=4178 comm="tee" name="fd" dev="proc" ino=20008 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 18:49:27.757000 audit[4178]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffc17da97d a2=241 a3=1b6 items=1 ppid=4111 pid=4178 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:27.757000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Oct 2 18:49:27.757000 audit: PATH item=0 name="/dev/fd/63" inode=19978 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 18:49:27.757000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 18:49:27.803000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:27.803000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:27.807000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:27.807000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:27.807000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:27.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:27.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:27.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:27.808000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:27.808000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:27.808000 audit: BPF prog-id=174 op=LOAD Oct 2 18:49:27.809000 audit[4166]: AVC avc: denied { bpf } for pid=4166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:27.809000 audit[4166]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=4039 pid=4166 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:27.809000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3664643936386365303534353665383262363731383939626265336539 Oct 2 18:49:27.809000 audit[4166]: AVC avc: denied { perfmon } for pid=4166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:27.809000 audit[4166]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=4039 pid=4166 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:27.809000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3664643936386365303534353665383262363731383939626265336539 Oct 2 18:49:27.809000 audit[4166]: AVC avc: denied { bpf } for pid=4166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:27.809000 audit[4166]: AVC avc: denied { bpf } for pid=4166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:27.809000 audit[4166]: AVC avc: denied { bpf } for pid=4166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:27.809000 audit[4166]: AVC avc: denied { perfmon } for pid=4166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:27.809000 audit[4166]: AVC avc: denied { perfmon } for pid=4166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:27.809000 audit[4166]: AVC avc: denied { perfmon } for pid=4166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:27.809000 audit[4166]: AVC avc: denied { perfmon } for pid=4166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:27.809000 audit[4166]: AVC avc: denied { perfmon } for pid=4166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:27.809000 audit[4166]: AVC avc: denied { bpf } for pid=4166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:27.809000 audit[4166]: AVC avc: denied { bpf } for pid=4166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:27.809000 audit: BPF prog-id=175 op=LOAD Oct 2 18:49:27.809000 audit[4166]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=4039 pid=4166 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:27.809000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3664643936386365303534353665383262363731383939626265336539 Oct 2 18:49:27.809000 audit[4166]: AVC avc: denied { bpf } for pid=4166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:27.809000 audit[4166]: AVC avc: denied { bpf } for pid=4166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:27.809000 audit[4166]: AVC avc: denied { perfmon } for pid=4166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:27.809000 audit[4166]: AVC avc: denied { perfmon } for pid=4166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:27.809000 audit[4166]: AVC avc: denied { perfmon } for pid=4166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:27.809000 audit[4166]: AVC avc: denied { perfmon } for pid=4166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:27.809000 audit[4166]: AVC avc: denied { perfmon } for pid=4166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:27.809000 audit[4166]: AVC avc: denied { bpf } for pid=4166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:27.809000 audit[4166]: AVC avc: denied { bpf } for pid=4166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:27.809000 audit: BPF prog-id=176 op=LOAD Oct 2 18:49:27.809000 audit[4166]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=4039 pid=4166 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:27.809000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3664643936386365303534353665383262363731383939626265336539 Oct 2 18:49:27.809000 audit: BPF prog-id=176 op=UNLOAD Oct 2 18:49:27.809000 audit: BPF prog-id=175 op=UNLOAD Oct 2 18:49:27.810000 audit[4166]: AVC avc: denied { bpf } for pid=4166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:27.810000 audit[4166]: AVC avc: denied { bpf } for pid=4166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:27.810000 audit[4166]: AVC avc: denied { bpf } for pid=4166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:27.810000 audit[4166]: AVC avc: denied { perfmon } for pid=4166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:27.810000 audit[4166]: AVC avc: denied { perfmon } for pid=4166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:27.810000 audit[4166]: AVC avc: denied { perfmon } for pid=4166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:27.810000 audit[4166]: AVC avc: denied { perfmon } for pid=4166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:27.810000 audit[4166]: AVC avc: denied { perfmon } for pid=4166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:27.810000 audit[4166]: AVC avc: denied { bpf } for pid=4166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:27.810000 audit[4166]: AVC avc: denied { bpf } for pid=4166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:27.810000 audit: BPF prog-id=177 op=LOAD Oct 2 18:49:27.810000 audit[4166]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=4039 pid=4166 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:27.810000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3664643936386365303534353665383262363731383939626265336539 Oct 2 18:49:27.897000 audit[4211]: AVC avc: denied { write } for pid=4211 comm="tee" name="fd" dev="proc" ino=20015 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 18:49:27.897000 audit[4211]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffffb56b98d a2=241 a3=1b6 items=1 ppid=4103 pid=4211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:27.897000 audit: CWD cwd="/etc/service/enabled/confd/log" Oct 2 18:49:27.897000 audit: PATH item=0 name="/dev/fd/63" inode=21155 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 18:49:27.897000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 18:49:27.975000 audit[4193]: AVC avc: denied { write } for pid=4193 comm="tee" name="fd" dev="proc" ino=21184 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 18:49:27.975000 audit[4193]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffccbd497e a2=241 a3=1b6 items=1 ppid=4097 pid=4193 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:27.975000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Oct 2 18:49:27.975000 audit: PATH item=0 name="/dev/fd/63" inode=19993 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 18:49:27.975000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 18:49:28.003000 audit[4207]: AVC avc: denied { write } for pid=4207 comm="tee" name="fd" dev="proc" ino=20021 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 18:49:28.003000 audit[4207]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffc4efd98d a2=241 a3=1b6 items=1 ppid=4106 pid=4207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:28.003000 audit: CWD cwd="/etc/service/enabled/bird6/log" Oct 2 18:49:28.003000 audit: PATH item=0 name="/dev/fd/63" inode=20012 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 18:49:28.003000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 18:49:28.097000 audit[4212]: AVC avc: denied { write } for pid=4212 comm="tee" name="fd" dev="proc" ino=20034 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 18:49:28.097000 audit[4212]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffff8ac098e a2=241 a3=1b6 items=1 ppid=4090 pid=4212 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:28.097000 audit: CWD cwd="/etc/service/enabled/bird/log" Oct 2 18:49:28.097000 audit: PATH item=0 name="/dev/fd/63" inode=21154 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 18:49:28.097000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 18:49:28.156991 env[1656]: time="2023-10-02T18:49:28.156924921Z" level=info msg="StartContainer for \"6dd968ce05456e82b671899bbe3e9bfcf13056430fa8f3724fb6f0ed2b75c115\" returns successfully" Oct 2 18:49:28.330000 audit[4238]: AVC avc: denied { write } for pid=4238 comm="tee" name="fd" dev="proc" ino=20142 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 2 18:49:28.330000 audit[4238]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffe4ce698d a2=241 a3=1b6 items=1 ppid=4100 pid=4238 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:28.330000 audit: CWD cwd="/etc/service/enabled/felix/log" Oct 2 18:49:28.330000 audit: PATH item=0 name="/dev/fd/63" inode=21222 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 2 18:49:28.330000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 2 18:49:28.636798 systemd-networkd[1457]: cali831fdad774b: Gained IPv6LL Oct 2 18:49:28.677000 audit[4273]: NETFILTER_CFG table=filter:111 family=2 entries=12 op=nft_register_rule pid=4273 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 18:49:28.677000 audit[4273]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4028 a0=3 a1=fffff4543830 a2=0 a3=ffff7f9f36c0 items=0 ppid=3046 pid=4273 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:28.677000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 18:49:28.684000 audit[4273]: NETFILTER_CFG table=nat:112 family=2 entries=30 op=nft_register_rule pid=4273 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 18:49:28.684000 audit[4273]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=8836 a0=3 a1=fffff4543830 a2=0 a3=ffff7f9f36c0 items=0 ppid=3046 pid=4273 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:28.684000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 18:49:28.828812 systemd-networkd[1457]: calic95504100a5: Gained IPv6LL Oct 2 18:49:29.522633 env[1656]: time="2023-10-02T18:49:29.522570999Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:49:29.525867 env[1656]: time="2023-10-02T18:49:29.525811916Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2a83e28de36778d89892266990cc390b1519b82e6d9724ca705c0d1e700b5804,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:49:29.529427 env[1656]: time="2023-10-02T18:49:29.529375331Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.25.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:49:29.533098 env[1656]: time="2023-10-02T18:49:29.533020301Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:b764feb1777655aabce5988324b69b412d23e087436ee2414dff893a158fcdef,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 2 18:49:29.535851 env[1656]: time="2023-10-02T18:49:29.535766886Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.25.0\" returns image reference \"sha256:2a83e28de36778d89892266990cc390b1519b82e6d9724ca705c0d1e700b5804\"" Oct 2 18:49:29.537781 env[1656]: time="2023-10-02T18:49:29.537715159Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\"" Oct 2 18:49:29.539977 env[1656]: time="2023-10-02T18:49:29.539912919Z" level=info msg="CreateContainer within sandbox \"fe4430a55e218aeb0fee0fd13e4dd5c58231a339ee3cb6b4ffd2562b4d4888e7\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Oct 2 18:49:29.566265 env[1656]: time="2023-10-02T18:49:29.566174333Z" level=info msg="CreateContainer within sandbox \"fe4430a55e218aeb0fee0fd13e4dd5c58231a339ee3cb6b4ffd2562b4d4888e7\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"e0a8f8887c5ee4201e06e2bb70bb51407cd6b0e01daadeb765ef70b99dc882be\"" Oct 2 18:49:29.567631 env[1656]: time="2023-10-02T18:49:29.567509171Z" level=info msg="StartContainer for \"e0a8f8887c5ee4201e06e2bb70bb51407cd6b0e01daadeb765ef70b99dc882be\"" Oct 2 18:49:29.653245 systemd[1]: Started cri-containerd-e0a8f8887c5ee4201e06e2bb70bb51407cd6b0e01daadeb765ef70b99dc882be.scope. Oct 2 18:49:29.673303 systemd[1]: run-containerd-runc-k8s.io-e0a8f8887c5ee4201e06e2bb70bb51407cd6b0e01daadeb765ef70b99dc882be-runc.DTGfzE.mount: Deactivated successfully. Oct 2 18:49:29.714175 env[1656]: time="2023-10-02T18:49:29.714055911Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 18:49:29.715729 env[1656]: time="2023-10-02T18:49:29.715637201Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 18:49:29.716108 kubelet[2886]: E1002 18:49:29.716055 2886 remote_image.go:242] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 18:49:29.716690 kubelet[2886]: E1002 18:49:29.716142 2886 kuberuntime_image.go:51] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 18:49:29.716690 kubelet[2886]: E1002 18:49:29.716338 2886 kuberuntime_manager.go:862] container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-jtrz6,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod csi-node-driver-2xm2w_calico-system(e6ba647d-27de-403d-bc1a-97cd30c5337c): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 18:49:29.716690 kubelet[2886]: E1002 18:49:29.716674 2886 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/csi-node-driver-2xm2w" podUID=e6ba647d-27de-403d-bc1a-97cd30c5337c Oct 2 18:49:29.761000 audit[4351]: NETFILTER_CFG table=filter:113 family=2 entries=12 op=nft_register_rule pid=4351 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 18:49:29.764252 kernel: kauditd_printk_skb: 416 callbacks suppressed Oct 2 18:49:29.764379 kernel: audit: type=1325 audit(1696272569.761:1298): table=filter:113 family=2 entries=12 op=nft_register_rule pid=4351 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 18:49:29.766000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:29.780336 kernel: audit: type=1400 audit(1696272569.766:1299): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:29.780601 kernel: audit: type=1400 audit(1696272569.766:1300): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:29.766000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:29.766000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:29.794003 kernel: audit: type=1400 audit(1696272569.766:1301): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:29.794109 kernel: audit: type=1400 audit(1696272569.766:1302): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:29.766000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:29.766000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:29.809383 kernel: audit: type=1400 audit(1696272569.766:1303): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:29.809895 kernel: audit: type=1400 audit(1696272569.766:1304): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:29.766000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:29.766000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:29.825876 kernel: audit: type=1400 audit(1696272569.766:1305): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:29.831736 kernel: audit: type=1400 audit(1696272569.766:1306): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:29.766000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:29.766000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:29.850311 kernel: audit: type=1400 audit(1696272569.766:1307): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:29.769000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:29.769000 audit: BPF prog-id=178 op=LOAD Oct 2 18:49:29.770000 audit[4308]: AVC avc: denied { bpf } for pid=4308 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:29.770000 audit[4308]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=3805 pid=4308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:29.770000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530613866383838376335656534323031653036653262623730626235 Oct 2 18:49:29.770000 audit[4308]: AVC avc: denied { perfmon } for pid=4308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:29.770000 audit[4308]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3805 pid=4308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:29.770000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530613866383838376335656534323031653036653262623730626235 Oct 2 18:49:29.770000 audit[4308]: AVC avc: denied { bpf } for pid=4308 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:29.770000 audit[4308]: AVC avc: denied { bpf } for pid=4308 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:29.770000 audit[4308]: AVC avc: denied { bpf } for pid=4308 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:29.770000 audit[4308]: AVC avc: denied { perfmon } for pid=4308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:29.770000 audit[4308]: AVC avc: denied { perfmon } for pid=4308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:29.770000 audit[4308]: AVC avc: denied { perfmon } for pid=4308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:29.770000 audit[4308]: AVC avc: denied { perfmon } for pid=4308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:29.770000 audit[4308]: AVC avc: denied { perfmon } for pid=4308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:29.770000 audit[4308]: AVC avc: denied { bpf } for pid=4308 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:29.761000 audit[4351]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4028 a0=3 a1=fffff51637e0 a2=0 a3=ffff8d3d66c0 items=0 ppid=3046 pid=4351 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:29.761000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 18:49:29.770000 audit[4308]: AVC avc: denied { bpf } for pid=4308 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:29.770000 audit: BPF prog-id=179 op=LOAD Oct 2 18:49:29.770000 audit[4308]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3805 pid=4308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:29.770000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530613866383838376335656534323031653036653262623730626235 Oct 2 18:49:29.782000 audit[4308]: AVC avc: denied { bpf } for pid=4308 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:29.782000 audit[4308]: AVC avc: denied { bpf } for pid=4308 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:29.782000 audit[4308]: AVC avc: denied { perfmon } for pid=4308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:29.782000 audit[4308]: AVC avc: denied { perfmon } for pid=4308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:29.782000 audit[4308]: AVC avc: denied { perfmon } for pid=4308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:29.782000 audit[4308]: AVC avc: denied { perfmon } for pid=4308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:29.782000 audit[4308]: AVC avc: denied { perfmon } for pid=4308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:29.782000 audit[4308]: AVC avc: denied { bpf } for pid=4308 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:29.782000 audit[4308]: AVC avc: denied { bpf } for pid=4308 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:29.782000 audit: BPF prog-id=180 op=LOAD Oct 2 18:49:29.782000 audit[4308]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3805 pid=4308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:29.782000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530613866383838376335656534323031653036653262623730626235 Oct 2 18:49:29.785000 audit: BPF prog-id=180 op=UNLOAD Oct 2 18:49:29.785000 audit: BPF prog-id=179 op=UNLOAD Oct 2 18:49:29.785000 audit[4308]: AVC avc: denied { bpf } for pid=4308 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:29.785000 audit[4308]: AVC avc: denied { bpf } for pid=4308 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:29.785000 audit[4308]: AVC avc: denied { bpf } for pid=4308 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:29.785000 audit[4308]: AVC avc: denied { perfmon } for pid=4308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:29.785000 audit[4308]: AVC avc: denied { perfmon } for pid=4308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:29.785000 audit[4308]: AVC avc: denied { perfmon } for pid=4308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:29.785000 audit[4308]: AVC avc: denied { perfmon } for pid=4308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:29.785000 audit[4308]: AVC avc: denied { perfmon } for pid=4308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:29.785000 audit[4308]: AVC avc: denied { bpf } for pid=4308 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:29.779000 audit[4351]: NETFILTER_CFG table=nat:114 family=2 entries=30 op=nft_register_rule pid=4351 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 18:49:29.779000 audit[4351]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=8836 a0=3 a1=fffff51637e0 a2=0 a3=ffff8d3d66c0 items=0 ppid=3046 pid=4351 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:29.779000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 18:49:29.785000 audit[4308]: AVC avc: denied { bpf } for pid=4308 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:29.785000 audit: BPF prog-id=181 op=LOAD Oct 2 18:49:29.785000 audit[4308]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3805 pid=4308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:29.785000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530613866383838376335656534323031653036653262623730626235 Oct 2 18:49:29.884287 env[1656]: time="2023-10-02T18:49:29.884169214Z" level=info msg="StartContainer for \"e0a8f8887c5ee4201e06e2bb70bb51407cd6b0e01daadeb765ef70b99dc882be\" returns successfully" Oct 2 18:49:30.106453 kubelet[2886]: E1002 18:49:30.103076 2886 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-2xm2w" podUID=e6ba647d-27de-403d-bc1a-97cd30c5337c Oct 2 18:49:30.309000 audit[4426]: NETFILTER_CFG table=filter:115 family=2 entries=9 op=nft_register_rule pid=4426 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 18:49:30.309000 audit[4426]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=1916 a0=3 a1=ffffeb379410 a2=0 a3=ffff8b37c6c0 items=0 ppid=3046 pid=4426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:30.309000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 18:49:30.366000 audit[4426]: NETFILTER_CFG table=nat:116 family=2 entries=63 op=nft_register_chain pid=4426 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 18:49:30.366000 audit[4426]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=24988 a0=3 a1=ffffeb379410 a2=0 a3=ffff8b37c6c0 items=0 ppid=3046 pid=4426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:30.366000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 18:49:30.559450 (udev-worker)[4444]: Network interface NamePolicy= disabled on kernel command line. Oct 2 18:49:30.559451 (udev-worker)[4432]: Network interface NamePolicy= disabled on kernel command line. Oct 2 18:49:30.565000 audit[4447]: AVC avc: denied { bpf } for pid=4447 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:30.565000 audit[4447]: AVC avc: denied { bpf } for pid=4447 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:30.565000 audit[4447]: AVC avc: denied { perfmon } for pid=4447 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:30.565000 audit[4447]: AVC avc: denied { perfmon } for pid=4447 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:30.565000 audit[4447]: AVC avc: denied { perfmon } for pid=4447 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:30.565000 audit[4447]: AVC avc: denied { perfmon } for pid=4447 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:30.565000 audit[4447]: AVC avc: denied { perfmon } for pid=4447 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:30.565000 audit[4447]: AVC avc: denied { bpf } for pid=4447 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:30.565000 audit[4447]: AVC avc: denied { bpf } for pid=4447 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:30.565000 audit: BPF prog-id=182 op=LOAD Oct 2 18:49:30.565000 audit[4447]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffddcb9b28 a2=70 a3=0 items=0 ppid=4104 pid=4447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:30.565000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 18:49:30.569000 audit: BPF prog-id=182 op=UNLOAD Oct 2 18:49:30.569000 audit[4447]: AVC avc: denied { bpf } for pid=4447 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:30.569000 audit[4447]: AVC avc: denied { bpf } for pid=4447 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:30.569000 audit[4447]: AVC avc: denied { perfmon } for pid=4447 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:30.569000 audit[4447]: AVC avc: denied { perfmon } for pid=4447 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:30.569000 audit[4447]: AVC avc: denied { perfmon } for pid=4447 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:30.569000 audit[4447]: AVC avc: denied { perfmon } for pid=4447 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:30.569000 audit[4447]: AVC avc: denied { perfmon } for pid=4447 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:30.569000 audit[4447]: AVC avc: denied { bpf } for pid=4447 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:30.569000 audit[4447]: AVC avc: denied { bpf } for pid=4447 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:30.569000 audit: BPF prog-id=183 op=LOAD Oct 2 18:49:30.569000 audit[4447]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffddcb9b28 a2=70 a3=4a174c items=0 ppid=4104 pid=4447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:30.569000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 18:49:30.570000 audit: BPF prog-id=183 op=UNLOAD Oct 2 18:49:30.570000 audit[4447]: AVC avc: denied { bpf } for pid=4447 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:30.570000 audit[4447]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=0 a1=ffffddcb9b58 a2=70 a3=151a073f items=0 ppid=4104 pid=4447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:30.570000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 18:49:30.571000 audit[4447]: AVC avc: denied { bpf } for pid=4447 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:30.571000 audit[4447]: AVC avc: denied { bpf } for pid=4447 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:30.571000 audit[4447]: AVC avc: denied { bpf } for pid=4447 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:30.571000 audit[4447]: AVC avc: denied { perfmon } for pid=4447 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:30.571000 audit[4447]: AVC avc: denied { perfmon } for pid=4447 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:30.571000 audit[4447]: AVC avc: denied { perfmon } for pid=4447 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:30.571000 audit[4447]: AVC avc: denied { perfmon } for pid=4447 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:30.571000 audit[4447]: AVC avc: denied { perfmon } for pid=4447 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:30.571000 audit[4447]: AVC avc: denied { bpf } for pid=4447 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:30.571000 audit[4447]: AVC avc: denied { bpf } for pid=4447 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:30.571000 audit: BPF prog-id=184 op=LOAD Oct 2 18:49:30.571000 audit[4447]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=5 a1=ffffddcb9aa8 a2=70 a3=151a0759 items=0 ppid=4104 pid=4447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:30.571000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 2 18:49:30.617000 audit[4451]: AVC avc: denied { bpf } for pid=4451 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:30.617000 audit[4451]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=fffff72cde98 a2=70 a3=0 items=0 ppid=4104 pid=4451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:30.617000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 2 18:49:30.618000 audit[4451]: AVC avc: denied { bpf } for pid=4451 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:30.618000 audit[4451]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=fffff72cdd78 a2=70 a3=2 items=0 ppid=4104 pid=4451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:30.618000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 2 18:49:30.631000 audit: BPF prog-id=184 op=UNLOAD Oct 2 18:49:30.852000 audit[4476]: NETFILTER_CFG table=mangle:117 family=2 entries=19 op=nft_register_chain pid=4476 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 18:49:30.852000 audit[4476]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6800 a0=3 a1=ffffc4170330 a2=0 a3=ffff989b5fa0 items=0 ppid=4104 pid=4476 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:30.852000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 18:49:30.874000 audit[4477]: NETFILTER_CFG table=raw:118 family=2 entries=19 op=nft_register_chain pid=4477 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 18:49:30.874000 audit[4477]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6132 a0=3 a1=ffffeb4f2890 a2=0 a3=ffff83c5ffa0 items=0 ppid=4104 pid=4477 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:30.874000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 18:49:30.886000 audit[4479]: NETFILTER_CFG table=nat:119 family=2 entries=16 op=nft_register_chain pid=4479 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 18:49:30.886000 audit[4479]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5188 a0=3 a1=ffffe89fe850 a2=0 a3=ffffa9158fa0 items=0 ppid=4104 pid=4479 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:30.886000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 18:49:30.891000 audit[4478]: NETFILTER_CFG table=filter:120 family=2 entries=151 op=nft_register_chain pid=4478 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 18:49:30.891000 audit[4478]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=83968 a0=3 a1=ffffeb860ee0 a2=0 a3=ffffac5a6fa0 items=0 ppid=4104 pid=4478 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:30.891000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 18:49:30.934021 systemd-networkd[1457]: vxlan.calico: Link UP Oct 2 18:49:30.934037 systemd-networkd[1457]: vxlan.calico: Gained carrier Oct 2 18:49:32.604813 systemd-networkd[1457]: vxlan.calico: Gained IPv6LL Oct 2 18:49:35.750000 audit[2568]: AVC avc: denied { watch } for pid=2568 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=7083 scontext=system_u:system_r:svirt_lxc_net_t:s0:c112,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 18:49:35.753548 kernel: kauditd_printk_skb: 120 callbacks suppressed Oct 2 18:49:35.753736 kernel: audit: type=1400 audit(1696272575.750:1333): avc: denied { watch } for pid=2568 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=7083 scontext=system_u:system_r:svirt_lxc_net_t:s0:c112,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 18:49:35.750000 audit[2568]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=400257b080 a2=fc6 a3=0 items=0 ppid=2409 pid=2568 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c112,c621 key=(null) Oct 2 18:49:35.776141 kernel: audit: type=1300 audit(1696272575.750:1333): arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=400257b080 a2=fc6 a3=0 items=0 ppid=2409 pid=2568 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c112,c621 key=(null) Oct 2 18:49:35.776252 kernel: audit: type=1327 audit(1696272575.750:1333): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 18:49:35.750000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 18:49:35.750000 audit[2568]: AVC avc: denied { watch } for pid=2568 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=6812 scontext=system_u:system_r:svirt_lxc_net_t:s0:c112,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 18:49:35.796441 kernel: audit: type=1400 audit(1696272575.750:1334): avc: denied { watch } for pid=2568 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=6812 scontext=system_u:system_r:svirt_lxc_net_t:s0:c112,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 18:49:35.796621 kernel: audit: type=1300 audit(1696272575.750:1334): arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=4001594440 a2=fc6 a3=0 items=0 ppid=2409 pid=2568 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c112,c621 key=(null) Oct 2 18:49:35.750000 audit[2568]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=4001594440 a2=fc6 a3=0 items=0 ppid=2409 pid=2568 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c112,c621 key=(null) Oct 2 18:49:35.750000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 18:49:35.819508 kernel: audit: type=1327 audit(1696272575.750:1334): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 18:49:37.086927 kubelet[2886]: I1002 18:49:37.086857 2886 topology_manager.go:205] "Topology Admit Handler" Oct 2 18:49:37.101650 systemd[1]: Created slice kubepods-besteffort-podc7fc7a94_c50f_45c6_81d1_31244ce0f455.slice. Oct 2 18:49:37.106318 kubelet[2886]: W1002 18:49:37.106276 2886 reflector.go:424] object-"calico-apiserver"/"kube-root-ca.crt": failed to list *v1.ConfigMap: configmaps "kube-root-ca.crt" is forbidden: User "system:node:ip-172-31-16-118" cannot list resource "configmaps" in API group "" in the namespace "calico-apiserver": no relationship found between node 'ip-172-31-16-118' and this object Oct 2 18:49:37.106712 kubelet[2886]: E1002 18:49:37.106661 2886 reflector.go:140] object-"calico-apiserver"/"kube-root-ca.crt": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps "kube-root-ca.crt" is forbidden: User "system:node:ip-172-31-16-118" cannot list resource "configmaps" in API group "" in the namespace "calico-apiserver": no relationship found between node 'ip-172-31-16-118' and this object Oct 2 18:49:37.107824 kubelet[2886]: W1002 18:49:37.107786 2886 reflector.go:424] object-"calico-apiserver"/"calico-apiserver-certs": failed to list *v1.Secret: secrets "calico-apiserver-certs" is forbidden: User "system:node:ip-172-31-16-118" cannot list resource "secrets" in API group "" in the namespace "calico-apiserver": no relationship found between node 'ip-172-31-16-118' and this object Oct 2 18:49:37.108097 kubelet[2886]: E1002 18:49:37.108073 2886 reflector.go:140] object-"calico-apiserver"/"calico-apiserver-certs": Failed to watch *v1.Secret: failed to list *v1.Secret: secrets "calico-apiserver-certs" is forbidden: User "system:node:ip-172-31-16-118" cannot list resource "secrets" in API group "" in the namespace "calico-apiserver": no relationship found between node 'ip-172-31-16-118' and this object Oct 2 18:49:37.138602 kubelet[2886]: I1002 18:49:37.138516 2886 topology_manager.go:205] "Topology Admit Handler" Oct 2 18:49:37.149523 systemd[1]: Created slice kubepods-besteffort-pod5dfaf83b_bc8f_4c6b_8ab6_ed9409d87c2e.slice. Oct 2 18:49:37.157991 kubelet[2886]: I1002 18:49:37.157931 2886 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-sv7bs\" (UniqueName: \"kubernetes.io/projected/5dfaf83b-bc8f-4c6b-8ab6-ed9409d87c2e-kube-api-access-sv7bs\") pod \"calico-apiserver-845fbdf9fb-h4vwt\" (UID: \"5dfaf83b-bc8f-4c6b-8ab6-ed9409d87c2e\") " pod="calico-apiserver/calico-apiserver-845fbdf9fb-h4vwt" Oct 2 18:49:37.158209 kubelet[2886]: I1002 18:49:37.158029 2886 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-2l2mg\" (UniqueName: \"kubernetes.io/projected/c7fc7a94-c50f-45c6-81d1-31244ce0f455-kube-api-access-2l2mg\") pod \"calico-apiserver-845fbdf9fb-dd5n5\" (UID: \"c7fc7a94-c50f-45c6-81d1-31244ce0f455\") " pod="calico-apiserver/calico-apiserver-845fbdf9fb-dd5n5" Oct 2 18:49:37.158209 kubelet[2886]: I1002 18:49:37.158089 2886 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/c7fc7a94-c50f-45c6-81d1-31244ce0f455-calico-apiserver-certs\") pod \"calico-apiserver-845fbdf9fb-dd5n5\" (UID: \"c7fc7a94-c50f-45c6-81d1-31244ce0f455\") " pod="calico-apiserver/calico-apiserver-845fbdf9fb-dd5n5" Oct 2 18:49:37.158209 kubelet[2886]: I1002 18:49:37.158139 2886 reconciler.go:357] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/5dfaf83b-bc8f-4c6b-8ab6-ed9409d87c2e-calico-apiserver-certs\") pod \"calico-apiserver-845fbdf9fb-h4vwt\" (UID: \"5dfaf83b-bc8f-4c6b-8ab6-ed9409d87c2e\") " pod="calico-apiserver/calico-apiserver-845fbdf9fb-h4vwt" Oct 2 18:49:37.450000 audit[4580]: NETFILTER_CFG table=filter:121 family=2 entries=7 op=nft_register_rule pid=4580 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 18:49:37.450000 audit[4580]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2620 a0=3 a1=ffffe494b370 a2=0 a3=ffffa651d6c0 items=0 ppid=3046 pid=4580 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:37.471571 kernel: audit: type=1325 audit(1696272577.450:1335): table=filter:121 family=2 entries=7 op=nft_register_rule pid=4580 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 18:49:37.471743 kernel: audit: type=1300 audit(1696272577.450:1335): arch=c00000b7 syscall=211 success=yes exit=2620 a0=3 a1=ffffe494b370 a2=0 a3=ffffa651d6c0 items=0 ppid=3046 pid=4580 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:37.450000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 18:49:37.482650 kernel: audit: type=1327 audit(1696272577.450:1335): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 18:49:37.513000 audit[4580]: NETFILTER_CFG table=nat:122 family=2 entries=78 op=nft_register_rule pid=4580 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 18:49:37.522684 kernel: audit: type=1325 audit(1696272577.513:1336): table=nat:122 family=2 entries=78 op=nft_register_rule pid=4580 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 18:49:37.513000 audit[4580]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=24988 a0=3 a1=ffffe494b370 a2=0 a3=ffffa651d6c0 items=0 ppid=3046 pid=4580 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:37.513000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 18:49:37.783000 audit[4606]: NETFILTER_CFG table=filter:123 family=2 entries=8 op=nft_register_rule pid=4606 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 18:49:37.783000 audit[4606]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2620 a0=3 a1=ffffcc69e500 a2=0 a3=ffff88e276c0 items=0 ppid=3046 pid=4606 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:37.783000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 18:49:37.789000 audit[4606]: NETFILTER_CFG table=nat:124 family=2 entries=78 op=nft_register_rule pid=4606 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 18:49:37.789000 audit[4606]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=24988 a0=3 a1=ffffcc69e500 a2=0 a3=ffff88e276c0 items=0 ppid=3046 pid=4606 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:37.789000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 18:49:38.259656 kubelet[2886]: E1002 18:49:38.259485 2886 secret.go:192] Couldn't get secret calico-apiserver/calico-apiserver-certs: failed to sync secret cache: timed out waiting for the condition Oct 2 18:49:38.259656 kubelet[2886]: E1002 18:49:38.259487 2886 secret.go:192] Couldn't get secret calico-apiserver/calico-apiserver-certs: failed to sync secret cache: timed out waiting for the condition Oct 2 18:49:38.260345 kubelet[2886]: E1002 18:49:38.259668 2886 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/c7fc7a94-c50f-45c6-81d1-31244ce0f455-calico-apiserver-certs podName:c7fc7a94-c50f-45c6-81d1-31244ce0f455 nodeName:}" failed. No retries permitted until 2023-10-02 18:49:38.759637127 +0000 UTC m=+55.685434075 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/c7fc7a94-c50f-45c6-81d1-31244ce0f455-calico-apiserver-certs") pod "calico-apiserver-845fbdf9fb-dd5n5" (UID: "c7fc7a94-c50f-45c6-81d1-31244ce0f455") : failed to sync secret cache: timed out waiting for the condition Oct 2 18:49:38.260345 kubelet[2886]: E1002 18:49:38.260098 2886 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/5dfaf83b-bc8f-4c6b-8ab6-ed9409d87c2e-calico-apiserver-certs podName:5dfaf83b-bc8f-4c6b-8ab6-ed9409d87c2e nodeName:}" failed. No retries permitted until 2023-10-02 18:49:38.760073578 +0000 UTC m=+55.685870526 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/5dfaf83b-bc8f-4c6b-8ab6-ed9409d87c2e-calico-apiserver-certs") pod "calico-apiserver-845fbdf9fb-h4vwt" (UID: "5dfaf83b-bc8f-4c6b-8ab6-ed9409d87c2e") : failed to sync secret cache: timed out waiting for the condition Oct 2 18:49:38.910680 env[1656]: time="2023-10-02T18:49:38.910068525Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-845fbdf9fb-dd5n5,Uid:c7fc7a94-c50f-45c6-81d1-31244ce0f455,Namespace:calico-apiserver,Attempt:0,}" Oct 2 18:49:38.956016 env[1656]: time="2023-10-02T18:49:38.955958194Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-845fbdf9fb-h4vwt,Uid:5dfaf83b-bc8f-4c6b-8ab6-ed9409d87c2e,Namespace:calico-apiserver,Attempt:0,}" Oct 2 18:49:38.963000 audit[2576]: AVC avc: denied { watch } for pid=2576 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=7083 scontext=system_u:system_r:svirt_lxc_net_t:s0:c376,c943 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 18:49:38.963000 audit[2576]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6e a1=4012b7ecf0 a2=fc6 a3=0 items=0 ppid=2397 pid=2576 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c376,c943 key=(null) Oct 2 18:49:38.963000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31362E313138002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 18:49:38.964000 audit[2576]: AVC avc: denied { watch } for pid=2576 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=7078 scontext=system_u:system_r:svirt_lxc_net_t:s0:c376,c943 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 18:49:38.964000 audit[2576]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6e a1=4012b7ed80 a2=fc6 a3=0 items=0 ppid=2397 pid=2576 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c376,c943 key=(null) Oct 2 18:49:38.964000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31362E313138002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 18:49:38.991000 audit[2576]: AVC avc: denied { watch } for pid=2576 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=6812 scontext=system_u:system_r:svirt_lxc_net_t:s0:c376,c943 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 18:49:38.991000 audit[2576]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6e a1=400308c420 a2=fc6 a3=0 items=0 ppid=2397 pid=2576 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c376,c943 key=(null) Oct 2 18:49:38.991000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31362E313138002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 18:49:38.991000 audit[2576]: AVC avc: denied { watch } for pid=2576 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=7085 scontext=system_u:system_r:svirt_lxc_net_t:s0:c376,c943 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 18:49:38.991000 audit[2576]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6e a1=401178dd40 a2=fc6 a3=0 items=0 ppid=2397 pid=2576 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c376,c943 key=(null) Oct 2 18:49:38.991000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31362E313138002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 18:49:39.125000 audit[2576]: AVC avc: denied { watch } for pid=2576 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=7083 scontext=system_u:system_r:svirt_lxc_net_t:s0:c376,c943 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 18:49:39.125000 audit[2576]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=71 a1=4012204bd0 a2=fc6 a3=0 items=0 ppid=2397 pid=2576 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c376,c943 key=(null) Oct 2 18:49:39.125000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31362E313138002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 18:49:39.136000 audit[2576]: AVC avc: denied { watch } for pid=2576 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=6812 scontext=system_u:system_r:svirt_lxc_net_t:s0:c376,c943 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 18:49:39.136000 audit[2576]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=71 a1=40030e2840 a2=fc6 a3=0 items=0 ppid=2397 pid=2576 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c376,c943 key=(null) Oct 2 18:49:39.136000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31362E313138002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 18:49:39.410138 systemd-networkd[1457]: cali4b12be785aa: Link UP Oct 2 18:49:39.414846 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali4b12be785aa: link becomes ready Oct 2 18:49:39.414407 systemd-networkd[1457]: cali4b12be785aa: Gained carrier Oct 2 18:49:39.418466 (udev-worker)[4654]: Network interface NamePolicy= disabled on kernel command line. Oct 2 18:49:39.435963 env[1656]: 2023-10-02 18:49:39.099 [INFO][4618] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--16--118-k8s-calico--apiserver--845fbdf9fb--dd5n5-eth0 calico-apiserver-845fbdf9fb- calico-apiserver c7fc7a94-c50f-45c6-81d1-31244ce0f455 786 0 2023-10-02 18:49:37 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:845fbdf9fb projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ip-172-31-16-118 calico-apiserver-845fbdf9fb-dd5n5 eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali4b12be785aa [] []}} ContainerID="b8066f85784b53780df1839e2ec683beb5023a063d9a742f85f5c149db25db74" Namespace="calico-apiserver" Pod="calico-apiserver-845fbdf9fb-dd5n5" WorkloadEndpoint="ip--172--31--16--118-k8s-calico--apiserver--845fbdf9fb--dd5n5-" Oct 2 18:49:39.435963 env[1656]: 2023-10-02 18:49:39.099 [INFO][4618] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="b8066f85784b53780df1839e2ec683beb5023a063d9a742f85f5c149db25db74" Namespace="calico-apiserver" Pod="calico-apiserver-845fbdf9fb-dd5n5" WorkloadEndpoint="ip--172--31--16--118-k8s-calico--apiserver--845fbdf9fb--dd5n5-eth0" Oct 2 18:49:39.435963 env[1656]: 2023-10-02 18:49:39.251 [INFO][4641] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="b8066f85784b53780df1839e2ec683beb5023a063d9a742f85f5c149db25db74" HandleID="k8s-pod-network.b8066f85784b53780df1839e2ec683beb5023a063d9a742f85f5c149db25db74" Workload="ip--172--31--16--118-k8s-calico--apiserver--845fbdf9fb--dd5n5-eth0" Oct 2 18:49:39.435963 env[1656]: 2023-10-02 18:49:39.297 [INFO][4641] ipam_plugin.go 269: Auto assigning IP ContainerID="b8066f85784b53780df1839e2ec683beb5023a063d9a742f85f5c149db25db74" HandleID="k8s-pod-network.b8066f85784b53780df1839e2ec683beb5023a063d9a742f85f5c149db25db74" Workload="ip--172--31--16--118-k8s-calico--apiserver--845fbdf9fb--dd5n5-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40001023e0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ip-172-31-16-118", "pod":"calico-apiserver-845fbdf9fb-dd5n5", "timestamp":"2023-10-02 18:49:39.250664472 +0000 UTC"}, Hostname:"ip-172-31-16-118", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 2 18:49:39.435963 env[1656]: time="2023-10-02T18:49:39Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 18:49:39.435963 env[1656]: time="2023-10-02T18:49:39Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 18:49:39.435963 env[1656]: 2023-10-02 18:49:39.297 [INFO][4641] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-16-118' Oct 2 18:49:39.435963 env[1656]: 2023-10-02 18:49:39.320 [INFO][4641] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.b8066f85784b53780df1839e2ec683beb5023a063d9a742f85f5c149db25db74" host="ip-172-31-16-118" Oct 2 18:49:39.435963 env[1656]: 2023-10-02 18:49:39.347 [INFO][4641] ipam.go 372: Looking up existing affinities for host host="ip-172-31-16-118" Oct 2 18:49:39.435963 env[1656]: 2023-10-02 18:49:39.357 [INFO][4641] ipam.go 489: Trying affinity for 192.168.63.192/26 host="ip-172-31-16-118" Oct 2 18:49:39.435963 env[1656]: 2023-10-02 18:49:39.361 [INFO][4641] ipam.go 155: Attempting to load block cidr=192.168.63.192/26 host="ip-172-31-16-118" Oct 2 18:49:39.435963 env[1656]: 2023-10-02 18:49:39.366 [INFO][4641] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.63.192/26 host="ip-172-31-16-118" Oct 2 18:49:39.435963 env[1656]: 2023-10-02 18:49:39.366 [INFO][4641] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.63.192/26 handle="k8s-pod-network.b8066f85784b53780df1839e2ec683beb5023a063d9a742f85f5c149db25db74" host="ip-172-31-16-118" Oct 2 18:49:39.435963 env[1656]: 2023-10-02 18:49:39.369 [INFO][4641] ipam.go 1682: Creating new handle: k8s-pod-network.b8066f85784b53780df1839e2ec683beb5023a063d9a742f85f5c149db25db74 Oct 2 18:49:39.435963 env[1656]: 2023-10-02 18:49:39.376 [INFO][4641] ipam.go 1203: Writing block in order to claim IPs block=192.168.63.192/26 handle="k8s-pod-network.b8066f85784b53780df1839e2ec683beb5023a063d9a742f85f5c149db25db74" host="ip-172-31-16-118" Oct 2 18:49:39.435963 env[1656]: 2023-10-02 18:49:39.387 [INFO][4641] ipam.go 1216: Successfully claimed IPs: [192.168.63.197/26] block=192.168.63.192/26 handle="k8s-pod-network.b8066f85784b53780df1839e2ec683beb5023a063d9a742f85f5c149db25db74" host="ip-172-31-16-118" Oct 2 18:49:39.435963 env[1656]: 2023-10-02 18:49:39.387 [INFO][4641] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.63.197/26] handle="k8s-pod-network.b8066f85784b53780df1839e2ec683beb5023a063d9a742f85f5c149db25db74" host="ip-172-31-16-118" Oct 2 18:49:39.435963 env[1656]: time="2023-10-02T18:49:39Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 18:49:39.435963 env[1656]: 2023-10-02 18:49:39.387 [INFO][4641] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.63.197/26] IPv6=[] ContainerID="b8066f85784b53780df1839e2ec683beb5023a063d9a742f85f5c149db25db74" HandleID="k8s-pod-network.b8066f85784b53780df1839e2ec683beb5023a063d9a742f85f5c149db25db74" Workload="ip--172--31--16--118-k8s-calico--apiserver--845fbdf9fb--dd5n5-eth0" Oct 2 18:49:39.437489 env[1656]: 2023-10-02 18:49:39.391 [INFO][4618] k8s.go 383: Populated endpoint ContainerID="b8066f85784b53780df1839e2ec683beb5023a063d9a742f85f5c149db25db74" Namespace="calico-apiserver" Pod="calico-apiserver-845fbdf9fb-dd5n5" WorkloadEndpoint="ip--172--31--16--118-k8s-calico--apiserver--845fbdf9fb--dd5n5-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--16--118-k8s-calico--apiserver--845fbdf9fb--dd5n5-eth0", GenerateName:"calico-apiserver-845fbdf9fb-", Namespace:"calico-apiserver", SelfLink:"", UID:"c7fc7a94-c50f-45c6-81d1-31244ce0f455", ResourceVersion:"786", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 18, 49, 37, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"845fbdf9fb", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-16-118", ContainerID:"", Pod:"calico-apiserver-845fbdf9fb-dd5n5", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.63.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali4b12be785aa", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 18:49:39.437489 env[1656]: 2023-10-02 18:49:39.391 [INFO][4618] k8s.go 384: Calico CNI using IPs: [192.168.63.197/32] ContainerID="b8066f85784b53780df1839e2ec683beb5023a063d9a742f85f5c149db25db74" Namespace="calico-apiserver" Pod="calico-apiserver-845fbdf9fb-dd5n5" WorkloadEndpoint="ip--172--31--16--118-k8s-calico--apiserver--845fbdf9fb--dd5n5-eth0" Oct 2 18:49:39.437489 env[1656]: 2023-10-02 18:49:39.392 [INFO][4618] dataplane_linux.go 68: Setting the host side veth name to cali4b12be785aa ContainerID="b8066f85784b53780df1839e2ec683beb5023a063d9a742f85f5c149db25db74" Namespace="calico-apiserver" Pod="calico-apiserver-845fbdf9fb-dd5n5" WorkloadEndpoint="ip--172--31--16--118-k8s-calico--apiserver--845fbdf9fb--dd5n5-eth0" Oct 2 18:49:39.437489 env[1656]: 2023-10-02 18:49:39.393 [INFO][4618] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="b8066f85784b53780df1839e2ec683beb5023a063d9a742f85f5c149db25db74" Namespace="calico-apiserver" Pod="calico-apiserver-845fbdf9fb-dd5n5" WorkloadEndpoint="ip--172--31--16--118-k8s-calico--apiserver--845fbdf9fb--dd5n5-eth0" Oct 2 18:49:39.437489 env[1656]: 2023-10-02 18:49:39.416 [INFO][4618] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="b8066f85784b53780df1839e2ec683beb5023a063d9a742f85f5c149db25db74" Namespace="calico-apiserver" Pod="calico-apiserver-845fbdf9fb-dd5n5" WorkloadEndpoint="ip--172--31--16--118-k8s-calico--apiserver--845fbdf9fb--dd5n5-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--16--118-k8s-calico--apiserver--845fbdf9fb--dd5n5-eth0", GenerateName:"calico-apiserver-845fbdf9fb-", Namespace:"calico-apiserver", SelfLink:"", UID:"c7fc7a94-c50f-45c6-81d1-31244ce0f455", ResourceVersion:"786", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 18, 49, 37, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"845fbdf9fb", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-16-118", ContainerID:"b8066f85784b53780df1839e2ec683beb5023a063d9a742f85f5c149db25db74", Pod:"calico-apiserver-845fbdf9fb-dd5n5", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.63.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali4b12be785aa", MAC:"fe:2c:fb:f3:cb:26", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 18:49:39.437489 env[1656]: 2023-10-02 18:49:39.432 [INFO][4618] k8s.go 489: Wrote updated endpoint to datastore ContainerID="b8066f85784b53780df1839e2ec683beb5023a063d9a742f85f5c149db25db74" Namespace="calico-apiserver" Pod="calico-apiserver-845fbdf9fb-dd5n5" WorkloadEndpoint="ip--172--31--16--118-k8s-calico--apiserver--845fbdf9fb--dd5n5-eth0" Oct 2 18:49:39.514765 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali45e34421f46: link becomes ready Oct 2 18:49:39.528773 systemd-networkd[1457]: cali45e34421f46: Link UP Oct 2 18:49:39.529432 env[1656]: time="2023-10-02T18:49:39.525171674Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 18:49:39.529432 env[1656]: time="2023-10-02T18:49:39.525275752Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 18:49:39.529432 env[1656]: time="2023-10-02T18:49:39.525309821Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 18:49:39.528789 systemd-networkd[1457]: cali45e34421f46: Gained carrier Oct 2 18:49:39.547743 env[1656]: time="2023-10-02T18:49:39.537152722Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b8066f85784b53780df1839e2ec683beb5023a063d9a742f85f5c149db25db74 pid=4673 runtime=io.containerd.runc.v2 Oct 2 18:49:39.580147 env[1656]: 2023-10-02 18:49:39.160 [INFO][4629] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--16--118-k8s-calico--apiserver--845fbdf9fb--h4vwt-eth0 calico-apiserver-845fbdf9fb- calico-apiserver 5dfaf83b-bc8f-4c6b-8ab6-ed9409d87c2e 790 0 2023-10-02 18:49:37 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:845fbdf9fb projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ip-172-31-16-118 calico-apiserver-845fbdf9fb-h4vwt eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali45e34421f46 [] []}} ContainerID="2998fa86d6b43c0e5741693fcf2fd326d422e1ed7addc7a5dcca3eeb08e2859c" Namespace="calico-apiserver" Pod="calico-apiserver-845fbdf9fb-h4vwt" WorkloadEndpoint="ip--172--31--16--118-k8s-calico--apiserver--845fbdf9fb--h4vwt-" Oct 2 18:49:39.580147 env[1656]: 2023-10-02 18:49:39.161 [INFO][4629] k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="2998fa86d6b43c0e5741693fcf2fd326d422e1ed7addc7a5dcca3eeb08e2859c" Namespace="calico-apiserver" Pod="calico-apiserver-845fbdf9fb-h4vwt" WorkloadEndpoint="ip--172--31--16--118-k8s-calico--apiserver--845fbdf9fb--h4vwt-eth0" Oct 2 18:49:39.580147 env[1656]: 2023-10-02 18:49:39.322 [INFO][4647] ipam_plugin.go 229: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="2998fa86d6b43c0e5741693fcf2fd326d422e1ed7addc7a5dcca3eeb08e2859c" HandleID="k8s-pod-network.2998fa86d6b43c0e5741693fcf2fd326d422e1ed7addc7a5dcca3eeb08e2859c" Workload="ip--172--31--16--118-k8s-calico--apiserver--845fbdf9fb--h4vwt-eth0" Oct 2 18:49:39.580147 env[1656]: 2023-10-02 18:49:39.350 [INFO][4647] ipam_plugin.go 269: Auto assigning IP ContainerID="2998fa86d6b43c0e5741693fcf2fd326d422e1ed7addc7a5dcca3eeb08e2859c" HandleID="k8s-pod-network.2998fa86d6b43c0e5741693fcf2fd326d422e1ed7addc7a5dcca3eeb08e2859c" Workload="ip--172--31--16--118-k8s-calico--apiserver--845fbdf9fb--h4vwt-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40001023e0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ip-172-31-16-118", "pod":"calico-apiserver-845fbdf9fb-h4vwt", "timestamp":"2023-10-02 18:49:39.32223502 +0000 UTC"}, Hostname:"ip-172-31-16-118", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 2 18:49:39.580147 env[1656]: time="2023-10-02T18:49:39Z" level=info msg="About to acquire host-wide IPAM lock." source="ipam_plugin.go:357" Oct 2 18:49:39.580147 env[1656]: time="2023-10-02T18:49:39Z" level=info msg="Acquired host-wide IPAM lock." source="ipam_plugin.go:372" Oct 2 18:49:39.580147 env[1656]: 2023-10-02 18:49:39.389 [INFO][4647] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-16-118' Oct 2 18:49:39.580147 env[1656]: 2023-10-02 18:49:39.398 [INFO][4647] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.2998fa86d6b43c0e5741693fcf2fd326d422e1ed7addc7a5dcca3eeb08e2859c" host="ip-172-31-16-118" Oct 2 18:49:39.580147 env[1656]: 2023-10-02 18:49:39.424 [INFO][4647] ipam.go 372: Looking up existing affinities for host host="ip-172-31-16-118" Oct 2 18:49:39.580147 env[1656]: 2023-10-02 18:49:39.447 [INFO][4647] ipam.go 489: Trying affinity for 192.168.63.192/26 host="ip-172-31-16-118" Oct 2 18:49:39.580147 env[1656]: 2023-10-02 18:49:39.451 [INFO][4647] ipam.go 155: Attempting to load block cidr=192.168.63.192/26 host="ip-172-31-16-118" Oct 2 18:49:39.580147 env[1656]: 2023-10-02 18:49:39.466 [INFO][4647] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.63.192/26 host="ip-172-31-16-118" Oct 2 18:49:39.580147 env[1656]: 2023-10-02 18:49:39.466 [INFO][4647] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.63.192/26 handle="k8s-pod-network.2998fa86d6b43c0e5741693fcf2fd326d422e1ed7addc7a5dcca3eeb08e2859c" host="ip-172-31-16-118" Oct 2 18:49:39.580147 env[1656]: 2023-10-02 18:49:39.469 [INFO][4647] ipam.go 1682: Creating new handle: k8s-pod-network.2998fa86d6b43c0e5741693fcf2fd326d422e1ed7addc7a5dcca3eeb08e2859c Oct 2 18:49:39.580147 env[1656]: 2023-10-02 18:49:39.481 [INFO][4647] ipam.go 1203: Writing block in order to claim IPs block=192.168.63.192/26 handle="k8s-pod-network.2998fa86d6b43c0e5741693fcf2fd326d422e1ed7addc7a5dcca3eeb08e2859c" host="ip-172-31-16-118" Oct 2 18:49:39.580147 env[1656]: 2023-10-02 18:49:39.502 [INFO][4647] ipam.go 1216: Successfully claimed IPs: [192.168.63.198/26] block=192.168.63.192/26 handle="k8s-pod-network.2998fa86d6b43c0e5741693fcf2fd326d422e1ed7addc7a5dcca3eeb08e2859c" host="ip-172-31-16-118" Oct 2 18:49:39.580147 env[1656]: 2023-10-02 18:49:39.502 [INFO][4647] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.63.198/26] handle="k8s-pod-network.2998fa86d6b43c0e5741693fcf2fd326d422e1ed7addc7a5dcca3eeb08e2859c" host="ip-172-31-16-118" Oct 2 18:49:39.580147 env[1656]: time="2023-10-02T18:49:39Z" level=info msg="Released host-wide IPAM lock." source="ipam_plugin.go:378" Oct 2 18:49:39.580147 env[1656]: 2023-10-02 18:49:39.502 [INFO][4647] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[192.168.63.198/26] IPv6=[] ContainerID="2998fa86d6b43c0e5741693fcf2fd326d422e1ed7addc7a5dcca3eeb08e2859c" HandleID="k8s-pod-network.2998fa86d6b43c0e5741693fcf2fd326d422e1ed7addc7a5dcca3eeb08e2859c" Workload="ip--172--31--16--118-k8s-calico--apiserver--845fbdf9fb--h4vwt-eth0" Oct 2 18:49:39.581549 env[1656]: 2023-10-02 18:49:39.506 [INFO][4629] k8s.go 383: Populated endpoint ContainerID="2998fa86d6b43c0e5741693fcf2fd326d422e1ed7addc7a5dcca3eeb08e2859c" Namespace="calico-apiserver" Pod="calico-apiserver-845fbdf9fb-h4vwt" WorkloadEndpoint="ip--172--31--16--118-k8s-calico--apiserver--845fbdf9fb--h4vwt-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--16--118-k8s-calico--apiserver--845fbdf9fb--h4vwt-eth0", GenerateName:"calico-apiserver-845fbdf9fb-", Namespace:"calico-apiserver", SelfLink:"", UID:"5dfaf83b-bc8f-4c6b-8ab6-ed9409d87c2e", ResourceVersion:"790", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 18, 49, 37, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"845fbdf9fb", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-16-118", ContainerID:"", Pod:"calico-apiserver-845fbdf9fb-h4vwt", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.63.198/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali45e34421f46", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 18:49:39.581549 env[1656]: 2023-10-02 18:49:39.506 [INFO][4629] k8s.go 384: Calico CNI using IPs: [192.168.63.198/32] ContainerID="2998fa86d6b43c0e5741693fcf2fd326d422e1ed7addc7a5dcca3eeb08e2859c" Namespace="calico-apiserver" Pod="calico-apiserver-845fbdf9fb-h4vwt" WorkloadEndpoint="ip--172--31--16--118-k8s-calico--apiserver--845fbdf9fb--h4vwt-eth0" Oct 2 18:49:39.581549 env[1656]: 2023-10-02 18:49:39.506 [INFO][4629] dataplane_linux.go 68: Setting the host side veth name to cali45e34421f46 ContainerID="2998fa86d6b43c0e5741693fcf2fd326d422e1ed7addc7a5dcca3eeb08e2859c" Namespace="calico-apiserver" Pod="calico-apiserver-845fbdf9fb-h4vwt" WorkloadEndpoint="ip--172--31--16--118-k8s-calico--apiserver--845fbdf9fb--h4vwt-eth0" Oct 2 18:49:39.581549 env[1656]: 2023-10-02 18:49:39.515 [INFO][4629] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID="2998fa86d6b43c0e5741693fcf2fd326d422e1ed7addc7a5dcca3eeb08e2859c" Namespace="calico-apiserver" Pod="calico-apiserver-845fbdf9fb-h4vwt" WorkloadEndpoint="ip--172--31--16--118-k8s-calico--apiserver--845fbdf9fb--h4vwt-eth0" Oct 2 18:49:39.581549 env[1656]: 2023-10-02 18:49:39.533 [INFO][4629] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID="2998fa86d6b43c0e5741693fcf2fd326d422e1ed7addc7a5dcca3eeb08e2859c" Namespace="calico-apiserver" Pod="calico-apiserver-845fbdf9fb-h4vwt" WorkloadEndpoint="ip--172--31--16--118-k8s-calico--apiserver--845fbdf9fb--h4vwt-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--16--118-k8s-calico--apiserver--845fbdf9fb--h4vwt-eth0", GenerateName:"calico-apiserver-845fbdf9fb-", Namespace:"calico-apiserver", SelfLink:"", UID:"5dfaf83b-bc8f-4c6b-8ab6-ed9409d87c2e", ResourceVersion:"790", Generation:0, CreationTimestamp:time.Date(2023, time.October, 2, 18, 49, 37, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"845fbdf9fb", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ZZZ_DeprecatedClusterName:"", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-16-118", ContainerID:"2998fa86d6b43c0e5741693fcf2fd326d422e1ed7addc7a5dcca3eeb08e2859c", Pod:"calico-apiserver-845fbdf9fb-h4vwt", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.63.198/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali45e34421f46", MAC:"32:83:72:f7:27:ff", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Oct 2 18:49:39.581549 env[1656]: 2023-10-02 18:49:39.565 [INFO][4629] k8s.go 489: Wrote updated endpoint to datastore ContainerID="2998fa86d6b43c0e5741693fcf2fd326d422e1ed7addc7a5dcca3eeb08e2859c" Namespace="calico-apiserver" Pod="calico-apiserver-845fbdf9fb-h4vwt" WorkloadEndpoint="ip--172--31--16--118-k8s-calico--apiserver--845fbdf9fb--h4vwt-eth0" Oct 2 18:49:39.634467 systemd[1]: Started cri-containerd-b8066f85784b53780df1839e2ec683beb5023a063d9a742f85f5c149db25db74.scope. Oct 2 18:49:39.672226 env[1656]: time="2023-10-02T18:49:39.671678718Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 2 18:49:39.672226 env[1656]: time="2023-10-02T18:49:39.671762672Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 2 18:49:39.672226 env[1656]: time="2023-10-02T18:49:39.671789193Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 2 18:49:39.676200 env[1656]: time="2023-10-02T18:49:39.676056374Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2998fa86d6b43c0e5741693fcf2fd326d422e1ed7addc7a5dcca3eeb08e2859c pid=4715 runtime=io.containerd.runc.v2 Oct 2 18:49:39.734133 systemd[1]: Started cri-containerd-2998fa86d6b43c0e5741693fcf2fd326d422e1ed7addc7a5dcca3eeb08e2859c.scope. Oct 2 18:49:39.741000 audit[4725]: NETFILTER_CFG table=filter:125 family=2 entries=59 op=nft_register_chain pid=4725 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 18:49:39.741000 audit[4725]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=29292 a0=3 a1=ffffd36775e0 a2=0 a3=ffff92ecefa0 items=0 ppid=4104 pid=4725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:39.741000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 18:49:39.753000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:39.753000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:39.753000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:39.753000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:39.753000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:39.753000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:39.753000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:39.753000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:39.753000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:39.754000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:39.754000 audit: BPF prog-id=185 op=LOAD Oct 2 18:49:39.754000 audit[4687]: AVC avc: denied { bpf } for pid=4687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:39.754000 audit[4687]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=4673 pid=4687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:39.754000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238303636663835373834623533373830646631383339653265633638 Oct 2 18:49:39.754000 audit[4687]: AVC avc: denied { perfmon } for pid=4687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:39.754000 audit[4687]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=4673 pid=4687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:39.754000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238303636663835373834623533373830646631383339653265633638 Oct 2 18:49:39.755000 audit[4687]: AVC avc: denied { bpf } for pid=4687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:39.755000 audit[4687]: AVC avc: denied { bpf } for pid=4687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:39.755000 audit[4687]: AVC avc: denied { bpf } for pid=4687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:39.755000 audit[4687]: AVC avc: denied { perfmon } for pid=4687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:39.755000 audit[4687]: AVC avc: denied { perfmon } for pid=4687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:39.755000 audit[4687]: AVC avc: denied { perfmon } for pid=4687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:39.755000 audit[4687]: AVC avc: denied { perfmon } for pid=4687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:39.755000 audit[4687]: AVC avc: denied { perfmon } for pid=4687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:39.755000 audit[4687]: AVC avc: denied { bpf } for pid=4687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:39.755000 audit[4687]: AVC avc: denied { bpf } for pid=4687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:39.755000 audit: BPF prog-id=186 op=LOAD Oct 2 18:49:39.755000 audit[4687]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=4673 pid=4687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:39.755000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238303636663835373834623533373830646631383339653265633638 Oct 2 18:49:39.755000 audit[4687]: AVC avc: denied { bpf } for pid=4687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:39.755000 audit[4687]: AVC avc: denied { bpf } for pid=4687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:39.755000 audit[4687]: AVC avc: denied { perfmon } for pid=4687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:39.755000 audit[4687]: AVC avc: denied { perfmon } for pid=4687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:39.755000 audit[4687]: AVC avc: denied { perfmon } for pid=4687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:39.755000 audit[4687]: AVC avc: denied { perfmon } for pid=4687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:39.755000 audit[4687]: AVC avc: denied { perfmon } for pid=4687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:39.755000 audit[4687]: AVC avc: denied { bpf } for pid=4687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:39.755000 audit[4687]: AVC avc: denied { bpf } for pid=4687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:39.755000 audit: BPF prog-id=187 op=LOAD Oct 2 18:49:39.755000 audit[4687]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=4673 pid=4687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:39.755000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238303636663835373834623533373830646631383339653265633638 Oct 2 18:49:39.755000 audit: BPF prog-id=187 op=UNLOAD Oct 2 18:49:39.755000 audit: BPF prog-id=186 op=UNLOAD Oct 2 18:49:39.755000 audit[4687]: AVC avc: denied { bpf } for pid=4687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:39.755000 audit[4687]: AVC avc: denied { bpf } for pid=4687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:39.755000 audit[4687]: AVC avc: denied { bpf } for pid=4687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:39.755000 audit[4687]: AVC avc: denied { perfmon } for pid=4687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:39.755000 audit[4687]: AVC avc: denied { perfmon } for pid=4687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:39.755000 audit[4687]: AVC avc: denied { perfmon } for pid=4687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:39.755000 audit[4687]: AVC avc: denied { perfmon } for pid=4687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:39.755000 audit[4687]: AVC avc: denied { perfmon } for pid=4687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:39.755000 audit[4687]: AVC avc: denied { bpf } for pid=4687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:39.755000 audit[4687]: AVC avc: denied { bpf } for pid=4687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:39.755000 audit: BPF prog-id=188 op=LOAD Oct 2 18:49:39.755000 audit[4687]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=4673 pid=4687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:39.755000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238303636663835373834623533373830646631383339653265633638 Oct 2 18:49:39.824000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:39.824000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:39.824000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:39.824000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:39.824000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:39.824000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:39.824000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:39.824000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:39.824000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:39.824000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:39.824000 audit: BPF prog-id=189 op=LOAD Oct 2 18:49:39.825000 audit[4734]: AVC avc: denied { bpf } for pid=4734 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:39.825000 audit[4734]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=4715 pid=4734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:39.825000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239393866613836643662343363306535373431363933666366326664 Oct 2 18:49:39.825000 audit[4734]: AVC avc: denied { perfmon } for pid=4734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:39.825000 audit[4734]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=4715 pid=4734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:39.825000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239393866613836643662343363306535373431363933666366326664 Oct 2 18:49:39.825000 audit[4734]: AVC avc: denied { bpf } for pid=4734 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:39.825000 audit[4734]: AVC avc: denied { bpf } for pid=4734 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:39.825000 audit[4734]: AVC avc: denied { bpf } for pid=4734 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:39.825000 audit[4734]: AVC avc: denied { perfmon } for pid=4734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:39.825000 audit[4734]: AVC avc: denied { perfmon } for pid=4734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:39.825000 audit[4734]: AVC avc: denied { perfmon } for pid=4734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:39.825000 audit[4734]: AVC avc: denied { perfmon } for pid=4734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:39.825000 audit[4734]: AVC avc: denied { perfmon } for pid=4734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:39.825000 audit[4734]: AVC avc: denied { bpf } for pid=4734 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:39.825000 audit[4734]: AVC avc: denied { bpf } for pid=4734 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:39.825000 audit: BPF prog-id=190 op=LOAD Oct 2 18:49:39.825000 audit[4734]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=4715 pid=4734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:39.825000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239393866613836643662343363306535373431363933666366326664 Oct 2 18:49:39.826000 audit[4734]: AVC avc: denied { bpf } for pid=4734 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:39.826000 audit[4734]: AVC avc: denied { bpf } for pid=4734 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:39.826000 audit[4734]: AVC avc: denied { perfmon } for pid=4734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:39.826000 audit[4734]: AVC avc: denied { perfmon } for pid=4734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:39.826000 audit[4734]: AVC avc: denied { perfmon } for pid=4734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:39.826000 audit[4734]: AVC avc: denied { perfmon } for pid=4734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:39.826000 audit[4734]: AVC avc: denied { perfmon } for pid=4734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:39.826000 audit[4734]: AVC avc: denied { bpf } for pid=4734 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:39.826000 audit[4734]: AVC avc: denied { bpf } for pid=4734 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:39.826000 audit: BPF prog-id=191 op=LOAD Oct 2 18:49:39.826000 audit[4734]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=4715 pid=4734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:39.826000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239393866613836643662343363306535373431363933666366326664 Oct 2 18:49:39.826000 audit: BPF prog-id=191 op=UNLOAD Oct 2 18:49:39.826000 audit: BPF prog-id=190 op=UNLOAD Oct 2 18:49:39.826000 audit[4734]: AVC avc: denied { bpf } for pid=4734 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:39.826000 audit[4734]: AVC avc: denied { bpf } for pid=4734 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:39.826000 audit[4734]: AVC avc: denied { bpf } for pid=4734 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:39.826000 audit[4734]: AVC avc: denied { perfmon } for pid=4734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:39.826000 audit[4734]: AVC avc: denied { perfmon } for pid=4734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:39.826000 audit[4734]: AVC avc: denied { perfmon } for pid=4734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:39.826000 audit[4734]: AVC avc: denied { perfmon } for pid=4734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:39.826000 audit[4734]: AVC avc: denied { perfmon } for pid=4734 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:39.826000 audit[4734]: AVC avc: denied { bpf } for pid=4734 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:39.826000 audit[4734]: AVC avc: denied { bpf } for pid=4734 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:49:39.826000 audit: BPF prog-id=192 op=LOAD Oct 2 18:49:39.826000 audit[4734]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=4715 pid=4734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:39.826000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239393866613836643662343363306535373431363933666366326664 Oct 2 18:49:39.835000 audit[4758]: NETFILTER_CFG table=filter:126 family=2 entries=56 op=nft_register_chain pid=4758 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 2 18:49:39.835000 audit[4758]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=27348 a0=3 a1=ffffe5fac860 a2=0 a3=ffffa3636fa0 items=0 ppid=4104 pid=4758 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:39.835000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 2 18:49:39.848043 env[1656]: time="2023-10-02T18:49:39.847973504Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-845fbdf9fb-dd5n5,Uid:c7fc7a94-c50f-45c6-81d1-31244ce0f455,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"b8066f85784b53780df1839e2ec683beb5023a063d9a742f85f5c149db25db74\"" Oct 2 18:49:39.851770 env[1656]: time="2023-10-02T18:49:39.851719225Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\"" Oct 2 18:49:39.901655 env[1656]: time="2023-10-02T18:49:39.901597867Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-845fbdf9fb-h4vwt,Uid:5dfaf83b-bc8f-4c6b-8ab6-ed9409d87c2e,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"2998fa86d6b43c0e5741693fcf2fd326d422e1ed7addc7a5dcca3eeb08e2859c\"" Oct 2 18:49:40.033865 env[1656]: time="2023-10-02T18:49:40.033790340Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 18:49:40.036174 env[1656]: time="2023-10-02T18:49:40.036097249Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 18:49:40.036721 kubelet[2886]: E1002 18:49:40.036660 2886 remote_image.go:242] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 18:49:40.037288 kubelet[2886]: E1002 18:49:40.036771 2886 kuberuntime_image.go:51] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 18:49:40.037363 env[1656]: time="2023-10-02T18:49:40.037283645Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\"" Oct 2 18:49:40.037989 kubelet[2886]: E1002 18:49:40.037732 2886 kuberuntime_manager.go:862] container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.25.0,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-2l2mg,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/version,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:90,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/code/filecheck],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:5,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:5,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*false,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod calico-apiserver-845fbdf9fb-dd5n5_calico-apiserver(c7fc7a94-c50f-45c6-81d1-31244ce0f455): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 18:49:40.037989 kubelet[2886]: E1002 18:49:40.037818 2886 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-apiserver/calico-apiserver-845fbdf9fb-dd5n5" podUID=c7fc7a94-c50f-45c6-81d1-31244ce0f455 Oct 2 18:49:40.128472 kubelet[2886]: E1002 18:49:40.128436 2886 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-845fbdf9fb-dd5n5" podUID=c7fc7a94-c50f-45c6-81d1-31244ce0f455 Oct 2 18:49:40.225667 env[1656]: time="2023-10-02T18:49:40.225583554Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 18:49:40.227362 env[1656]: time="2023-10-02T18:49:40.227270277Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 18:49:40.227946 kubelet[2886]: E1002 18:49:40.227903 2886 remote_image.go:242] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 18:49:40.228173 kubelet[2886]: E1002 18:49:40.228131 2886 kuberuntime_image.go:51] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 18:49:40.230034 kubelet[2886]: E1002 18:49:40.229975 2886 kuberuntime_manager.go:862] container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.25.0,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-sv7bs,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/version,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:90,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/code/filecheck],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:5,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:5,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*false,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod calico-apiserver-845fbdf9fb-h4vwt_calico-apiserver(5dfaf83b-bc8f-4c6b-8ab6-ed9409d87c2e): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 18:49:40.240435 kubelet[2886]: E1002 18:49:40.240387 2886 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-apiserver/calico-apiserver-845fbdf9fb-h4vwt" podUID=5dfaf83b-bc8f-4c6b-8ab6-ed9409d87c2e Oct 2 18:49:40.290000 audit[4792]: NETFILTER_CFG table=filter:127 family=2 entries=8 op=nft_register_rule pid=4792 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 18:49:40.290000 audit[4792]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2620 a0=3 a1=ffffc7d1bc20 a2=0 a3=ffffb2f266c0 items=0 ppid=3046 pid=4792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:40.290000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 18:49:40.297000 audit[4792]: NETFILTER_CFG table=nat:128 family=2 entries=78 op=nft_register_rule pid=4792 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 18:49:40.297000 audit[4792]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=24988 a0=3 a1=ffffc7d1bc20 a2=0 a3=ffffb2f266c0 items=0 ppid=3046 pid=4792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:40.297000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 18:49:41.132051 kubelet[2886]: E1002 18:49:41.131995 2886 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-845fbdf9fb-dd5n5" podUID=c7fc7a94-c50f-45c6-81d1-31244ce0f455 Oct 2 18:49:41.133541 kubelet[2886]: E1002 18:49:41.133470 2886 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-845fbdf9fb-h4vwt" podUID=5dfaf83b-bc8f-4c6b-8ab6-ed9409d87c2e Oct 2 18:49:41.180834 systemd-networkd[1457]: cali45e34421f46: Gained IPv6LL Oct 2 18:49:41.245808 systemd-networkd[1457]: cali4b12be785aa: Gained IPv6LL Oct 2 18:49:41.381000 audit[4820]: NETFILTER_CFG table=filter:129 family=2 entries=8 op=nft_register_rule pid=4820 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 18:49:41.385588 kernel: kauditd_printk_skb: 152 callbacks suppressed Oct 2 18:49:41.385707 kernel: audit: type=1325 audit(1696272581.381:1385): table=filter:129 family=2 entries=8 op=nft_register_rule pid=4820 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 18:49:41.381000 audit[4820]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2620 a0=3 a1=fffff3d5bf20 a2=0 a3=ffff9127d6c0 items=0 ppid=3046 pid=4820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:41.404134 kernel: audit: type=1300 audit(1696272581.381:1385): arch=c00000b7 syscall=211 success=yes exit=2620 a0=3 a1=fffff3d5bf20 a2=0 a3=ffff9127d6c0 items=0 ppid=3046 pid=4820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:41.381000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 18:49:41.410397 kernel: audit: type=1327 audit(1696272581.381:1385): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 18:49:41.396000 audit[4820]: NETFILTER_CFG table=nat:130 family=2 entries=78 op=nft_register_rule pid=4820 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 18:49:41.396000 audit[4820]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=24988 a0=3 a1=fffff3d5bf20 a2=0 a3=ffff9127d6c0 items=0 ppid=3046 pid=4820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:41.433103 kernel: audit: type=1325 audit(1696272581.396:1386): table=nat:130 family=2 entries=78 op=nft_register_rule pid=4820 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 2 18:49:41.433236 kernel: audit: type=1300 audit(1696272581.396:1386): arch=c00000b7 syscall=211 success=yes exit=24988 a0=3 a1=fffff3d5bf20 a2=0 a3=ffff9127d6c0 items=0 ppid=3046 pid=4820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:41.396000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 18:49:41.439748 kernel: audit: type=1327 audit(1696272581.396:1386): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 2 18:49:41.806051 env[1656]: time="2023-10-02T18:49:41.805998937Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\"" Oct 2 18:49:41.996773 env[1656]: time="2023-10-02T18:49:41.996660242Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 18:49:41.998582 env[1656]: time="2023-10-02T18:49:41.998470831Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 18:49:41.999868 kubelet[2886]: E1002 18:49:41.999017 2886 remote_image.go:242] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 18:49:41.999868 kubelet[2886]: E1002 18:49:41.999076 2886 kuberuntime_image.go:51] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 18:49:41.999868 kubelet[2886]: E1002 18:49:41.999200 2886 kuberuntime_manager.go:862] container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.25.0,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:etccalico,ReadOnly:false,MountPath:/etc/calico,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,},VolumeMount{Name:kube-api-access-jtrz6,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod csi-node-driver-2xm2w_calico-system(e6ba647d-27de-403d-bc1a-97cd30c5337c): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/csi:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/csi:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 18:49:42.000975 env[1656]: time="2023-10-02T18:49:42.000904486Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\"" Oct 2 18:49:42.193932 env[1656]: time="2023-10-02T18:49:42.193746355Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 18:49:42.196487 env[1656]: time="2023-10-02T18:49:42.196377521Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 18:49:42.197356 kubelet[2886]: E1002 18:49:42.197025 2886 remote_image.go:242] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 18:49:42.197356 kubelet[2886]: E1002 18:49:42.197086 2886 kuberuntime_image.go:51] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 18:49:42.197356 kubelet[2886]: E1002 18:49:42.197218 2886 kuberuntime_manager.go:862] container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-jtrz6,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod csi-node-driver-2xm2w_calico-system(e6ba647d-27de-403d-bc1a-97cd30c5337c): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 18:49:42.197356 kubelet[2886]: E1002 18:49:42.197306 2886 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/csi-node-driver-2xm2w" podUID=e6ba647d-27de-403d-bc1a-97cd30c5337c Oct 2 18:49:44.504000 audit[2568]: AVC avc: denied { watch } for pid=2568 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=6812 scontext=system_u:system_r:svirt_lxc_net_t:s0:c112,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 18:49:44.504000 audit[2568]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=4000a12100 a2=fc6 a3=0 items=0 ppid=2409 pid=2568 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c112,c621 key=(null) Oct 2 18:49:44.528421 kernel: audit: type=1400 audit(1696272584.504:1387): avc: denied { watch } for pid=2568 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=6812 scontext=system_u:system_r:svirt_lxc_net_t:s0:c112,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 18:49:44.528621 kernel: audit: type=1300 audit(1696272584.504:1387): arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=4000a12100 a2=fc6 a3=0 items=0 ppid=2409 pid=2568 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c112,c621 key=(null) Oct 2 18:49:44.528680 kernel: audit: type=1327 audit(1696272584.504:1387): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 18:49:44.504000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 18:49:44.510000 audit[2568]: AVC avc: denied { watch } for pid=2568 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=6812 scontext=system_u:system_r:svirt_lxc_net_t:s0:c112,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 18:49:44.548731 kernel: audit: type=1400 audit(1696272584.510:1388): avc: denied { watch } for pid=2568 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=6812 scontext=system_u:system_r:svirt_lxc_net_t:s0:c112,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 18:49:44.510000 audit[2568]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=400062f260 a2=fc6 a3=0 items=0 ppid=2409 pid=2568 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c112,c621 key=(null) Oct 2 18:49:44.510000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 18:49:44.514000 audit[2568]: AVC avc: denied { watch } for pid=2568 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=6812 scontext=system_u:system_r:svirt_lxc_net_t:s0:c112,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 18:49:44.514000 audit[2568]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=4000a12280 a2=fc6 a3=0 items=0 ppid=2409 pid=2568 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c112,c621 key=(null) Oct 2 18:49:44.514000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 18:49:44.514000 audit[2568]: AVC avc: denied { watch } for pid=2568 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=6812 scontext=system_u:system_r:svirt_lxc_net_t:s0:c112,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 18:49:44.514000 audit[2568]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=400062f600 a2=fc6 a3=0 items=0 ppid=2409 pid=2568 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c112,c621 key=(null) Oct 2 18:49:44.514000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 18:49:44.957180 systemd[1]: run-containerd-runc-k8s.io-e0a8f8887c5ee4201e06e2bb70bb51407cd6b0e01daadeb765ef70b99dc882be-runc.WFq5IL.mount: Deactivated successfully. Oct 2 18:49:45.947547 systemd[1]: run-containerd-runc-k8s.io-1ca171773b1a69ccf09a1d5c6a02199e1a10fd681fe7126e7e06d1bc42bb2ddc-runc.JdOlmj.mount: Deactivated successfully. Oct 2 18:49:50.564000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-172.31.16.118:22-139.178.89.65:46232 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:50.565321 systemd[1]: Started sshd@7-172.31.16.118:22-139.178.89.65:46232.service. Oct 2 18:49:50.568197 kernel: kauditd_printk_skb: 8 callbacks suppressed Oct 2 18:49:50.568296 kernel: audit: type=1130 audit(1696272590.564:1391): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-172.31.16.118:22-139.178.89.65:46232 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:50.752000 audit[4899]: USER_ACCT pid=4899 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:49:50.754591 sshd[4899]: Accepted publickey for core from 139.178.89.65 port 46232 ssh2: RSA SHA256:ePkK8jKoGlhN3AxcTQ2G+RQZHD5kDZhw675IJmRySH8 Oct 2 18:49:50.766755 kernel: audit: type=1101 audit(1696272590.752:1392): pid=4899 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:49:50.766000 audit[4899]: CRED_ACQ pid=4899 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:49:50.768978 sshd[4899]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 18:49:50.786147 kernel: audit: type=1103 audit(1696272590.766:1393): pid=4899 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:49:50.786322 kernel: audit: type=1006 audit(1696272590.766:1394): pid=4899 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=8 res=1 Oct 2 18:49:50.766000 audit[4899]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe95aece0 a2=3 a3=1 items=0 ppid=1 pid=4899 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:50.797134 kernel: audit: type=1300 audit(1696272590.766:1394): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe95aece0 a2=3 a3=1 items=0 ppid=1 pid=4899 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:49:50.766000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 18:49:50.801531 kernel: audit: type=1327 audit(1696272590.766:1394): proctitle=737368643A20636F7265205B707269765D Oct 2 18:49:50.805689 systemd-logind[1641]: New session 8 of user core. Oct 2 18:49:50.807434 systemd[1]: Started session-8.scope. Oct 2 18:49:50.815000 audit[4899]: USER_START pid=4899 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:49:50.832061 kernel: audit: type=1105 audit(1696272590.815:1395): pid=4899 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:49:50.832216 kernel: audit: type=1103 audit(1696272590.829:1396): pid=4901 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:49:50.829000 audit[4901]: CRED_ACQ pid=4901 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:49:51.171956 sshd[4899]: pam_unix(sshd:session): session closed for user core Oct 2 18:49:51.173000 audit[4899]: USER_END pid=4899 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:49:51.179775 systemd[1]: session-8.scope: Deactivated successfully. Oct 2 18:49:51.181119 systemd[1]: sshd@7-172.31.16.118:22-139.178.89.65:46232.service: Deactivated successfully. Oct 2 18:49:51.188719 systemd-logind[1641]: Session 8 logged out. Waiting for processes to exit. Oct 2 18:49:51.173000 audit[4899]: CRED_DISP pid=4899 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:49:51.198965 kernel: audit: type=1106 audit(1696272591.173:1397): pid=4899 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:49:51.199133 kernel: audit: type=1104 audit(1696272591.173:1398): pid=4899 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:49:51.200893 systemd-logind[1641]: Removed session 8. Oct 2 18:49:51.179000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-172.31.16.118:22-139.178.89.65:46232 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:49:52.806314 env[1656]: time="2023-10-02T18:49:52.806257303Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\"" Oct 2 18:49:52.977205 env[1656]: time="2023-10-02T18:49:52.977133205Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 18:49:52.978917 env[1656]: time="2023-10-02T18:49:52.978854947Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 18:49:52.979413 kubelet[2886]: E1002 18:49:52.979374 2886 remote_image.go:242] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 18:49:52.979975 kubelet[2886]: E1002 18:49:52.979459 2886 kuberuntime_image.go:51] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 18:49:52.979975 kubelet[2886]: E1002 18:49:52.979704 2886 kuberuntime_manager.go:862] container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.25.0,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-sv7bs,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/version,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:90,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/code/filecheck],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:5,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:5,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*false,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod calico-apiserver-845fbdf9fb-h4vwt_calico-apiserver(5dfaf83b-bc8f-4c6b-8ab6-ed9409d87c2e): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 18:49:52.979975 kubelet[2886]: E1002 18:49:52.979800 2886 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-apiserver/calico-apiserver-845fbdf9fb-h4vwt" podUID=5dfaf83b-bc8f-4c6b-8ab6-ed9409d87c2e Oct 2 18:49:53.809502 env[1656]: time="2023-10-02T18:49:53.809435405Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\"" Oct 2 18:49:53.820458 kubelet[2886]: E1002 18:49:53.820391 2886 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-2xm2w" podUID=e6ba647d-27de-403d-bc1a-97cd30c5337c Oct 2 18:49:54.012509 env[1656]: time="2023-10-02T18:49:54.012256265Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 18:49:54.014037 env[1656]: time="2023-10-02T18:49:54.013878043Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 18:49:54.014469 kubelet[2886]: E1002 18:49:54.014420 2886 remote_image.go:242] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 18:49:54.015104 kubelet[2886]: E1002 18:49:54.015066 2886 kuberuntime_image.go:51] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 18:49:54.015448 kubelet[2886]: E1002 18:49:54.015417 2886 kuberuntime_manager.go:862] container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.25.0,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-2l2mg,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/version,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:90,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/code/filecheck],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:5,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:5,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*false,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod calico-apiserver-845fbdf9fb-dd5n5_calico-apiserver(c7fc7a94-c50f-45c6-81d1-31244ce0f455): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 18:49:54.015832 kubelet[2886]: E1002 18:49:54.015786 2886 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-apiserver/calico-apiserver-845fbdf9fb-dd5n5" podUID=c7fc7a94-c50f-45c6-81d1-31244ce0f455 Oct 2 18:49:54.969854 systemd[1]: run-containerd-runc-k8s.io-e0a8f8887c5ee4201e06e2bb70bb51407cd6b0e01daadeb765ef70b99dc882be-runc.UgIO3o.mount: Deactivated successfully. Oct 2 18:50:01.202294 systemd[1]: Started sshd@8-172.31.16.118:22-139.178.89.65:43724.service. Oct 2 18:50:01.202000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.31.16.118:22-139.178.89.65:43724 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:50:01.208601 kernel: kauditd_printk_skb: 1 callbacks suppressed Oct 2 18:50:01.208720 kernel: audit: type=1130 audit(1696272601.202:1400): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.31.16.118:22-139.178.89.65:43724 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:50:01.391000 audit[4978]: USER_ACCT pid=4978 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:50:01.392754 sshd[4978]: Accepted publickey for core from 139.178.89.65 port 43724 ssh2: RSA SHA256:ePkK8jKoGlhN3AxcTQ2G+RQZHD5kDZhw675IJmRySH8 Oct 2 18:50:01.397158 sshd[4978]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 18:50:01.391000 audit[4978]: CRED_ACQ pid=4978 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:50:01.412881 kernel: audit: type=1101 audit(1696272601.391:1401): pid=4978 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:50:01.413067 kernel: audit: type=1103 audit(1696272601.391:1402): pid=4978 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:50:01.420342 kernel: audit: type=1006 audit(1696272601.391:1403): pid=4978 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=9 res=1 Oct 2 18:50:01.391000 audit[4978]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffffa551bb0 a2=3 a3=1 items=0 ppid=1 pid=4978 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:01.431233 kernel: audit: type=1300 audit(1696272601.391:1403): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffffa551bb0 a2=3 a3=1 items=0 ppid=1 pid=4978 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:01.391000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 18:50:01.435689 kernel: audit: type=1327 audit(1696272601.391:1403): proctitle=737368643A20636F7265205B707269765D Oct 2 18:50:01.438295 systemd-logind[1641]: New session 9 of user core. Oct 2 18:50:01.439098 systemd[1]: Started session-9.scope. Oct 2 18:50:01.450000 audit[4978]: USER_START pid=4978 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:50:01.457000 audit[4980]: CRED_ACQ pid=4980 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:50:01.473343 kernel: audit: type=1105 audit(1696272601.450:1404): pid=4978 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:50:01.473474 kernel: audit: type=1103 audit(1696272601.457:1405): pid=4980 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:50:01.750242 sshd[4978]: pam_unix(sshd:session): session closed for user core Oct 2 18:50:01.753000 audit[4978]: USER_END pid=4978 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:50:01.753000 audit[4978]: CRED_DISP pid=4978 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:50:01.775686 kernel: audit: type=1106 audit(1696272601.753:1406): pid=4978 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:50:01.775845 kernel: audit: type=1104 audit(1696272601.753:1407): pid=4978 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:50:01.766795 systemd[1]: sshd@8-172.31.16.118:22-139.178.89.65:43724.service: Deactivated successfully. Oct 2 18:50:01.768326 systemd[1]: session-9.scope: Deactivated successfully. Oct 2 18:50:01.766000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.31.16.118:22-139.178.89.65:43724 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:50:01.771140 systemd-logind[1641]: Session 9 logged out. Waiting for processes to exit. Oct 2 18:50:01.773710 systemd-logind[1641]: Removed session 9. Oct 2 18:50:04.959981 systemd[1]: run-containerd-runc-k8s.io-e0a8f8887c5ee4201e06e2bb70bb51407cd6b0e01daadeb765ef70b99dc882be-runc.S4Bjp9.mount: Deactivated successfully. Oct 2 18:50:06.806311 env[1656]: time="2023-10-02T18:50:06.806246962Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\"" Oct 2 18:50:06.807034 kubelet[2886]: E1002 18:50:06.806345 2886 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-845fbdf9fb-dd5n5" podUID=c7fc7a94-c50f-45c6-81d1-31244ce0f455 Oct 2 18:50:06.982023 env[1656]: time="2023-10-02T18:50:06.981798909Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 18:50:06.983463 env[1656]: time="2023-10-02T18:50:06.983362300Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 18:50:06.983890 kubelet[2886]: E1002 18:50:06.983838 2886 remote_image.go:242] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 18:50:06.984078 kubelet[2886]: E1002 18:50:06.984057 2886 kuberuntime_image.go:51] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 18:50:06.984945 kubelet[2886]: E1002 18:50:06.984899 2886 kuberuntime_manager.go:862] container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.25.0,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:etccalico,ReadOnly:false,MountPath:/etc/calico,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,},VolumeMount{Name:kube-api-access-jtrz6,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod csi-node-driver-2xm2w_calico-system(e6ba647d-27de-403d-bc1a-97cd30c5337c): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/csi:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/csi:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 18:50:06.986763 env[1656]: time="2023-10-02T18:50:06.986430557Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\"" Oct 2 18:50:07.172598 env[1656]: time="2023-10-02T18:50:07.172181275Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 18:50:07.174104 env[1656]: time="2023-10-02T18:50:07.173993057Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 18:50:07.174501 kubelet[2886]: E1002 18:50:07.174445 2886 remote_image.go:242] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 18:50:07.174658 kubelet[2886]: E1002 18:50:07.174535 2886 kuberuntime_image.go:51] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 18:50:07.174747 kubelet[2886]: E1002 18:50:07.174707 2886 kuberuntime_manager.go:862] container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-jtrz6,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod csi-node-driver-2xm2w_calico-system(e6ba647d-27de-403d-bc1a-97cd30c5337c): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 18:50:07.174978 kubelet[2886]: E1002 18:50:07.174817 2886 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/csi-node-driver-2xm2w" podUID=e6ba647d-27de-403d-bc1a-97cd30c5337c Oct 2 18:50:07.807213 kubelet[2886]: E1002 18:50:07.807165 2886 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-845fbdf9fb-h4vwt" podUID=5dfaf83b-bc8f-4c6b-8ab6-ed9409d87c2e Oct 2 18:50:11.783205 systemd[1]: Started sshd@9-172.31.16.118:22-139.178.89.65:35904.service. Oct 2 18:50:11.783000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-172.31.16.118:22-139.178.89.65:35904 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:50:11.786172 kernel: kauditd_printk_skb: 1 callbacks suppressed Oct 2 18:50:11.786300 kernel: audit: type=1130 audit(1696272611.783:1409): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-172.31.16.118:22-139.178.89.65:35904 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:50:11.978000 audit[5058]: USER_ACCT pid=5058 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:50:11.983513 sshd[5058]: Accepted publickey for core from 139.178.89.65 port 35904 ssh2: RSA SHA256:ePkK8jKoGlhN3AxcTQ2G+RQZHD5kDZhw675IJmRySH8 Oct 2 18:50:11.984492 sshd[5058]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 18:50:11.981000 audit[5058]: CRED_ACQ pid=5058 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:50:11.999196 kernel: audit: type=1101 audit(1696272611.978:1410): pid=5058 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:50:11.999391 kernel: audit: type=1103 audit(1696272611.981:1411): pid=5058 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:50:12.006685 kernel: audit: type=1006 audit(1696272611.981:1412): pid=5058 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 Oct 2 18:50:11.981000 audit[5058]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc0cb1570 a2=3 a3=1 items=0 ppid=1 pid=5058 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:12.017506 kernel: audit: type=1300 audit(1696272611.981:1412): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc0cb1570 a2=3 a3=1 items=0 ppid=1 pid=5058 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:12.017929 kernel: audit: type=1327 audit(1696272611.981:1412): proctitle=737368643A20636F7265205B707269765D Oct 2 18:50:11.981000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 18:50:12.024676 systemd-logind[1641]: New session 10 of user core. Oct 2 18:50:12.025816 systemd[1]: Started session-10.scope. Oct 2 18:50:12.035000 audit[5058]: USER_START pid=5058 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:50:12.042000 audit[5062]: CRED_ACQ pid=5062 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:50:12.057644 kernel: audit: type=1105 audit(1696272612.035:1413): pid=5058 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:50:12.057804 kernel: audit: type=1103 audit(1696272612.042:1414): pid=5062 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:50:12.317752 sshd[5058]: pam_unix(sshd:session): session closed for user core Oct 2 18:50:12.320000 audit[5058]: USER_END pid=5058 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:50:12.324905 systemd[1]: session-10.scope: Deactivated successfully. Oct 2 18:50:12.326218 systemd[1]: sshd@9-172.31.16.118:22-139.178.89.65:35904.service: Deactivated successfully. Oct 2 18:50:12.321000 audit[5058]: CRED_DISP pid=5058 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:50:12.342165 kernel: audit: type=1106 audit(1696272612.320:1415): pid=5058 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:50:12.342271 kernel: audit: type=1104 audit(1696272612.321:1416): pid=5058 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:50:12.326000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-172.31.16.118:22-139.178.89.65:35904 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:50:12.344269 systemd-logind[1641]: Session 10 logged out. Waiting for processes to exit. Oct 2 18:50:12.354453 systemd[1]: Started sshd@10-172.31.16.118:22-139.178.89.65:35910.service. Oct 2 18:50:12.354000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-172.31.16.118:22-139.178.89.65:35910 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:50:12.355891 systemd-logind[1641]: Removed session 10. Oct 2 18:50:12.541000 audit[5072]: USER_ACCT pid=5072 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:50:12.542113 sshd[5072]: Accepted publickey for core from 139.178.89.65 port 35910 ssh2: RSA SHA256:ePkK8jKoGlhN3AxcTQ2G+RQZHD5kDZhw675IJmRySH8 Oct 2 18:50:12.543000 audit[5072]: CRED_ACQ pid=5072 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:50:12.544000 audit[5072]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffcb6ef710 a2=3 a3=1 items=0 ppid=1 pid=5072 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:12.544000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 18:50:12.546006 sshd[5072]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 18:50:12.555817 systemd[1]: Started session-11.scope. Oct 2 18:50:12.557653 systemd-logind[1641]: New session 11 of user core. Oct 2 18:50:12.567000 audit[5072]: USER_START pid=5072 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:50:12.574000 audit[5074]: CRED_ACQ pid=5074 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:50:14.646891 sshd[5072]: pam_unix(sshd:session): session closed for user core Oct 2 18:50:14.648000 audit[5072]: USER_END pid=5072 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:50:14.649000 audit[5072]: CRED_DISP pid=5072 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:50:14.654246 systemd[1]: sshd@10-172.31.16.118:22-139.178.89.65:35910.service: Deactivated successfully. Oct 2 18:50:14.654000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-172.31.16.118:22-139.178.89.65:35910 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:50:14.656482 systemd[1]: session-11.scope: Deactivated successfully. Oct 2 18:50:14.659618 systemd-logind[1641]: Session 11 logged out. Waiting for processes to exit. Oct 2 18:50:14.661850 systemd-logind[1641]: Removed session 11. Oct 2 18:50:14.677988 systemd[1]: Started sshd@11-172.31.16.118:22-139.178.89.65:35918.service. Oct 2 18:50:14.677000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-172.31.16.118:22-139.178.89.65:35918 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:50:14.870375 sshd[5082]: Accepted publickey for core from 139.178.89.65 port 35918 ssh2: RSA SHA256:ePkK8jKoGlhN3AxcTQ2G+RQZHD5kDZhw675IJmRySH8 Oct 2 18:50:14.869000 audit[5082]: USER_ACCT pid=5082 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:50:14.872000 audit[5082]: CRED_ACQ pid=5082 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:50:14.873000 audit[5082]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc8d6c760 a2=3 a3=1 items=0 ppid=1 pid=5082 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:14.873000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 18:50:14.874311 sshd[5082]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 18:50:14.882599 systemd-logind[1641]: New session 12 of user core. Oct 2 18:50:14.883713 systemd[1]: Started session-12.scope. Oct 2 18:50:14.893000 audit[5082]: USER_START pid=5082 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:50:14.900000 audit[5087]: CRED_ACQ pid=5087 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:50:14.979218 systemd[1]: run-containerd-runc-k8s.io-e0a8f8887c5ee4201e06e2bb70bb51407cd6b0e01daadeb765ef70b99dc882be-runc.3kJoAO.mount: Deactivated successfully. Oct 2 18:50:15.110368 systemd[1]: run-containerd-runc-k8s.io-e0a8f8887c5ee4201e06e2bb70bb51407cd6b0e01daadeb765ef70b99dc882be-runc.iOIozm.mount: Deactivated successfully. Oct 2 18:50:15.330931 sshd[5082]: pam_unix(sshd:session): session closed for user core Oct 2 18:50:15.332000 audit[5082]: USER_END pid=5082 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:50:15.332000 audit[5082]: CRED_DISP pid=5082 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:50:15.336121 systemd-logind[1641]: Session 12 logged out. Waiting for processes to exit. Oct 2 18:50:15.336464 systemd[1]: session-12.scope: Deactivated successfully. Oct 2 18:50:15.338509 systemd-logind[1641]: Removed session 12. Oct 2 18:50:15.339139 systemd[1]: sshd@11-172.31.16.118:22-139.178.89.65:35918.service: Deactivated successfully. Oct 2 18:50:15.339000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-172.31.16.118:22-139.178.89.65:35918 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:50:20.806397 env[1656]: time="2023-10-02T18:50:20.806057847Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\"" Oct 2 18:50:20.990698 env[1656]: time="2023-10-02T18:50:20.990581863Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 18:50:20.992149 env[1656]: time="2023-10-02T18:50:20.992087061Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 18:50:20.992439 kubelet[2886]: E1002 18:50:20.992388 2886 remote_image.go:242] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 18:50:20.992995 kubelet[2886]: E1002 18:50:20.992466 2886 kuberuntime_image.go:51] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 18:50:20.992995 kubelet[2886]: E1002 18:50:20.992807 2886 kuberuntime_manager.go:862] container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.25.0,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-sv7bs,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/version,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:90,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/code/filecheck],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:5,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:5,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*false,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod calico-apiserver-845fbdf9fb-h4vwt_calico-apiserver(5dfaf83b-bc8f-4c6b-8ab6-ed9409d87c2e): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 18:50:20.992995 kubelet[2886]: E1002 18:50:20.992877 2886 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-apiserver/calico-apiserver-845fbdf9fb-h4vwt" podUID=5dfaf83b-bc8f-4c6b-8ab6-ed9409d87c2e Oct 2 18:50:20.994336 env[1656]: time="2023-10-02T18:50:20.993910610Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\"" Oct 2 18:50:21.173867 env[1656]: time="2023-10-02T18:50:21.172876877Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 18:50:21.174806 env[1656]: time="2023-10-02T18:50:21.174695782Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 18:50:21.175153 kubelet[2886]: E1002 18:50:21.175100 2886 remote_image.go:242] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 18:50:21.175293 kubelet[2886]: E1002 18:50:21.175169 2886 kuberuntime_image.go:51] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/apiserver:v3.25.0" Oct 2 18:50:21.175382 kubelet[2886]: E1002 18:50:21.175326 2886 kuberuntime_manager.go:862] container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.25.0,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-2l2mg,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/version,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:90,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/code/filecheck],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:5,TimeoutSeconds:1,PeriodSeconds:10,SuccessThreshold:1,FailureThreshold:5,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*false,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod calico-apiserver-845fbdf9fb-dd5n5_calico-apiserver(c7fc7a94-c50f-45c6-81d1-31244ce0f455): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/apiserver:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 18:50:21.175587 kubelet[2886]: E1002 18:50:21.175392 2886 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-apiserver/calico-apiserver-845fbdf9fb-dd5n5" podUID=c7fc7a94-c50f-45c6-81d1-31244ce0f455 Oct 2 18:50:21.810826 kubelet[2886]: E1002 18:50:21.810425 2886 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-2xm2w" podUID=e6ba647d-27de-403d-bc1a-97cd30c5337c Oct 2 18:50:25.365190 systemd[1]: Started sshd@12-172.31.16.118:22-139.178.89.65:35004.service. Oct 2 18:50:25.376782 kernel: kauditd_printk_skb: 23 callbacks suppressed Oct 2 18:50:25.377027 kernel: audit: type=1130 audit(1696272625.364:1436): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-172.31.16.118:22-139.178.89.65:35004 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:50:25.364000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-172.31.16.118:22-139.178.89.65:35004 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:50:25.571000 audit[5199]: USER_ACCT pid=5199 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:50:25.572771 sshd[5199]: Accepted publickey for core from 139.178.89.65 port 35004 ssh2: RSA SHA256:ePkK8jKoGlhN3AxcTQ2G+RQZHD5kDZhw675IJmRySH8 Oct 2 18:50:25.584704 kernel: audit: type=1101 audit(1696272625.571:1437): pid=5199 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:50:25.584000 audit[5199]: CRED_ACQ pid=5199 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:50:25.586853 sshd[5199]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 2 18:50:25.601505 kernel: audit: type=1103 audit(1696272625.584:1438): pid=5199 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:50:25.601787 kernel: audit: type=1006 audit(1696272625.585:1439): pid=5199 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=13 res=1 Oct 2 18:50:25.585000 audit[5199]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff57fe110 a2=3 a3=1 items=0 ppid=1 pid=5199 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:25.612416 kernel: audit: type=1300 audit(1696272625.585:1439): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff57fe110 a2=3 a3=1 items=0 ppid=1 pid=5199 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:25.585000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 2 18:50:25.616339 kernel: audit: type=1327 audit(1696272625.585:1439): proctitle=737368643A20636F7265205B707269765D Oct 2 18:50:25.621206 systemd-logind[1641]: New session 13 of user core. Oct 2 18:50:25.622275 systemd[1]: Started session-13.scope. Oct 2 18:50:25.631000 audit[5199]: USER_START pid=5199 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:50:25.644627 kernel: audit: type=1105 audit(1696272625.631:1440): pid=5199 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:50:25.644000 audit[5201]: CRED_ACQ pid=5201 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:50:25.654601 kernel: audit: type=1103 audit(1696272625.644:1441): pid=5201 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:50:25.911591 systemd[1]: run-containerd-runc-k8s.io-1ca171773b1a69ccf09a1d5c6a02199e1a10fd681fe7126e7e06d1bc42bb2ddc-runc.7Iur5b.mount: Deactivated successfully. Oct 2 18:50:25.981056 sshd[5199]: pam_unix(sshd:session): session closed for user core Oct 2 18:50:25.982000 audit[5199]: USER_END pid=5199 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:50:25.989361 systemd-logind[1641]: Session 13 logged out. Waiting for processes to exit. Oct 2 18:50:25.991957 systemd[1]: session-13.scope: Deactivated successfully. Oct 2 18:50:25.982000 audit[5199]: CRED_DISP pid=5199 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:50:25.994406 systemd[1]: sshd@12-172.31.16.118:22-139.178.89.65:35004.service: Deactivated successfully. Oct 2 18:50:25.998823 systemd-logind[1641]: Removed session 13. Oct 2 18:50:26.003944 kernel: audit: type=1106 audit(1696272625.982:1442): pid=5199 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:50:26.004083 kernel: audit: type=1104 audit(1696272625.982:1443): pid=5199 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Oct 2 18:50:25.994000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-172.31.16.118:22-139.178.89.65:35004 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 2 18:50:31.807616 kubelet[2886]: E1002 18:50:31.806260 2886 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-845fbdf9fb-dd5n5" podUID=c7fc7a94-c50f-45c6-81d1-31244ce0f455 Oct 2 18:50:32.804986 kubelet[2886]: E1002 18:50:32.804930 2886 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-845fbdf9fb-h4vwt" podUID=5dfaf83b-bc8f-4c6b-8ab6-ed9409d87c2e Oct 2 18:50:32.805956 kubelet[2886]: E1002 18:50:32.805903 2886 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-2xm2w" podUID=e6ba647d-27de-403d-bc1a-97cd30c5337c Oct 2 18:50:34.953632 systemd[1]: run-containerd-runc-k8s.io-e0a8f8887c5ee4201e06e2bb70bb51407cd6b0e01daadeb765ef70b99dc882be-runc.VUeOT2.mount: Deactivated successfully. Oct 2 18:50:35.032021 systemd[1]: run-containerd-runc-k8s.io-e0a8f8887c5ee4201e06e2bb70bb51407cd6b0e01daadeb765ef70b99dc882be-runc.3xNxJF.mount: Deactivated successfully. Oct 2 18:50:35.752000 audit[2568]: AVC avc: denied { watch } for pid=2568 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=7083 scontext=system_u:system_r:svirt_lxc_net_t:s0:c112,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 18:50:35.755263 kernel: kauditd_printk_skb: 1 callbacks suppressed Oct 2 18:50:35.755362 kernel: audit: type=1400 audit(1696272635.752:1445): avc: denied { watch } for pid=2568 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=7083 scontext=system_u:system_r:svirt_lxc_net_t:s0:c112,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 18:50:35.752000 audit[2568]: AVC avc: denied { watch } for pid=2568 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=6812 scontext=system_u:system_r:svirt_lxc_net_t:s0:c112,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 18:50:35.774732 kernel: audit: type=1400 audit(1696272635.752:1446): avc: denied { watch } for pid=2568 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=6812 scontext=system_u:system_r:svirt_lxc_net_t:s0:c112,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 18:50:35.752000 audit[2568]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=10 a1=4000c5aae0 a2=fc6 a3=0 items=0 ppid=2409 pid=2568 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c112,c621 key=(null) Oct 2 18:50:35.787385 kernel: audit: type=1300 audit(1696272635.752:1445): arch=c00000b7 syscall=27 success=no exit=-13 a0=10 a1=4000c5aae0 a2=fc6 a3=0 items=0 ppid=2409 pid=2568 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c112,c621 key=(null) Oct 2 18:50:35.787473 kernel: audit: type=1327 audit(1696272635.752:1445): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 18:50:35.752000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 18:50:35.752000 audit[2568]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=4000a12760 a2=fc6 a3=0 items=0 ppid=2409 pid=2568 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c112,c621 key=(null) Oct 2 18:50:35.810480 kernel: audit: type=1300 audit(1696272635.752:1446): arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=4000a12760 a2=fc6 a3=0 items=0 ppid=2409 pid=2568 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c112,c621 key=(null) Oct 2 18:50:35.810653 kernel: audit: type=1327 audit(1696272635.752:1446): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 18:50:35.752000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 18:50:35.946585 systemd[1]: run-containerd-runc-k8s.io-1ca171773b1a69ccf09a1d5c6a02199e1a10fd681fe7126e7e06d1bc42bb2ddc-runc.vBeZDf.mount: Deactivated successfully. Oct 2 18:50:38.965000 audit[2576]: AVC avc: denied { watch } for pid=2576 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=7078 scontext=system_u:system_r:svirt_lxc_net_t:s0:c376,c943 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 18:50:38.965000 audit[2576]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=77 a1=400adf93e0 a2=fc6 a3=0 items=0 ppid=2397 pid=2576 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c376,c943 key=(null) Oct 2 18:50:38.988772 kernel: audit: type=1400 audit(1696272638.965:1447): avc: denied { watch } for pid=2576 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=7078 scontext=system_u:system_r:svirt_lxc_net_t:s0:c376,c943 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 18:50:38.988929 kernel: audit: type=1300 audit(1696272638.965:1447): arch=c00000b7 syscall=27 success=no exit=-13 a0=77 a1=400adf93e0 a2=fc6 a3=0 items=0 ppid=2397 pid=2576 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c376,c943 key=(null) Oct 2 18:50:38.965000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31362E313138002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 18:50:38.999677 kernel: audit: type=1327 audit(1696272638.965:1447): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31362E313138002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 18:50:38.966000 audit[2576]: AVC avc: denied { watch } for pid=2576 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=7083 scontext=system_u:system_r:svirt_lxc_net_t:s0:c376,c943 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 18:50:39.010187 kernel: audit: type=1400 audit(1696272638.966:1448): avc: denied { watch } for pid=2576 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=7083 scontext=system_u:system_r:svirt_lxc_net_t:s0:c376,c943 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 18:50:38.966000 audit[2576]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7b a1=400ad41d40 a2=fc6 a3=0 items=0 ppid=2397 pid=2576 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c376,c943 key=(null) Oct 2 18:50:38.966000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31362E313138002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 18:50:38.993000 audit[2576]: AVC avc: denied { watch } for pid=2576 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=7085 scontext=system_u:system_r:svirt_lxc_net_t:s0:c376,c943 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 18:50:38.993000 audit[2576]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=77 a1=4009708000 a2=fc6 a3=0 items=0 ppid=2397 pid=2576 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c376,c943 key=(null) Oct 2 18:50:38.993000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31362E313138002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 18:50:38.993000 audit[2576]: AVC avc: denied { watch } for pid=2576 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=6812 scontext=system_u:system_r:svirt_lxc_net_t:s0:c376,c943 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 18:50:38.993000 audit[2576]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=78 a1=4002a35c20 a2=fc6 a3=0 items=0 ppid=2397 pid=2576 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c376,c943 key=(null) Oct 2 18:50:38.993000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31362E313138002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 18:50:39.128000 audit[2576]: AVC avc: denied { watch } for pid=2576 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=7083 scontext=system_u:system_r:svirt_lxc_net_t:s0:c376,c943 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 18:50:39.128000 audit[2576]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=77 a1=4009708150 a2=fc6 a3=0 items=0 ppid=2397 pid=2576 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c376,c943 key=(null) Oct 2 18:50:39.128000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31362E313138002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 18:50:39.138000 audit[2576]: AVC avc: denied { watch } for pid=2576 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=6812 scontext=system_u:system_r:svirt_lxc_net_t:s0:c376,c943 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 18:50:39.138000 audit[2576]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=77 a1=4002a35ca0 a2=fc6 a3=0 items=0 ppid=2397 pid=2576 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c376,c943 key=(null) Oct 2 18:50:39.138000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31362E313138002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 2 18:50:39.824000 audit: BPF prog-id=129 op=UNLOAD Oct 2 18:50:39.824134 systemd[1]: cri-containerd-ffe7cd3f3eab87fb02277be36415fe334e35893a3542f108c36cebfda03cf57b.scope: Deactivated successfully. Oct 2 18:50:39.824756 systemd[1]: cri-containerd-ffe7cd3f3eab87fb02277be36415fe334e35893a3542f108c36cebfda03cf57b.scope: Consumed 5.497s CPU time. Oct 2 18:50:39.830000 audit: BPF prog-id=132 op=UNLOAD Oct 2 18:50:39.881165 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-ffe7cd3f3eab87fb02277be36415fe334e35893a3542f108c36cebfda03cf57b-rootfs.mount: Deactivated successfully. Oct 2 18:50:39.895382 env[1656]: time="2023-10-02T18:50:39.895310992Z" level=info msg="shim disconnected" id=ffe7cd3f3eab87fb02277be36415fe334e35893a3542f108c36cebfda03cf57b Oct 2 18:50:39.896079 env[1656]: time="2023-10-02T18:50:39.895385405Z" level=warning msg="cleaning up after shim disconnected" id=ffe7cd3f3eab87fb02277be36415fe334e35893a3542f108c36cebfda03cf57b namespace=k8s.io Oct 2 18:50:39.896079 env[1656]: time="2023-10-02T18:50:39.895410209Z" level=info msg="cleaning up dead shim" Oct 2 18:50:39.923204 env[1656]: time="2023-10-02T18:50:39.923128248Z" level=warning msg="cleanup warnings time=\"2023-10-02T18:50:39Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5316 runtime=io.containerd.runc.v2\n" Oct 2 18:50:40.212884 systemd[1]: cri-containerd-5622b06389b79930179b4402e0d20e5a3f02aa23fa05a720e83e25779a87394c.scope: Deactivated successfully. Oct 2 18:50:40.213439 systemd[1]: cri-containerd-5622b06389b79930179b4402e0d20e5a3f02aa23fa05a720e83e25779a87394c.scope: Consumed 4.741s CPU time. Oct 2 18:50:40.218000 audit: BPF prog-id=88 op=UNLOAD Oct 2 18:50:40.218000 audit: BPF prog-id=101 op=UNLOAD Oct 2 18:50:40.226037 systemd[1]: cri-containerd-df8a5be89a2b0a710d2538b300c9d28062cdc943d8343f74cd081e22d9ffc94a.scope: Deactivated successfully. Oct 2 18:50:40.226636 systemd[1]: cri-containerd-df8a5be89a2b0a710d2538b300c9d28062cdc943d8343f74cd081e22d9ffc94a.scope: Consumed 2.220s CPU time. Oct 2 18:50:40.230000 audit: BPF prog-id=92 op=UNLOAD Oct 2 18:50:40.230000 audit: BPF prog-id=107 op=UNLOAD Oct 2 18:50:40.284508 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-5622b06389b79930179b4402e0d20e5a3f02aa23fa05a720e83e25779a87394c-rootfs.mount: Deactivated successfully. Oct 2 18:50:40.292329 kubelet[2886]: I1002 18:50:40.292211 2886 scope.go:115] "RemoveContainer" containerID="ffe7cd3f3eab87fb02277be36415fe334e35893a3542f108c36cebfda03cf57b" Oct 2 18:50:40.303306 env[1656]: time="2023-10-02T18:50:40.303255212Z" level=info msg="CreateContainer within sandbox \"519c2751fbc46ea7f612ca735ce50e8a192a68579e6a24d1d42a3533bba7ff2b\" for container &ContainerMetadata{Name:tigera-operator,Attempt:1,}" Oct 2 18:50:40.304008 env[1656]: time="2023-10-02T18:50:40.303943489Z" level=info msg="shim disconnected" id=5622b06389b79930179b4402e0d20e5a3f02aa23fa05a720e83e25779a87394c Oct 2 18:50:40.304139 env[1656]: time="2023-10-02T18:50:40.304005109Z" level=warning msg="cleaning up after shim disconnected" id=5622b06389b79930179b4402e0d20e5a3f02aa23fa05a720e83e25779a87394c namespace=k8s.io Oct 2 18:50:40.304139 env[1656]: time="2023-10-02T18:50:40.304027849Z" level=info msg="cleaning up dead shim" Oct 2 18:50:40.315944 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-df8a5be89a2b0a710d2538b300c9d28062cdc943d8343f74cd081e22d9ffc94a-rootfs.mount: Deactivated successfully. Oct 2 18:50:40.333296 env[1656]: time="2023-10-02T18:50:40.333209559Z" level=info msg="shim disconnected" id=df8a5be89a2b0a710d2538b300c9d28062cdc943d8343f74cd081e22d9ffc94a Oct 2 18:50:40.333591 env[1656]: time="2023-10-02T18:50:40.333293956Z" level=warning msg="cleaning up after shim disconnected" id=df8a5be89a2b0a710d2538b300c9d28062cdc943d8343f74cd081e22d9ffc94a namespace=k8s.io Oct 2 18:50:40.333591 env[1656]: time="2023-10-02T18:50:40.333316672Z" level=info msg="cleaning up dead shim" Oct 2 18:50:40.337179 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1584085102.mount: Deactivated successfully. Oct 2 18:50:40.346335 env[1656]: time="2023-10-02T18:50:40.346258986Z" level=info msg="CreateContainer within sandbox \"519c2751fbc46ea7f612ca735ce50e8a192a68579e6a24d1d42a3533bba7ff2b\" for &ContainerMetadata{Name:tigera-operator,Attempt:1,} returns container id \"4cea0e1f28e4dc5d12c6dc558712bd0ae03e38c50fd50b0807f6d36db0eba6be\"" Oct 2 18:50:40.347279 env[1656]: time="2023-10-02T18:50:40.347232552Z" level=info msg="StartContainer for \"4cea0e1f28e4dc5d12c6dc558712bd0ae03e38c50fd50b0807f6d36db0eba6be\"" Oct 2 18:50:40.367707 env[1656]: time="2023-10-02T18:50:40.367621444Z" level=warning msg="cleanup warnings time=\"2023-10-02T18:50:40Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5355 runtime=io.containerd.runc.v2\n" Oct 2 18:50:40.385477 env[1656]: time="2023-10-02T18:50:40.385396166Z" level=warning msg="cleanup warnings time=\"2023-10-02T18:50:40Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5363 runtime=io.containerd.runc.v2\n" Oct 2 18:50:40.411639 systemd[1]: Started cri-containerd-4cea0e1f28e4dc5d12c6dc558712bd0ae03e38c50fd50b0807f6d36db0eba6be.scope. Oct 2 18:50:40.460000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:40.460000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:40.460000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:40.460000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:40.460000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:40.460000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:40.460000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:40.460000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:40.460000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:40.460000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:40.460000 audit: BPF prog-id=193 op=LOAD Oct 2 18:50:40.461000 audit[5389]: AVC avc: denied { bpf } for pid=5389 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:40.461000 audit[5389]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000245b38 a2=10 a3=0 items=0 ppid=3152 pid=5389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:40.461000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3463656130653166323865346463356431326336646335353837313262 Oct 2 18:50:40.461000 audit[5389]: AVC avc: denied { perfmon } for pid=5389 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:40.461000 audit[5389]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40002455a0 a2=3c a3=0 items=0 ppid=3152 pid=5389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:40.461000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3463656130653166323865346463356431326336646335353837313262 Oct 2 18:50:40.461000 audit[5389]: AVC avc: denied { bpf } for pid=5389 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:40.461000 audit[5389]: AVC avc: denied { bpf } for pid=5389 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:40.461000 audit[5389]: AVC avc: denied { bpf } for pid=5389 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:40.461000 audit[5389]: AVC avc: denied { perfmon } for pid=5389 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:40.461000 audit[5389]: AVC avc: denied { perfmon } for pid=5389 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:40.461000 audit[5389]: AVC avc: denied { perfmon } for pid=5389 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:40.461000 audit[5389]: AVC avc: denied { perfmon } for pid=5389 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:40.461000 audit[5389]: AVC avc: denied { perfmon } for pid=5389 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:40.461000 audit[5389]: AVC avc: denied { bpf } for pid=5389 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:40.461000 audit[5389]: AVC avc: denied { bpf } for pid=5389 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:40.461000 audit: BPF prog-id=194 op=LOAD Oct 2 18:50:40.461000 audit[5389]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40002458e0 a2=78 a3=0 items=0 ppid=3152 pid=5389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:40.461000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3463656130653166323865346463356431326336646335353837313262 Oct 2 18:50:40.462000 audit[5389]: AVC avc: denied { bpf } for pid=5389 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:40.462000 audit[5389]: AVC avc: denied { bpf } for pid=5389 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:40.462000 audit[5389]: AVC avc: denied { perfmon } for pid=5389 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:40.462000 audit[5389]: AVC avc: denied { perfmon } for pid=5389 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:40.462000 audit[5389]: AVC avc: denied { perfmon } for pid=5389 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:40.462000 audit[5389]: AVC avc: denied { perfmon } for pid=5389 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:40.462000 audit[5389]: AVC avc: denied { perfmon } for pid=5389 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:40.462000 audit[5389]: AVC avc: denied { bpf } for pid=5389 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:40.462000 audit[5389]: AVC avc: denied { bpf } for pid=5389 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:40.462000 audit: BPF prog-id=195 op=LOAD Oct 2 18:50:40.462000 audit[5389]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000245670 a2=78 a3=0 items=0 ppid=3152 pid=5389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:40.462000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3463656130653166323865346463356431326336646335353837313262 Oct 2 18:50:40.462000 audit: BPF prog-id=195 op=UNLOAD Oct 2 18:50:40.462000 audit: BPF prog-id=194 op=UNLOAD Oct 2 18:50:40.462000 audit[5389]: AVC avc: denied { bpf } for pid=5389 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:40.462000 audit[5389]: AVC avc: denied { bpf } for pid=5389 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:40.462000 audit[5389]: AVC avc: denied { bpf } for pid=5389 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:40.462000 audit[5389]: AVC avc: denied { perfmon } for pid=5389 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:40.462000 audit[5389]: AVC avc: denied { perfmon } for pid=5389 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:40.462000 audit[5389]: AVC avc: denied { perfmon } for pid=5389 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:40.462000 audit[5389]: AVC avc: denied { perfmon } for pid=5389 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:40.462000 audit[5389]: AVC avc: denied { perfmon } for pid=5389 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:40.462000 audit[5389]: AVC avc: denied { bpf } for pid=5389 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:40.462000 audit[5389]: AVC avc: denied { bpf } for pid=5389 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:40.462000 audit: BPF prog-id=196 op=LOAD Oct 2 18:50:40.462000 audit[5389]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000245b40 a2=78 a3=0 items=0 ppid=3152 pid=5389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:40.462000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3463656130653166323865346463356431326336646335353837313262 Oct 2 18:50:40.501860 env[1656]: time="2023-10-02T18:50:40.501790807Z" level=info msg="StartContainer for \"4cea0e1f28e4dc5d12c6dc558712bd0ae03e38c50fd50b0807f6d36db0eba6be\" returns successfully" Oct 2 18:50:41.299304 kubelet[2886]: I1002 18:50:41.299242 2886 scope.go:115] "RemoveContainer" containerID="5622b06389b79930179b4402e0d20e5a3f02aa23fa05a720e83e25779a87394c" Oct 2 18:50:41.304613 kubelet[2886]: I1002 18:50:41.304025 2886 scope.go:115] "RemoveContainer" containerID="df8a5be89a2b0a710d2538b300c9d28062cdc943d8343f74cd081e22d9ffc94a" Oct 2 18:50:41.305435 env[1656]: time="2023-10-02T18:50:41.305381518Z" level=info msg="CreateContainer within sandbox \"ecf0feeaef420c3249488da73b95d98abaf6ef3cd8228e828c05185f36954d42\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:1,}" Oct 2 18:50:41.308417 env[1656]: time="2023-10-02T18:50:41.308362122Z" level=info msg="CreateContainer within sandbox \"65259fbe12f1a378be6878f8157dc62b96be9ec4ca4a8688a3c85d9856a8259f\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:1,}" Oct 2 18:50:41.333082 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4137571656.mount: Deactivated successfully. Oct 2 18:50:41.344257 env[1656]: time="2023-10-02T18:50:41.344169108Z" level=info msg="CreateContainer within sandbox \"65259fbe12f1a378be6878f8157dc62b96be9ec4ca4a8688a3c85d9856a8259f\" for &ContainerMetadata{Name:kube-scheduler,Attempt:1,} returns container id \"8f79608163c34254ed86323c8dd350bf0b643bba0c3bffca0cd86f1a7548c1f5\"" Oct 2 18:50:41.346527 env[1656]: time="2023-10-02T18:50:41.346439427Z" level=info msg="StartContainer for \"8f79608163c34254ed86323c8dd350bf0b643bba0c3bffca0cd86f1a7548c1f5\"" Oct 2 18:50:41.349449 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3511829812.mount: Deactivated successfully. Oct 2 18:50:41.366778 env[1656]: time="2023-10-02T18:50:41.366714784Z" level=info msg="CreateContainer within sandbox \"ecf0feeaef420c3249488da73b95d98abaf6ef3cd8228e828c05185f36954d42\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:1,} returns container id \"6148c6705095878fd77f382166b2fb40b57e8adc0598918762de3d88ed52ec73\"" Oct 2 18:50:41.367713 env[1656]: time="2023-10-02T18:50:41.367655182Z" level=info msg="StartContainer for \"6148c6705095878fd77f382166b2fb40b57e8adc0598918762de3d88ed52ec73\"" Oct 2 18:50:41.401673 systemd[1]: Started cri-containerd-8f79608163c34254ed86323c8dd350bf0b643bba0c3bffca0cd86f1a7548c1f5.scope. Oct 2 18:50:41.427732 systemd[1]: Started cri-containerd-6148c6705095878fd77f382166b2fb40b57e8adc0598918762de3d88ed52ec73.scope. Oct 2 18:50:41.481385 kernel: kauditd_printk_skb: 77 callbacks suppressed Oct 2 18:50:41.481605 kernel: audit: type=1400 audit(1696272641.471:1477): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:41.471000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:41.471000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:41.492392 kernel: audit: type=1400 audit(1696272641.471:1478): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:41.471000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:41.500531 kernel: audit: type=1400 audit(1696272641.471:1479): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:41.471000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:41.509021 kernel: audit: type=1400 audit(1696272641.471:1480): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:41.509157 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Oct 2 18:50:41.471000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:41.518668 kernel: audit: type=1400 audit(1696272641.471:1481): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:41.518812 kernel: audit: audit_lost=22 audit_rate_limit=0 audit_backlog_limit=64 Oct 2 18:50:41.471000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:41.528887 kernel: audit: type=1400 audit(1696272641.471:1482): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:41.529021 kernel: audit: backlog limit exceeded Oct 2 18:50:41.471000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:41.537974 kernel: audit: type=1400 audit(1696272641.471:1483): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:41.471000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:41.471000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:41.473000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:41.473000 audit: BPF prog-id=197 op=LOAD Oct 2 18:50:41.474000 audit[5425]: AVC avc: denied { bpf } for pid=5425 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:41.474000 audit[5425]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2432 pid=5425 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:41.474000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866373936303831363363333432353465643836333233633864643335 Oct 2 18:50:41.474000 audit[5425]: AVC avc: denied { perfmon } for pid=5425 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:41.474000 audit[5425]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2432 pid=5425 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:41.474000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866373936303831363363333432353465643836333233633864643335 Oct 2 18:50:41.474000 audit[5425]: AVC avc: denied { bpf } for pid=5425 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:41.474000 audit[5425]: AVC avc: denied { bpf } for pid=5425 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:41.474000 audit[5425]: AVC avc: denied { bpf } for pid=5425 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:41.474000 audit[5425]: AVC avc: denied { perfmon } for pid=5425 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:41.474000 audit[5425]: AVC avc: denied { perfmon } for pid=5425 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:41.474000 audit[5425]: AVC avc: denied { perfmon } for pid=5425 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:41.474000 audit[5425]: AVC avc: denied { perfmon } for pid=5425 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:41.474000 audit[5425]: AVC avc: denied { perfmon } for pid=5425 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:41.474000 audit[5425]: AVC avc: denied { bpf } for pid=5425 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:41.474000 audit[5425]: AVC avc: denied { bpf } for pid=5425 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:41.474000 audit: BPF prog-id=198 op=LOAD Oct 2 18:50:41.474000 audit[5425]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2432 pid=5425 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:41.474000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866373936303831363363333432353465643836333233633864643335 Oct 2 18:50:41.481000 audit[5425]: AVC avc: denied { bpf } for pid=5425 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:41.481000 audit[5425]: AVC avc: denied { bpf } for pid=5425 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:41.481000 audit[5425]: AVC avc: denied { perfmon } for pid=5425 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:41.481000 audit[5425]: AVC avc: denied { perfmon } for pid=5425 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:41.481000 audit[5425]: AVC avc: denied { perfmon } for pid=5425 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:41.481000 audit[5425]: AVC avc: denied { perfmon } for pid=5425 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:41.481000 audit[5425]: AVC avc: denied { perfmon } for pid=5425 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:41.481000 audit[5425]: AVC avc: denied { bpf } for pid=5425 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:41.481000 audit[5425]: AVC avc: denied { bpf } for pid=5425 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:41.481000 audit: BPF prog-id=199 op=LOAD Oct 2 18:50:41.481000 audit[5425]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2432 pid=5425 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:41.481000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866373936303831363363333432353465643836333233633864643335 Oct 2 18:50:41.481000 audit: BPF prog-id=199 op=UNLOAD Oct 2 18:50:41.481000 audit: BPF prog-id=198 op=UNLOAD Oct 2 18:50:41.481000 audit[5425]: AVC avc: denied { bpf } for pid=5425 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:41.481000 audit[5425]: AVC avc: denied { bpf } for pid=5425 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:41.481000 audit[5425]: AVC avc: denied { bpf } for pid=5425 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:41.481000 audit[5425]: AVC avc: denied { perfmon } for pid=5425 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:41.481000 audit[5425]: AVC avc: denied { perfmon } for pid=5425 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:41.481000 audit[5425]: AVC avc: denied { perfmon } for pid=5425 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:41.481000 audit[5425]: AVC avc: denied { perfmon } for pid=5425 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:41.481000 audit[5425]: AVC avc: denied { perfmon } for pid=5425 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:41.481000 audit[5425]: AVC avc: denied { bpf } for pid=5425 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:41.481000 audit[5425]: AVC avc: denied { bpf } for pid=5425 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:41.481000 audit: BPF prog-id=200 op=LOAD Oct 2 18:50:41.481000 audit[5425]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2432 pid=5425 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:41.481000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866373936303831363363333432353465643836333233633864643335 Oct 2 18:50:41.502000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:41.502000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:41.502000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:41.502000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:41.502000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:41.502000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:41.502000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:41.530000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:41.537000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:41.537000 audit: BPF prog-id=201 op=LOAD Oct 2 18:50:41.538000 audit[5439]: AVC avc: denied { bpf } for pid=5439 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:41.538000 audit[5439]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2409 pid=5439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:41.538000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631343863363730353039353837386664373766333832313636623266 Oct 2 18:50:41.538000 audit[5439]: AVC avc: denied { perfmon } for pid=5439 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:41.538000 audit[5439]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2409 pid=5439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:41.538000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631343863363730353039353837386664373766333832313636623266 Oct 2 18:50:41.542000 audit[5439]: AVC avc: denied { bpf } for pid=5439 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:41.542000 audit[5439]: AVC avc: denied { bpf } for pid=5439 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:41.542000 audit[5439]: AVC avc: denied { bpf } for pid=5439 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:41.542000 audit[5439]: AVC avc: denied { perfmon } for pid=5439 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:41.542000 audit[5439]: AVC avc: denied { perfmon } for pid=5439 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:41.542000 audit[5439]: AVC avc: denied { perfmon } for pid=5439 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:41.542000 audit[5439]: AVC avc: denied { perfmon } for pid=5439 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:41.542000 audit[5439]: AVC avc: denied { perfmon } for pid=5439 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:41.542000 audit[5439]: AVC avc: denied { bpf } for pid=5439 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:41.542000 audit[5439]: AVC avc: denied { bpf } for pid=5439 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:41.542000 audit: BPF prog-id=202 op=LOAD Oct 2 18:50:41.542000 audit[5439]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2409 pid=5439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:41.542000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631343863363730353039353837386664373766333832313636623266 Oct 2 18:50:41.542000 audit[5439]: AVC avc: denied { bpf } for pid=5439 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:41.542000 audit[5439]: AVC avc: denied { bpf } for pid=5439 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:41.542000 audit[5439]: AVC avc: denied { perfmon } for pid=5439 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:41.542000 audit[5439]: AVC avc: denied { perfmon } for pid=5439 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:41.542000 audit[5439]: AVC avc: denied { perfmon } for pid=5439 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:41.542000 audit[5439]: AVC avc: denied { perfmon } for pid=5439 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:41.542000 audit[5439]: AVC avc: denied { perfmon } for pid=5439 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:41.542000 audit[5439]: AVC avc: denied { bpf } for pid=5439 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:41.542000 audit[5439]: AVC avc: denied { bpf } for pid=5439 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:41.542000 audit: BPF prog-id=203 op=LOAD Oct 2 18:50:41.542000 audit[5439]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2409 pid=5439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:41.542000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631343863363730353039353837386664373766333832313636623266 Oct 2 18:50:41.542000 audit: BPF prog-id=203 op=UNLOAD Oct 2 18:50:41.543000 audit: BPF prog-id=202 op=UNLOAD Oct 2 18:50:41.543000 audit[5439]: AVC avc: denied { bpf } for pid=5439 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:41.543000 audit[5439]: AVC avc: denied { bpf } for pid=5439 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:41.543000 audit[5439]: AVC avc: denied { bpf } for pid=5439 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:41.543000 audit[5439]: AVC avc: denied { perfmon } for pid=5439 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:41.543000 audit[5439]: AVC avc: denied { perfmon } for pid=5439 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:41.543000 audit[5439]: AVC avc: denied { perfmon } for pid=5439 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:41.543000 audit[5439]: AVC avc: denied { perfmon } for pid=5439 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:41.543000 audit[5439]: AVC avc: denied { perfmon } for pid=5439 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:41.543000 audit[5439]: AVC avc: denied { bpf } for pid=5439 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:41.543000 audit[5439]: AVC avc: denied { bpf } for pid=5439 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 2 18:50:41.543000 audit: BPF prog-id=204 op=LOAD Oct 2 18:50:41.543000 audit[5439]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2409 pid=5439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 2 18:50:41.543000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631343863363730353039353837386664373766333832313636623266 Oct 2 18:50:41.616064 env[1656]: time="2023-10-02T18:50:41.615926465Z" level=info msg="StartContainer for \"8f79608163c34254ed86323c8dd350bf0b643bba0c3bffca0cd86f1a7548c1f5\" returns successfully" Oct 2 18:50:41.630172 env[1656]: time="2023-10-02T18:50:41.630112574Z" level=info msg="StartContainer for \"6148c6705095878fd77f382166b2fb40b57e8adc0598918762de3d88ed52ec73\" returns successfully" Oct 2 18:50:43.806393 kubelet[2886]: E1002 18:50:43.806345 2886 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-845fbdf9fb-dd5n5" podUID=c7fc7a94-c50f-45c6-81d1-31244ce0f455 Oct 2 18:50:43.807015 kubelet[2886]: E1002 18:50:43.806601 2886 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\"\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\"\"]" pod="calico-system/csi-node-driver-2xm2w" podUID=e6ba647d-27de-403d-bc1a-97cd30c5337c Oct 2 18:50:43.881000 audit[5461]: AVC avc: denied { watch } for pid=5461 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=7083 scontext=system_u:system_r:svirt_lxc_net_t:s0:c112,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 18:50:43.881000 audit[5461]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=400026e000 a2=fc6 a3=0 items=0 ppid=2409 pid=5461 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c112,c621 key=(null) Oct 2 18:50:43.881000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 18:50:43.881000 audit[5461]: AVC avc: denied { watch } for pid=5461 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=6812 scontext=system_u:system_r:svirt_lxc_net_t:s0:c112,c621 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 2 18:50:43.881000 audit[5461]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4000050f40 a2=fc6 a3=0 items=0 ppid=2409 pid=5461 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c112,c621 key=(null) Oct 2 18:50:43.881000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 2 18:50:44.964254 systemd[1]: run-containerd-runc-k8s.io-e0a8f8887c5ee4201e06e2bb70bb51407cd6b0e01daadeb765ef70b99dc882be-runc.r20VZC.mount: Deactivated successfully. Oct 2 18:50:45.805277 kubelet[2886]: E1002 18:50:45.805225 2886 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-845fbdf9fb-h4vwt" podUID=5dfaf83b-bc8f-4c6b-8ab6-ed9409d87c2e Oct 2 18:50:45.948649 systemd[1]: run-containerd-runc-k8s.io-e0a8f8887c5ee4201e06e2bb70bb51407cd6b0e01daadeb765ef70b99dc882be-runc.6c02R1.mount: Deactivated successfully. Oct 2 18:50:46.061142 kubelet[2886]: E1002 18:50:46.060933 2886 controller.go:187] failed to update lease, error: Put "https://172.31.16.118:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-16-118?timeout=10s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) Oct 2 18:50:55.805943 env[1656]: time="2023-10-02T18:50:55.805883824Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\"" Oct 2 18:50:56.000033 env[1656]: time="2023-10-02T18:50:55.999948806Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 18:50:56.001429 env[1656]: time="2023-10-02T18:50:56.001350341Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 18:50:56.001713 kubelet[2886]: E1002 18:50:56.001660 2886 remote_image.go:242] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 18:50:56.002267 kubelet[2886]: E1002 18:50:56.001730 2886 kuberuntime_image.go:51] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/csi:v3.25.0" Oct 2 18:50:56.002267 kubelet[2886]: E1002 18:50:56.001856 2886 kuberuntime_manager.go:862] container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.25.0,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:etccalico,ReadOnly:false,MountPath:/etc/calico,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,},VolumeMount{Name:kube-api-access-jtrz6,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod csi-node-driver-2xm2w_calico-system(e6ba647d-27de-403d-bc1a-97cd30c5337c): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/csi:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/csi:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 18:50:56.003101 env[1656]: time="2023-10-02T18:50:56.003030603Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\"" Oct 2 18:50:56.062362 kubelet[2886]: E1002 18:50:56.062205 2886 controller.go:187] failed to update lease, error: Put "https://172.31.16.118:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-16-118?timeout=10s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) Oct 2 18:50:56.211289 env[1656]: time="2023-10-02T18:50:56.211217755Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io Oct 2 18:50:56.212937 env[1656]: time="2023-10-02T18:50:56.212877820Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" Oct 2 18:50:56.213824 kubelet[2886]: E1002 18:50:56.213335 2886 remote_image.go:242] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 18:50:56.213824 kubelet[2886]: E1002 18:50:56.213417 2886 kuberuntime_image.go:51] "Failed to pull image" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0" Oct 2 18:50:56.213824 kubelet[2886]: E1002 18:50:56.213652 2886 kuberuntime_manager.go:862] container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-jtrz6,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod csi-node-driver-2xm2w_calico-system(e6ba647d-27de-403d-bc1a-97cd30c5337c): ErrImagePull: rpc error: code = Unknown desc = failed to pull and unpack image "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to resolve reference "ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden Oct 2 18:50:56.213824 kubelet[2886]: E1002 18:50:56.213766 2886 pod_workers.go:965] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"rpc error: code = Unknown desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.25.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/csi-node-driver-2xm2w" podUID=e6ba647d-27de-403d-bc1a-97cd30c5337c Oct 2 18:50:56.804832 kubelet[2886]: E1002 18:50:56.804777 2886 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-845fbdf9fb-dd5n5" podUID=c7fc7a94-c50f-45c6-81d1-31244ce0f455 Oct 2 18:50:57.806351 kubelet[2886]: E1002 18:50:57.806300 2886 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.25.0\\\"\"" pod="calico-apiserver/calico-apiserver-845fbdf9fb-h4vwt" podUID=5dfaf83b-bc8f-4c6b-8ab6-ed9409d87c2e